-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
781 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,395 @@ | ||
#!/usr/bin/python | ||
# -*- coding: utf-8 -*- | ||
|
||
from ctypes import * | ||
import socket | ||
import struct | ||
import logging | ||
|
||
|
||
logging.basicConfig(level=logging.INFO, format="%(message)s") | ||
log = logging.getLogger(__file__) | ||
|
||
|
||
class SMB_HEADER(Structure): | ||
"""SMB Header decoder. | ||
""" | ||
|
||
_pack_ = 1 | ||
|
||
_fields_ = [ | ||
("server_component", c_uint32), | ||
("smb_command", c_uint8), | ||
("error_class", c_uint8), | ||
("reserved1", c_uint8), | ||
("error_code", c_uint16), | ||
("flags", c_uint8), | ||
("flags2", c_uint16), | ||
("process_id_high", c_uint16), | ||
("signature", c_uint64), | ||
("reserved2", c_uint16), | ||
("tree_id", c_uint16), | ||
("process_id", c_uint16), | ||
("user_id", c_uint16), | ||
("multiplex_id", c_uint16) | ||
] | ||
|
||
def __new__(self, buffer=None): | ||
return self.from_buffer_copy(buffer) | ||
|
||
def __init__(self, buffer): | ||
log.debug("server_component : %04x" % self.server_component) | ||
log.debug("smb_command : %01x" % self.smb_command) | ||
log.debug("error_class : %01x" % self.error_class) | ||
log.debug("error_code : %02x" % self.error_code) | ||
log.debug("flags : %01x" % self.flags) | ||
log.debug("flags2 : %02x" % self.flags2) | ||
log.debug("process_id_high : %02x" % self.process_id_high) | ||
log.debug("signature : %08x" % self.signature) | ||
log.debug("reserved2 : %02x" % self.reserved2) | ||
log.debug("tree_id : %02x" % self.tree_id) | ||
log.debug("process_id : %02x" % self.process_id) | ||
log.debug("user_id : %02x" % self.user_id) | ||
log.debug("multiplex_id : %02x" % self.multiplex_id) | ||
|
||
|
||
def generate_smb_proto_payload(*protos): | ||
"""Generate SMB Protocol. Pakcet protos in order. | ||
""" | ||
hexdata = [] | ||
for proto in protos: | ||
hexdata.extend(proto) | ||
return "".join(hexdata) | ||
|
||
|
||
def calculate_doublepulsar_xor_key(s): | ||
"""Calaculate Doublepulsar Xor Key | ||
""" | ||
x = (2 * s ^ (((s & 0xff00 | (s << 16)) << 8) | (((s >> 16) | s & 0xff0000) >> 8))) | ||
x = x & 0xffffffff | ||
return x | ||
|
||
|
||
def negotiate_proto_request(): | ||
"""Generate a negotiate_proto_request packet. | ||
""" | ||
log.debug("generate negotiate request") | ||
netbios = [ | ||
'\x00', | ||
'\x00\x00\x54' | ||
] | ||
|
||
smb_header = [ | ||
'\xFF\x53\x4D\x42', | ||
'\x72', | ||
'\x00\x00\x00\x00', | ||
'\x18', | ||
'\x01\x28', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00\x00\x00\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x2F\x4B', | ||
'\x00\x00', | ||
'\xC5\x5E' | ||
] | ||
|
||
negotiate_proto_request = [ | ||
'\x00', | ||
'\x31\x00', | ||
|
||
'\x02', | ||
'\x4C\x41\x4E\x4D\x41\x4E\x31\x2E\x30\x00', | ||
|
||
'\x02', | ||
'\x4C\x4D\x31\x2E\x32\x58\x30\x30\x32\x00', | ||
|
||
'\x02', | ||
'\x4E\x54\x20\x4C\x41\x4E\x4D\x41\x4E\x20\x31\x2E\x30\x00', | ||
|
||
'\x02', | ||
'\x4E\x54\x20\x4C\x4D\x20\x30\x2E\x31\x32\x00' | ||
] | ||
|
||
return generate_smb_proto_payload(netbios, smb_header, negotiate_proto_request) | ||
|
||
|
||
def session_setup_andx_request(): | ||
"""Generate session setuo andx request. | ||
""" | ||
log.debug("generate session setup andx request") | ||
netbios = [ | ||
'\x00', | ||
'\x00\x00\x63' | ||
] | ||
|
||
smb_header = [ | ||
'\xFF\x53\x4D\x42', | ||
'\x73', | ||
'\x00\x00\x00\x00', | ||
'\x18', | ||
'\x01\x20', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00\x00\x00\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x2F\x4B', | ||
'\x00\x00', | ||
'\xC5\x5E', | ||
] | ||
|
||
session_setup_andx_request = [ | ||
'\x0D', | ||
'\xFF', | ||
'\x00', | ||
'\x00\x00', | ||
'\xDF\xFF', | ||
'\x02\x00', | ||
'\x01\x00', | ||
'\x00\x00\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00', | ||
'\x40\x00\x00\x00', | ||
'\x26\x00', | ||
'\x00', | ||
'\x2e\x00', | ||
'\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x32\x31\x39\x35\x00', | ||
'\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x35\x2e\x30\x00', | ||
] | ||
|
||
return generate_smb_proto_payload(netbios, smb_header, session_setup_andx_request) | ||
|
||
|
||
def tree_connect_andx_request(ip, userid): | ||
"""Generate tree connect andx request. | ||
""" | ||
log.debug("generate tree connect andx request") | ||
|
||
netbios = [ | ||
'\x00', | ||
'\x00\x00\x47' | ||
] | ||
|
||
smb_header = [ | ||
'\xFF\x53\x4D\x42', | ||
'\x75', | ||
'\x00\x00\x00\x00', | ||
'\x18', | ||
'\x01\x20', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00\x00\x00\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x2F\x4B', | ||
userid, | ||
'\xC5\x5E' | ||
] | ||
|
||
ipc = "\\\\{}\IPC$\x00".format(ip) | ||
log.debug("Connecting to {} with UID = {}".format(ipc, userid)) | ||
|
||
tree_connect_andx_request = [ | ||
'\x04', | ||
'\xFF', | ||
'\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x01\x00', | ||
'\x1A\x00', | ||
'\x00', | ||
ipc.encode(), | ||
'\x3f\x3f\x3f\x3f\x3f\x00' | ||
] | ||
|
||
length = len("".join(smb_header)) + len("".join(tree_connect_andx_request)) | ||
|
||
netbios[1] = struct.pack(">L", length)[-3:] | ||
|
||
return generate_smb_proto_payload(netbios, smb_header, tree_connect_andx_request) | ||
|
||
|
||
def peeknamedpipe_request(treeid, processid, userid, multiplex_id): | ||
"""Generate tran2 request | ||
""" | ||
log.debug("generate peeknamedpipe request") | ||
netbios = [ | ||
'\x00', | ||
'\x00\x00\x4a' | ||
] | ||
|
||
smb_header = [ | ||
'\xFF\x53\x4D\x42', | ||
'\x25', | ||
'\x00\x00\x00\x00', | ||
'\x18', | ||
'\x01\x28', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00\x00\x00\x00\x00', | ||
'\x00\x00', | ||
treeid, | ||
processid, | ||
userid, | ||
multiplex_id | ||
] | ||
|
||
tran_request = [ | ||
'\x10', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\xff\xff', | ||
'\xff\xff', | ||
'\x00', | ||
'\x00', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00', | ||
'\x00\x00', | ||
'\x00\x00', | ||
'\x4a\x00', | ||
'\x00\x00', | ||
'\x4a\x00', | ||
'\x02', | ||
'\x00', | ||
'\x23\x00', | ||
'\x00\x00', | ||
'\x07\x00', | ||
'\x5c\x50\x49\x50\x45\x5c\x00' | ||
] | ||
|
||
return generate_smb_proto_payload(netbios, smb_header, tran_request) | ||
|
||
|
||
def trans2_request(treeid, processid, userid, multiplex_id): | ||
"""Generate trans2 request. | ||
""" | ||
log.debug("generate tran2 request") | ||
netbios = [ | ||
'\x00', | ||
'\x00\x00\x4f' | ||
] | ||
|
||
smb_header = [ | ||
'\xFF\x53\x4D\x42', | ||
'\x32', | ||
'\x00\x00\x00\x00', | ||
'\x18', | ||
'\x07\xc0', | ||
'\x00\x00', | ||
'\x00\x00\x00\x00\x00\x00\x00\x00', | ||
'\x00\x00', | ||
treeid, | ||
processid, | ||
userid, | ||
multiplex_id | ||
] | ||
|
||
trans2_request = [ | ||
'\x0f', | ||
'\x0c\x00', | ||
'\x00\x00', | ||
'\x01\x00', | ||
'\x00\x00', | ||
'\x00', | ||
'\x00', | ||
'\x00\x00', | ||
'\xa6\xd9\xa4\x00', | ||
'\x00\x00', | ||
'\x0c\x00', | ||
'\x42\x00', | ||
'\x00\x00', | ||
'\x4e\x00', | ||
'\x01', | ||
'\x00', | ||
'\x0e\x00', | ||
'\x00\x00', | ||
'\x0c\x00' + '\x00' * 12 | ||
] | ||
|
||
return generate_smb_proto_payload(netbios, smb_header, trans2_request) | ||
|
||
def check(ip, port=445): | ||
"""Check if MS17_010 SMB Vulnerability exists. | ||
""" | ||
try: | ||
buffersize = 1024 | ||
timeout = 5.0 | ||
|
||
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | ||
client.settimeout(timeout) | ||
client.connect((ip, port)) | ||
|
||
raw_proto = negotiate_proto_request() | ||
client.send(raw_proto) | ||
tcp_response = client.recv(buffersize) | ||
|
||
raw_proto = session_setup_andx_request() | ||
client.send(raw_proto) | ||
tcp_response = client.recv(buffersize) | ||
netbios = tcp_response[:4] | ||
smb_header = tcp_response[4:36] | ||
smb = SMB_HEADER(smb_header) | ||
|
||
user_id = struct.pack('<H', smb.user_id) | ||
|
||
session_setup_andx_response = tcp_response[36:] | ||
native_os = session_setup_andx_response[9:].split('\x00')[0] | ||
|
||
raw_proto = tree_connect_andx_request(ip, user_id) | ||
client.send(raw_proto) | ||
tcp_response = client.recv(buffersize) | ||
|
||
netbios = tcp_response[:4] | ||
smb_header = tcp_response[4:36] | ||
smb = SMB_HEADER(smb_header) | ||
|
||
tree_id = struct.pack('<H', smb.tree_id) | ||
process_id = struct.pack('<H', smb.process_id) | ||
user_id = struct.pack('<H', smb.user_id) | ||
multiplex_id = struct.pack('<H', smb.multiplex_id) | ||
|
||
raw_proto = peeknamedpipe_request(tree_id, process_id, user_id, multiplex_id) | ||
client.send(raw_proto) | ||
tcp_response = client.recv(buffersize) | ||
|
||
netbios = tcp_response[:4] | ||
smb_header = tcp_response[4:36] | ||
smb = SMB_HEADER(smb_header) | ||
|
||
nt_status = struct.pack('BBH', smb.error_class, smb.reserved1, smb.error_code) | ||
|
||
|
||
if nt_status == '\x05\x02\x00\xc0': | ||
log.info("YEAH!! is VULNERABLE to MS17-010!!".format(ip, native_os)) | ||
|
||
|
||
raw_proto = trans2_request(tree_id, process_id, user_id, multiplex_id) | ||
client.send(raw_proto) | ||
tcp_response = client.recv(buffersize) | ||
|
||
netbios = tcp_response[:4] | ||
smb_header = tcp_response[4:36] | ||
smb = SMB_HEADER(smb_header) | ||
|
||
if smb.multiplex_id == 0x0051: | ||
key = calculate_doublepulsar_xor_key(smb.signature) | ||
log.info("Host is likely INFECTED with DoublePulsar! - XOR Key: {}".format(key)) | ||
|
||
elif nt_status in ('\x08\x00\x00\xc0', '\x22\x00\x00\xc0'): | ||
log.info("[-] [{}] does NOT appear vulnerable".format(ip)) | ||
else: | ||
log.info("[-] [{}] Unable to detect if this host is vulnerable".format(ip)) | ||
|
||
except Exception as err: | ||
log.error("[-] [{}] Exception: {}".format(ip, err)) | ||
finally: | ||
client.close() | ||
|
||
|
||
if __name__ == '__main__': | ||
import sys | ||
|
||
if len(sys.argv) != 2: | ||
print("{} <ip>".format(sys.argv[0])) | ||
sys.exit(1) | ||
else: | ||
check(sys.argv[1]) |
Oops, something went wrong.