mirror of
https://github.com/nmap/nmap.git
synced 2025-12-18 13:39:02 +00:00
o [NSE] Added the script imap-brute that performs brute force password
auditing against IMAP servers. [Patrik] o [NSE] Updated IMAP library to support authentication using both plain-text and the SASL library. [Patrik]
This commit is contained in:
@@ -1,5 +1,11 @@
|
||||
# Nmap Changelog ($Id$); -*-text-*-
|
||||
|
||||
o [NSE] Added the script imap-brute that performs brute force password
|
||||
auditing against IMAP servers. [Patrik]
|
||||
|
||||
o [NSE] Updated IMAP library to support authentication using both plain-text
|
||||
and the SASL library. [Patrik]
|
||||
|
||||
o [NSE] Added SASL library created by Djalal Harouni and Patrik Karlsson
|
||||
providing common code for "Simple Authentication and Security Layer" to
|
||||
services supporting it. The algorithms supported by the library are:
|
||||
|
||||
280
nselib/imap.lua
280
nselib/imap.lua
@@ -1,47 +1,277 @@
|
||||
---
|
||||
-- IMAP functions.
|
||||
-- A library implementing a minor subset of the IMAP protocol, currently the
|
||||
-- CAPABILITY, LOGIN and AUTHENTICATE functions. The library was initially
|
||||
-- written by Brandon Enright and later extended and converted to OO-form by
|
||||
-- Patrik Karlsson <patrik@cqure.net>
|
||||
--
|
||||
-- The library consists of a <code>Helper</code>, class which is the main
|
||||
-- interface for script writers, and the <code>IMAP</code> class providing
|
||||
-- all protocol-level functionality.
|
||||
--
|
||||
-- The following example illustrates the reommended use of the library:
|
||||
-- <code>
|
||||
-- local helper = imap.Helper:new(host, port)
|
||||
-- helper:connect()
|
||||
-- helper:login("user","password","PLAIN")
|
||||
-- helper:close()
|
||||
-- </code>
|
||||
--
|
||||
-- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html
|
||||
-- @author = "Brandon Enright, Patrik Karlsson"
|
||||
|
||||
-- Version 0.2
|
||||
-- Revised 07/15/2011 - v0.2 - added the IMAP and Helper classes
|
||||
-- added support for LOGIN and AUTHENTICATE
|
||||
-- <patrik@cqure.net>
|
||||
|
||||
module(... or "imap", package.seeall)
|
||||
|
||||
require 'stdnse'
|
||||
require 'comm'
|
||||
require 'base64'
|
||||
require 'sasl'
|
||||
|
||||
IMAP = {
|
||||
|
||||
---
|
||||
-- Asks an IMAP server for capabilities.
|
||||
--- Creates a new instance of the IMAP class
|
||||
--
|
||||
-- See RFC 3501.
|
||||
-- @param host Host to be queried.
|
||||
-- @param port Port to connect to.
|
||||
-- @return Table containing capabilities or nil on error.
|
||||
-- @return nil or String error message.
|
||||
function capabilities(host, port)
|
||||
local socket = nmap.new_socket()
|
||||
-- @param host table as received by the script action method
|
||||
-- @param port table as received by the script action method
|
||||
-- @param options table containing options, currently
|
||||
-- <code>timeout<code> - number containing the seconds to wait for
|
||||
-- a response
|
||||
new = function(self, host, port, options)
|
||||
local o = {
|
||||
host = host,
|
||||
port = port,
|
||||
counter = 1,
|
||||
timeout = ( options and options.timeout ) or 10000
|
||||
}
|
||||
setmetatable(o, self)
|
||||
self.__index = self
|
||||
return o
|
||||
end,
|
||||
|
||||
--- Receives a response from the IMAP server
|
||||
--
|
||||
-- @return status true on success, false on failure
|
||||
-- @return data string containing the received data
|
||||
receive = function(self)
|
||||
local data = ""
|
||||
repeat
|
||||
local status, tmp = self.socket:receive_buf("\r\n", false)
|
||||
if( not(status) ) then return false, tmp end
|
||||
data = data .. tmp
|
||||
until( tmp:match(("^A%04d"):format(self.counter - 1)) or tmp:match("^%+"))
|
||||
|
||||
return true, data
|
||||
end,
|
||||
|
||||
--- Sends a request to the IMAP server
|
||||
--
|
||||
-- @param cmd string containing the command to send to the server eg.
|
||||
-- eg. (AUTHENTICATE, LOGIN)
|
||||
-- @param params string containing the command parameters
|
||||
-- @return true on success, false on failure
|
||||
-- @return err string containing the error if status was false
|
||||
send = function(self, cmd, params)
|
||||
local data
|
||||
if ( not(params) ) then
|
||||
data = ("A%04d %s\r\n"):format(self.counter, cmd)
|
||||
else
|
||||
data = ("A%04d %s %s\r\n"):format(self.counter, cmd, params)
|
||||
end
|
||||
local status, err = self.socket:send(data)
|
||||
if ( not(status) ) then return false, err end
|
||||
self.counter = self.counter + 1
|
||||
return true
|
||||
end,
|
||||
|
||||
--- Connect to the server
|
||||
--
|
||||
-- @return status true on success, false on failure
|
||||
-- @return banner string containing the server banner
|
||||
connect = function(self)
|
||||
local socket, banner, opt = comm.tryssl( self.host, self.port, "", { recv_before = true } )
|
||||
if ( not(socket) ) then return false, "ERROR: Failed to connect to server" end
|
||||
socket:set_timeout(self.timeout)
|
||||
if ( not(socket) or not(banner) ) then return false, "ERROR: Failed to connect to server" end
|
||||
self.socket = socket
|
||||
return true, banner
|
||||
end,
|
||||
|
||||
--- Authenticate to the server (non PLAIN text mode)
|
||||
-- Currently supported algorithms are CRAM-MD5 and CRAM-SHA1
|
||||
--
|
||||
-- @param username string containing the username
|
||||
-- @param pass string containing the password
|
||||
-- @param mech string containing a authentication mechanism, currently
|
||||
-- CRAM-MD5 or CRAM-SHA1
|
||||
-- @return status true if login was successful, false on failure
|
||||
-- @return err string containing the error message if status was false
|
||||
authenticate = function(self, username, pass, mech)
|
||||
assert( mech == "NTLM" or
|
||||
mech == "DIGEST-MD5" or
|
||||
mech == "CRAM-MD5" or
|
||||
mech == "PLAIN",
|
||||
"Unsupported authentication mechanism")
|
||||
|
||||
local status, err = self:send("AUTHENTICATE", mech)
|
||||
|
||||
if( not(status) ) then return false, "ERROR: Failed to send data" end
|
||||
|
||||
local status, data = self:receive()
|
||||
if( not(status) ) then return false, "ERROR: Failed to receive challenge" end
|
||||
|
||||
if ( mech == "NTLM" ) then
|
||||
-- sniffed of the wire, seems to always be the same
|
||||
-- decodes to some NTLMSSP blob greatness
|
||||
status, data = self.socket:send("TlRMTVNTUAABAAAAB7IIogYABgA3AAAADwAPACgAAAAFASgKAAAAD0FCVVNFLUFJUi5MT0NBTERPTUFJTg==\r\n")
|
||||
if ( not(status) ) then return false, "ERROR: Failed to send NTLM packet" end
|
||||
status, data = self:receive()
|
||||
if ( not(status) ) then return false, "ERROR: Failed to receieve NTLM challenge" end
|
||||
end
|
||||
|
||||
if ( data:match(("^A%04d "):format(self.counter-1)) ) then
|
||||
return false, "ERROR: Authentication mechanism not supported"
|
||||
end
|
||||
|
||||
local digest, auth_data
|
||||
if ( not(data:match("^+")) ) then
|
||||
return false, "ERROR: Failed to receive proper response from server"
|
||||
end
|
||||
data = base64.dec(data:match("^+ (.*)"))
|
||||
|
||||
-- All mechanisms expect username and pass
|
||||
-- add the otheronce for those who need them
|
||||
local mech_params = { username, pass, data, "imap" }
|
||||
auth_data = sasl.Helper:new(mech):encode(unpack(mech_params))
|
||||
auth_data = base64.enc(auth_data) .. "\r\n"
|
||||
|
||||
status, data = self.socket:send(auth_data)
|
||||
if( not(status) ) then return false, "ERROR: Failed to send data" end
|
||||
|
||||
status, data = self:receive()
|
||||
if( not(status) ) then return false, "ERROR: Failed to receive data" end
|
||||
|
||||
if ( mech == "DIGEST-MD5" ) then
|
||||
local rspauth = data:match("^+ (.*)")
|
||||
if ( rspauth ) then
|
||||
rspauth = base64.dec(rspauth)
|
||||
status, data = self.socket:send("\r\n")
|
||||
status, data = self:receive()
|
||||
end
|
||||
end
|
||||
if ( data:match(("^A%04d OK"):format(self.counter - 1)) ) then
|
||||
return true
|
||||
end
|
||||
return false, "Login failed"
|
||||
end,
|
||||
|
||||
--- Login to the server using PLAIN text authentication
|
||||
--
|
||||
-- @param username string containing the username
|
||||
-- @param password string containing the password
|
||||
-- @return status true on success, false on failure
|
||||
-- @return err string containing the error message if status was false
|
||||
login = function(self, username, password)
|
||||
local status, err = self:send("LOGIN", ("\"%s\" \"%s\""):format(username, password))
|
||||
if( not(status) ) then return false, "ERROR: Failed to send data" end
|
||||
|
||||
local status, data = self:receive()
|
||||
if( not(status) ) then return false, "ERROR: Failed to receive data" end
|
||||
|
||||
if ( data:match(("^A%04d OK"):format(self.counter - 1)) ) then
|
||||
return true
|
||||
end
|
||||
return false, "Login failed"
|
||||
end,
|
||||
|
||||
--- Retrieves a list of server capabilities (eg. supported authentication
|
||||
-- mechanisms, QUOTA, UIDPLUS, ACL ...)
|
||||
--
|
||||
-- @return status true on success, false on failure
|
||||
-- @return capas array containing the capabilities that are supported
|
||||
capabilities = function(self)
|
||||
local capas = {}
|
||||
socket:set_timeout(10000)
|
||||
local proto = (port.version and port.version.service_tunnel == "ssl" and "ssl") or "tcp"
|
||||
if not socket:connect(host, port, proto) then return nil, "Could Not Connect" end
|
||||
local proto = (self.port.version and self.port.version.service_tunnel == "ssl" and "ssl") or "tcp"
|
||||
local status, err = self:send("CAPABILITY")
|
||||
if( not(status) ) then return false, err end
|
||||
|
||||
local status, line = socket:receive_lines(1)
|
||||
if not string.match(line, "^[%*] OK") then return nil, "No Response" end
|
||||
|
||||
socket:send("a001 CAPABILITY\r\n")
|
||||
status, line = socket:receive_buf("\r\n", false)
|
||||
if not status then
|
||||
local status, line = self:receive()
|
||||
if (not(status)) then
|
||||
capas.CAPABILITY = false
|
||||
else
|
||||
while status do
|
||||
if string.match(line, "^%*%s+CAPABILITY") then
|
||||
line = string.gsub(line, "^%*%s+CAPABILITY", "")
|
||||
for capability in string.gmatch(line, "[%w%+=-]+") do
|
||||
if ( line:match("^%*%s+CAPABILITY") ) then
|
||||
line = line:gsub("^%*%s+CAPABILITY", "")
|
||||
for capability in line:gmatch("[%w%+=-]+") do
|
||||
capas[capability] = true
|
||||
end
|
||||
break
|
||||
end
|
||||
status, line = socket:receive_buf("\r\n", false)
|
||||
status, line = self.socket:receive()
|
||||
end
|
||||
end
|
||||
socket:close()
|
||||
return capas
|
||||
return true, capas
|
||||
end,
|
||||
|
||||
--- Closes the connection to the IMAP server
|
||||
-- @return true on success, false on failure
|
||||
close = function(self) return self.socket:close() end
|
||||
|
||||
}
|
||||
|
||||
|
||||
-- The helper class, that servers as interface to script writers
|
||||
Helper = {
|
||||
|
||||
-- @param host table as received by the script action method
|
||||
-- @param port table as received by the script action method
|
||||
-- @param options table containing options, currently
|
||||
-- <code>timeout<code> - number containing the seconds to wait for
|
||||
-- a response
|
||||
new = function(self, host, port, options)
|
||||
local o = { client = IMAP:new( host, port, options ) }
|
||||
setmetatable(o, self)
|
||||
self.__index = self
|
||||
return o
|
||||
end,
|
||||
|
||||
--- Connects to the IMAP server
|
||||
-- @return status true on success, false on failure
|
||||
connect = function(self)
|
||||
return self.client:connect()
|
||||
end,
|
||||
|
||||
--- Login to the server using eithe plain-text or using the authentication
|
||||
-- mechanism provided in the mech argument.
|
||||
--
|
||||
-- @param username string containing the username
|
||||
-- @param password string containing the password
|
||||
-- @param mech [optional] containing the authentication mechanism to use
|
||||
-- @return status true on success, false on failure
|
||||
login = function(self, username, password, mech)
|
||||
if ( not(mech) or mech == "LOGIN" ) then
|
||||
return self.client:login(username, password)
|
||||
else
|
||||
return self.client:authenticate(username, password, mech)
|
||||
end
|
||||
end,
|
||||
|
||||
--- Retrieves a list of server capabilities (eg. supported authentication
|
||||
-- mechanisms, QUOTA, UIDPLUS, ACL ...)
|
||||
--
|
||||
-- @return status true on success, false on failure
|
||||
-- @return capas array containing the capabilities that are supported
|
||||
capabilities = function(self)
|
||||
return self.client:capabilities()
|
||||
end,
|
||||
|
||||
--- Closes the connection to the IMAP server
|
||||
-- @return true on success, false on failure
|
||||
close = function(self)
|
||||
return self.client:close()
|
||||
end,
|
||||
|
||||
}
|
||||
|
||||
@@ -24,7 +24,14 @@ require 'stdnse'
|
||||
portrule = shortport.port_or_service({143}, "imap")
|
||||
|
||||
action = function(host, port)
|
||||
local capa, err = imap.capabilities(host, port)
|
||||
local helper = imap.Helper:new(host, port)
|
||||
local status = helper:connect()
|
||||
if ( not(status) ) then return "\n ERROR: Failed to connect to server" end
|
||||
|
||||
local status, capa = helper:capabilities(host, port)
|
||||
if( not(status) ) then return "\n ERROR: Failed to retrieve capabilities" end
|
||||
helper:close()
|
||||
|
||||
if type(capa) == "table" then
|
||||
-- Convert the capabilities table into an array of strings.
|
||||
local capstrings = {}
|
||||
|
||||
@@ -92,6 +92,7 @@ Entry { filename = "http-vhosts.nse", categories = { "discovery", "intrusive", }
|
||||
Entry { filename = "http-vmware-path-vuln.nse", categories = { "default", "safe", "vuln", } }
|
||||
Entry { filename = "http-wp-plugins.nse", categories = { "discovery", "intrusive", } }
|
||||
Entry { filename = "iax2-version.nse", categories = { "version", } }
|
||||
Entry { filename = "imap-brute.nse", categories = { "brute", "intrusive", } }
|
||||
Entry { filename = "imap-capabilities.nse", categories = { "default", "safe", } }
|
||||
Entry { filename = "informix-brute.nse", categories = { "auth", "intrusive", } }
|
||||
Entry { filename = "informix-query.nse", categories = { "auth", "intrusive", } }
|
||||
|
||||
Reference in New Issue
Block a user