diff --git a/CHANGELOG b/CHANGELOG index 500f0192a..d774a93b9 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -1,5 +1,8 @@ # Nmap Changelog ($Id$); -*-text-*- +o [NSE] Added support for decoding EIGRP broadcasts from Cisco routers + to broadcast-listener. [Tom] + o [NSE] Added redirect support to the http library. All calls to http.get and http.head now transparently handle any HTTP redirects. [Patrik] diff --git a/nselib/data/packetdecoders.lua b/nselib/data/packetdecoders.lua index 98530769e..3439c5e67 100644 --- a/nselib/data/packetdecoders.lua +++ b/nselib/data/packetdecoders.lua @@ -1,507 +1,652 @@ ---- The following file contains a list of decoders used by the --- broadcast-listener script. A decoder can be either "ethernet" based or IP --- based. As we're only monitoring broadcast traffic (ie. traffic not --- explicitly addressed to us) we're mainly dealing with: --- o UDP broadcast or multicast traffic --- o ethernet broadcast traffic --- --- Hence, the Decoder table defines two sub tables ether and udp. --- In order to match an incoming UDP packet the destination port number is --- used, therefore each function is indexed based on their destination port --- for the udp based decoders. For the ether table each decoder function is --- indexed according to a pattern that the decoding engine attempts to match. --- --- Each decoder defines three functions: --- o new - creates a new instance of the decoder --- o process - process a packet passed through the --- data argument. --- o getResults - retrieve any discovered results --- --- The discovery engine creates an instance of each decoder once it's needed. --- Then discovery engine stores this instance in a decoder table for reference --- once the next packet of the same type comes in. This allows the engine to --- discard duplicate packets and to request the collected results at the end --- of the session. --- --- Currently, the packet decoder decodes the following protocols: --- o Ether --- x ARP requests (IPv4) --- x CDP - Cisco Discovery Protocol --- --- o UDP --- x DHCP --- x Netbios --- x SSDP --- x HSRP --- x DropBox --- x Logitech SqueezeBox Discovery --- x Multicast DNS/Bonjour/ZeroConf --- x Spotify --- --- --- @author "Patrik Karlsson " --- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html - --- Version 0.1 --- Created 07/25/2011 - v0.1 - created by Patrik Karlsson - -require 'target' - -Decoders = { - - ether = { - - -- ARP IPv4 - ['^00..08000604'] = { - - new = function(self) - local o = { dups = {} } - setmetatable(o, self) - self.__index = self - return o - end, - - process = function(self, data) - local ipOps = require("ipOps") - local pos, hw, proto, hwsize, protosize, opcode = bin.unpack(">SSCCS", data) - - -- this shouldn't ever happen, given our filter - if ( hwsize ~= 6 ) then return end - local sender, target = {}, {} - - -- if this isn't an ARP request, abort - if ( opcode ~= 1 ) then return end - - pos, sender.mac, - sender.ip, - target.mac, - target.ip = bin.unpack("CCS", data, 9) - if ( ver ~= 2 ) then return end - if ( not(self.results) ) then - self.results = tab.new(4) - tab.addrow( self.results, 'ip', 'id', 'platform', 'version' ) - end - - local result_part = {} - while ( pos < #data ) do - local typ, len, typdata - pos, typ, len = bin.unpack(">SS", data, pos) - pos, typdata = bin.unpack("A" .. len - 4, data, pos) - - -- Device ID - if ( typ == 1 ) then - result_part.id = typdata - -- Version - elseif ( typ == 5 ) then - result_part.version = typdata:match(", Version (.-),") - -- Platform - elseif ( typ == 6 ) then - result_part.platform = typdata - -- Address - elseif ( typ == 2 ) then - -- TODO: add more decoding here ... - local pos, count = bin.unpack(">I", typdata) - -- for i=1, count do - -- - -- end - - result_part.ip = '?' - end - end - - -- TODO: add code for dups check - if ( not(self.dups[result_part.ip]) ) then - self.dups[result_part.ip] = true - tab.addrow( self.results, result_part.ip, result_part.id, result_part.platform, result_part.version ) - end - end, - - getResults = function(self) return { name = "CDP", (self.results and tab.dump(self.results) or "") } end, - } - - }, - - udp = { - - -- DHCP - [68] = { - new = function(self) - local o = { dups = {} } - setmetatable(o, self) - self.__index = self - return o - end, - - getOption = function(options, name) - for _, v in ipairs(options) do - if ( v.name == name ) then - if ( type(v.value) == "table" ) then - return stdnse.strjoin(", ", v.value) - else - return v.value - end - end - end - end, - - process = function(self, layer3) - local dhcp = require("dhcp") - local p = packet.Packet:new( layer3, #layer3 ) - local data = layer3:sub(p.udp_offset + 9) - - -- the dhcp.parse function isn't optimal for doing - -- this, but it will do for now. First, we need to - -- extract the xid as the parse function checks that it - -- was the same as in the request, which we didn't do. - local pos, msgtype, _, _, _, xid = bin.unpack(" 0 ) then - name = dresp.questions[1].dname - elseif ( dresp.answers and #dresp.answers > 0 ) then - name = dresp.answers[1].dname - end - - if ( not(name) ) then return end - - if ( not(self.results) ) then - self.results = tab.new(2) - tab.addrow( self.results, 'ip', 'query' ) - end - - -- check for duplicates - if ( not(self.dups[("%s:%s"):format(p.ip_src, name)]) ) then - tab.addrow( self.results, p.ip_src, name ) - self.dups[("%s:%s"):format(p.ip_src, name)] = true - if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end - end - end, - - getResults = function(self) return { name = "MDNS", (self.results and tab.dump(self.results) or "") } end, - }, - - --- Spotify - [57621] = { - - new = function(self) - local o = { dups = {} } - setmetatable(o, self) - self.__index = self - return o - end, - - process = function(self, layer3) - local p = packet.Packet:new( layer3, #layer3 ) - local data = layer3:sub(p.udp_offset + 9) - - if ( data:match("^SpotUdp") ) then - if ( not(self.results) ) then - self.results = tab.new(1) - tab.addrow( self.results, 'ip' ) - end - - if ( not(self.dups[p.ip_src]) ) then - tab.addrow( self.results, p.ip_src ) - self.dups[p.ip_src] = true - if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end - end - end - - end, - - getResults = function(self) return { name = "Spotify", (self.results and tab.dump(self.results) or "") } end, - - } - - } +--- The following file contains a list of decoders used by the +-- broadcast-listener script. A decoder can be either "ethernet" based or IP +-- based. As we're only monitoring broadcast traffic (ie. traffic not +-- explicitly addressed to us) we're mainly dealing with: +-- o UDP broadcast or multicast traffic +-- o ethernet broadcast traffic +-- +-- Hence, the Decoder table defines two sub tables ether and udp. +-- In order to match an incoming UDP packet the destination port number is +-- used, therefore each function is indexed based on their destination port +-- for the udp based decoders. For the ether table each decoder function is +-- indexed according to a pattern that the decoding engine attempts to match. +-- +-- Each decoder defines three functions: +-- o new - creates a new instance of the decoder +-- o process - process a packet passed through the +-- data argument. +-- o getResults - retrieve any discovered results +-- +-- The discovery engine creates an instance of each decoder once it's needed. +-- Then discovery engine stores this instance in a decoder table for reference +-- once the next packet of the same type comes in. This allows the engine to +-- discard duplicate packets and to request the collected results at the end +-- of the session. +-- +-- Currently, the packet decoder decodes the following protocols: +-- o Ether +-- x ARP requests (IPv4) +-- x CDP - Cisco Discovery Protocol +-- x EIGRP - Cisco Enhanced Interior Gateway Routing Protocol +-- +-- o UDP +-- x DHCP +-- x Netbios +-- x SSDP +-- x HSRP +-- x DropBox +-- x Logitech SqueezeBox Discovery +-- x Multicast DNS/Bonjour/ZeroConf +-- x Spotify +-- +-- +-- @author "Patrik Karlsson " +-- @copyright Same as Nmap--See http://nmap.org/book/man-legal.html + +-- Version 0.2 +-- Created 07/25/2011 - v0.1 - created by Patrik Karlsson +-- 02/12/2012 - v.02 - added support for EIGRP - Tom Sellers + +require 'target' + +Decoders = { + + ether = { + + -- ARP IPv4 + ['^00..08000604'] = { + + new = function(self) + local o = { dups = {} } + setmetatable(o, self) + self.__index = self + return o + end, + + process = function(self, data) + local ipOps = require("ipOps") + local pos, hw, proto, hwsize, protosize, opcode = bin.unpack(">SSCCS", data) + + -- this shouldn't ever happen, given our filter + if ( hwsize ~= 6 ) then return end + local sender, target = {}, {} + + -- if this isn't an ARP request, abort + if ( opcode ~= 1 ) then return end + + pos, sender.mac, + sender.ip, + target.mac, + target.ip = bin.unpack("CCS", data, 9) + if ( ver ~= 2 ) then return end + if ( not(self.results) ) then + self.results = tab.new(4) + tab.addrow( self.results, 'ip', 'id', 'platform', 'version' ) + end + + local result_part = {} + while ( pos < #data ) do + local typ, len, typdata + pos, typ, len = bin.unpack(">SS", data, pos) + pos, typdata = bin.unpack("A" .. len - 4, data, pos) + + -- Device ID + if ( typ == 1 ) then + result_part.id = typdata + -- Version + elseif ( typ == 5 ) then + result_part.version = typdata:match(", Version (.-),") + -- Platform + elseif ( typ == 6 ) then + result_part.platform = typdata + -- Address + elseif ( typ == 2 ) then + -- TODO: add more decoding here ... + local pos, count = bin.unpack(">I", typdata) + -- for i=1, count do + -- + -- end + + result_part.ip = '?' + end + end + + -- TODO: add code for dups check + if ( not(self.dups[result_part.ip]) ) then + self.dups[result_part.ip] = true + tab.addrow( self.results, result_part.ip, result_part.id, result_part.platform, result_part.version ) + end + end, + + getResults = function(self) return { name = "CDP", (self.results and tab.dump(self.results) or "") } end, + }, + + + -- EIGRP Query & Update + ['020[13]....00000000'] = { + + new = function(self) + local o = { dups = {} } + setmetatable(o, self) + self.__index = self + return o + end, + + process = function(self, layer3) + + local p = packet.Packet:new( layer3, #layer3 ) + local data = layer3:sub(p.ip_data_offset + 1) + + -- Extract the EIGRP header + local pos, ver, opcode, checksum, flags, seq, ack, asnum = bin.unpack(">CCSiiii", data) + + local route_type, size, nexthop, delay, bandwidth, temp, mtu, orig_router, orig_as, arbtag + local hop_count, reliability, load, reserved, mask + local destination + + -- Iterate over the routes + while ( pos < #data ) do + -- Get the route type as the packet construction varies + pos,route_type = bin.unpack(">S", data, pos) + + if ( route_type == 258 ) then + route_type = 'internal' + pos, size, nexthop, delay, bandwidth, temp, mtu = bin.unpack(">SiiiCS", data, pos) + pos, hop_count, reliability, load, reserved, mask = bin.unpack(">CCCSC", data, pos) + + local oct1, oct2, oct3, oct4 = 0, 0, 0, 0 + -- unneeded address octets are left out of the packets, lets fill in the gaps + if ( size == 29 ) then + -- mask 25 or above + pos, oct1, oct2, oct3, oct4 = bin.unpack(">CCCC", data, pos) + elseif ( size == 28 ) then + pos, oct1, oct2, oct3 = bin.unpack(">CCC", data, pos) + elseif ( size == 27 ) then + pos, oct1, oct2 = bin.unpack(">CC", data, pos) + elseif ( size == 26 ) then + pos, oct1 = bin.unpack(">C", data, pos) + end + + destination = oct1 .. '.' .. oct2 .. '.' .. oct3 .. '.' .. oct4 .. "/" .. mask + orig_router = 'n/a' + elseif ( route_type == 259 ) then + -- external route, from a different routing protocol + pos, size, nexthop = bin.unpack(">Si", data, pos) + local orig_rtr_oct1, orig_rtr_oct2, orig_rtr_oct3, orig_rtr_oct4 + pos, orig_rtr_oct1, orig_rtr_oct2, orig_rtr_oct3, orig_rtr_oct4 = bin.unpack(">CCCC", data, pos) + orig_router = orig_rtr_oct1 .. '.' .. orig_rtr_oct2 .. '.' .. orig_rtr_oct3 .. '.' .. orig_rtr_oct4 + pos, orig_as, arbtag, ext_metric = bin.unpack(">iii", data, pos) + pos, reserved, ext_proto_id, flags, delay, bandwidth = bin.unpack(">SCCii", data, pos) + pos, temp, mtu, hop_count, reliability, load, reserved, mask = bin.unpack(">CSCCCSC", data, pos) + + local oct1, oct2, oct3, oct4 = 0, 0, 0, 0 + -- unneeded address octets are left out of the packets, lets fill in the gaps + if ( size == 49 ) then + -- mask 25 or above + pos, oct1, oct2, oct3, oct4 = bin.unpack(">CCCC", data, pos) + elseif ( size == 48 ) then + pos, oct1, oct2, oct3 = bin.unpack(">CCC", data, pos) + elseif ( size == 47 ) then + pos, oct1, oct2 = bin.unpack(">CC", data, pos) + elseif ( size == 46 ) then + pos, oct1 = bin.unpack(">C", data, pos) + end + + destination = oct1 .. '.' .. oct2 .. '.' .. oct3 .. '.' .. oct4 .. "/" .. mask + + local Proto_Types = { + [1] = 'external (IGRP)', + [2] = 'external (EIGRP)', + [3] = 'external (static)', + [4] = 'external (RIP)', + [6] = 'external (OSPF)', + [9] = 'external (RIP)' + } + + route_type = Proto_Types[ext_proto_id] + end + + if ( not(self.results) ) then + self.results = tab.new(9) + tab.addrow(self.results, 'sender ip', 'AS#', 'route type', 'destination', 'hop', 'bandwidth', 'delay', 'seq','orig router') + end + + + if (delay == -1) then delay = 'unreachable' end + + if ( not(self.dups[("%s:%s:s:%s"):format(p.ip_src,asnum,destination,seq)]) ) then + if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end + self.dups[("%s:%s:%s:%s"):format(p.ip_src,asnum,destination,seq)] = true + tab.addrow( self.results, p.ip_src, asnum, route_type, destination, hop_count, bandwidth, delay, seq, orig_router ) + end + end + end, + + getResults = function(self) return { name = "EIGRP Query", (self.results and tab.dump(self.results) or "") } end, + }, + + ['0205....00000000'] = { + + new = function(self) + local o = { dups = {} } + setmetatable(o, self) + self.__index = self + return o + end, + + process = function(self, layer3) + + local p = packet.Packet:new( layer3, #layer3 ) + local data = layer3:sub(p.ip_data_offset + 1) + + -- Extract the EIGRP header + local pos, ver, opcode, checksum, flags, seq, ack, asnum = bin.unpack(">CCSiiii", data) + + -- Skip the parameters for now. + pos = pos + 10 + + local holdtime, software, size, ios_major, ios_minor, eigrp_major, eigrp_minor + pos, holdtime, software, size, ios_major, ios_minor, eigrp_major, eigrp_minor = bin.unpack(">SSSCCCC", data, pos) + + if ( not(self.results) ) then + self.results = tab.new(5) + tab.addrow(self.results, 'sender ip', 'AS number', 'hold time', 'EIGRP version', 'IOS version') + end + + if ( not(self.dups[("%s:%s"):format(p.ip_src,asnum)]) ) then + if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end + self.dups[("%s:%s"):format(p.ip_src,asnum)] = true + tab.addrow( self.results, p.ip_src, asnum, holdtime, eigrp_major .. '.' .. eigrp_minor, ios_major .. '.' .. ios_minor ) + end + + end, + + getResults = function(self) return { name = "EIGRP Hello", (self.results and tab.dump(self.results) or "") } end, + }, + + }, + + udp = { + + -- DHCP + [68] = { + new = function(self) + local o = { dups = {} } + setmetatable(o, self) + self.__index = self + return o + end, + + getOption = function(options, name) + for _, v in ipairs(options) do + if ( v.name == name ) then + if ( type(v.value) == "table" ) then + return stdnse.strjoin(", ", v.value) + else + return v.value + end + end + end + end, + + process = function(self, layer3) + local dhcp = require("dhcp") + local p = packet.Packet:new( layer3, #layer3 ) + local data = layer3:sub(p.udp_offset + 9) + + -- the dhcp.parse function isn't optimal for doing + -- this, but it will do for now. First, we need to + -- extract the xid as the parse function checks that it + -- was the same as in the request, which we didn't do. + local pos, msgtype, _, _, _, xid = bin.unpack(" 0 ) then + name = dresp.questions[1].dname + elseif ( dresp.answers and #dresp.answers > 0 ) then + name = dresp.answers[1].dname + end + + if ( not(name) ) then return end + + if ( not(self.results) ) then + self.results = tab.new(2) + tab.addrow( self.results, 'ip', 'query' ) + end + + -- check for duplicates + if ( not(self.dups[("%s:%s"):format(p.ip_src, name)]) ) then + tab.addrow( self.results, p.ip_src, name ) + self.dups[("%s:%s"):format(p.ip_src, name)] = true + if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end + end + end, + + getResults = function(self) return { name = "MDNS", (self.results and tab.dump(self.results) or "") } end, + }, + + --- Spotify + [57621] = { + + new = function(self) + local o = { dups = {} } + setmetatable(o, self) + self.__index = self + return o + end, + + process = function(self, layer3) + local p = packet.Packet:new( layer3, #layer3 ) + local data = layer3:sub(p.udp_offset + 9) + + if ( data:match("^SpotUdp") ) then + if ( not(self.results) ) then + self.results = tab.new(1) + tab.addrow( self.results, 'ip' ) + end + + if ( not(self.dups[p.ip_src]) ) then + tab.addrow( self.results, p.ip_src ) + self.dups[p.ip_src] = true + if ( target.ALLOW_NEW_TARGETS ) then target.add(p.ip_src) end + end + end + + end, + + getResults = function(self) return { name = "Spotify", (self.results and tab.dump(self.results) or "") } end, + + } + + } } \ No newline at end of file diff --git a/scripts/broadcast-listener.nse b/scripts/broadcast-listener.nse index 27286dcf6..53eafcab0 100644 --- a/scripts/broadcast-listener.nse +++ b/scripts/broadcast-listener.nse @@ -134,8 +134,8 @@ sniffInterface = function(iface, Decoders, decodertab) -- default to 30 seconds, if nothing else was set timeout = timeout and (timeout * 1000) or (30 * 1000) - -- We wan't all packets that aren't explicitly for us - sock:pcap_open(iface.name, 1500, false, ("!host %s"):format(iface.address)) + -- We want all packets that aren't explicitly for us + sock:pcap_open(iface.name, 1500, true, ("!host %s"):format(iface.address)) -- Set a short timeout so that we can timeout in time if needed sock:set_timeout(100)