diff --git a/scripts/quake3-master-getservers.nse b/scripts/quake3-master-getservers.nse new file mode 100644 index 000000000..c7cfe3053 --- /dev/null +++ b/scripts/quake3-master-getservers.nse @@ -0,0 +1,209 @@ +description = [[ +Queries Quake 3 styled master servers for game servers. +]] + +--- +-- @output +-- PORT STATE SERVICE REASON +-- 27950/udp open quake3-master +-- | quake3-master-getservers: +-- | 192.0.2.22:26002 Xonotic (Xonotic 3) +-- | 203.0.113.37:26000 Nexuiz (Nexuiz 3) +-- |_ Only 2 shown. Use --script-args quake3-master-getservers.outputlimit=-1 to see all. +-- +-- @args quake3-master-getservers.outputlimit If set, limits the amount of +-- hosts returned by the script. All discovered hosts are still +-- stored in the registry for other scripts to use. If set to 0 or +-- less, all files are shown. The default value is 10. + +author = "Toni Ruottu" +license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +categories = {"default", "discovery", "safe"} +require "datafiles" +require "shortport" +require "bin" + +portrule = shortport.port_or_service ({20110, 20510, 27950, 30710}, "quake3-master", {"udp"}) + +-- There are various sources for this information. These include: +-- - http://svn.icculus.org/twilight/trunk/dpmaster/readme.txt?view=markup +-- - http://openarena.wikia.com/wiki/Changes +-- - http://dpmaster.deathmask.net/ +-- - qstat-2.11, qstat.cfg +-- - scanning master servers +-- - looking at game traffic with Wireshark +local KNOWN_PROTOCOLS = { + ["5"] = "Call of Duty", + ["10"] = "unknown", + ["43"] = "unknown", + ["48"] = "unknown", + ["50"] = "Return to Castle Wolfenstein", + ["57"] = "unknown", + ["59"] = "Return to Castle Wolfenstein", + ["60"] = "Return to Castle Wolfenstein", + ["66"] = "Quake III Arena", + ["67"] = "Quake III Arena", + ["68"] = "Quake III Arena, or Urban Terror", + ["69"] = "OpenArena, or Tremulous", + ["70"] = "unknown", + ["71"] = "OpenArena", + ["72"] = "Wolfenstein: Enemy Territory", + ["80"] = "Wolfenstein: Enemy Territory", + ["83"] = "Wolfenstein: Enemy Territory", + ["84"] = "Wolfenstein: Enemy Territory", + ["2003"] = "Soldier of Fortune II: Double Helix", + ["2004"] = "Soldier of Fortune II: Double Helix", + ["DarkPlaces-Quake 3"] = "DarkPlaces Quake", + ["Nexuiz 3"] = "Nexuiz", + ["Transfusion 3"] = "Transfusion", + ["Warsow 8"] = "Warsow", + ["Xonotic 3"] = "Xonotic", +} + +local function getservers(host, port, q3protocol) + local socket = nmap.new_socket() + socket:set_timeout(10000) + local status, err = socket:connect(host.ip, port.number, "udp") + if not status then + return {} + end + local probe = bin.pack("CCCCA", 0xff, 0xff, 0xff, 0xff, string.format("getservers %s empty full\n", q3protocol)) + socket:send(probe) + + status, data = socket:receive() -- get some data + if not status then + return {} + end + nmap.set_port_state(host, port, "open") + + local magic = bin.pack("CCCCA", 0xff, 0xff, 0xff, 0xff, "getserversResponse") + while #data < #magic do -- get header + status, tmp = socket:receive() + if status then + data = data .. tmp + end + end + if string.sub(data, 1, #magic) ~= magic then -- no match + return {} + end + + port.version.name = "quake3-master" + nmap.set_port_version(host, port, "hardmatched") + + local EOT = bin.pack("ACCC", "EOT", 0, 0, 0) + local pieces = stdnse.strsplit("\\", data) + while pieces[#pieces] ~= EOT do -- get all data + status, tmp = socket:receive() + if status then + data = data .. tmp + pieces = stdnse.strsplit("\\", data) + end + end + + table.remove(pieces, 1) --remove magic + table.remove(pieces, #pieces) --remove EOT + + local servers = {} + for _, value in ipairs(pieces) do + parts = {bin.unpack("CCCC>S", value)} + if #parts > 5 then + local o1 = parts[2] + local o2 = parts[3] + local o3 = parts[4] + local o4 = parts[5] + local p = parts[6] + table.insert(servers, {string.format("%d.%d.%d.%d", o1, o2, o3, o4), p}) + end + end + socket:close() + return servers +end + +local function formatresult(servers, outputlimit, protocols) + math.randomseed(os.time()) + randomized = {} + while #servers > 0 do + local x = table.remove(servers, math.random(1, #servers)) + table.insert(randomized, x) + end + if not outputlimit then + outputlimit = #randomized + end + local formatted = {} + for i = 1, outputlimit do + if not randomized[i] then + break + end + local node = randomized[i] + local protocol = node.protocol + local ip = node.ip + local portnum = node.port + table.insert(formatted, string.format('%s:%d %s (%s)', ip, portnum, protocols[protocol], protocol)) + end + if #formatted < #randomized then + table.insert(formatted, string.format('Only %d shown. Use --script-args %s.outputlimit=-1 to see all.', outputlimit, SCRIPT_NAME)) + end + return formatted +end + +local function dropdupes(tables, stringify) + local unique = {} + local dupe = {} + for _, v in ipairs(tables) do + s = stringify(v) + if not dupe[s] then + table.insert(unique, v) + dupe[s] = true + end + end + return unique +end + +local function scan(host, port, protocols) + local discovered = {} + for protocol, _ in pairs(protocols) do + for _, node in ipairs(getservers(host, port, protocol)) do + local entry = { + protocol = protocol, + ip = node[1], + port = node[2], + masterip = host.ip, + masterport = port.number + } + table.insert(discovered, entry) + end + end + return discovered +end + +local function store(servers) + if not nmap.registry.q3m_servers then + nmap.registry.q3m_servers = {} + end + for _, server in ipairs(servers) do + table.insert(nmap.registry.q3m_servers, server) + end +end + +action = function(host, port) + local outputlimit = nmap.registry.args[SCRIPT_NAME .. ".outputlimit"] + if not outputlimit then + outputlimit = 10 + else + outputlimit = tonumber(outputlimit) + end + if outputlimit < 1 then + outputlimit = nil + end + local servers = scan(host, port, KNOWN_PROTOCOLS) + store(servers) + local unique = dropdupes(servers, function(t) return string.format("%s: %s:%d", t.protocol, t.ip, t.port) end) + local formatted = formatresult(unique, outputlimit, KNOWN_PROTOCOLS) + if #formatted < 1 then + return + end + local response = {} + table.insert(response, formatted) + return stdnse.format_output(true, response) +end + diff --git a/scripts/script.db b/scripts/script.db index dc0220acf..460019f0b 100644 --- a/scripts/script.db +++ b/scripts/script.db @@ -122,6 +122,7 @@ Entry { filename = "pop3-brute.nse", categories = { "auth", "intrusive", } } Entry { filename = "pop3-capabilities.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "pptp-version.nse", categories = { "version", } } Entry { filename = "qscan.nse", categories = { "discovery", "safe", } } +Entry { filename = "quake3-master-getservers.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "realvnc-auth-bypass.nse", categories = { "auth", "default", "safe", "vuln", } } Entry { filename = "resolveall.nse", categories = { "discovery", "safe", } } Entry { filename = "rmi-dumpregistry.nse", categories = { "default", "discovery", "safe", } }