id = "MSRPC: List of shares" description = [[ Attempts to list shares using the srvsvc.NetShareEnumAll() MSRPC function, then retrieve more information about each share using srvsvc.NetShareGetInfo(). Running NetShareEnumAll() will work anonymously on Windows 2000, and requires a user-level account on any other Windows version. Calling NetShareGetInfo() requires an administrator account on every version of Windows I tested. Although NetShareEnumAll() is restricted on certain systems, actually connecting to a share to check if it exists will always work. So, if NetShareEnumAll() fails, a list of common shares will be attempted. After a list of shares is found, whether or not it's complete, we attempt to connect to each of them anonymously, which lets us divide them into the classes "anonymous" and "restricted." When possible, once the list of shares is determined, NetShareGetInfo() is called to get additional information on the share. Odds are this will fail, unless we're doing an authenticated test. ]] --- --@usage -- nmap --script smb-enumshares.nse -p445 -- sudo nmap -sU -sS --script smb-enumshares.nse -p U:137,T:139 -- --@output -- Standard: -- | MSRPC: NetShareEnumAll(): -- | Anonymous shares: IPC$ -- |_ Restricted shares: F$, ADMIN$, C$ -- -- Verbose: -- Host script results: -- | MSRPC: NetShareEnumAll(): -- | Anonymous shares: -- | IPC$ -- | |_ Type: STYPE_IPC_HIDDEN -- | |_ Comment: Remote IPC -- | |_ Users: 1, Max: -- | |_ Path: -- | test -- | |_ Type: STYPE_DISKTREE -- | |_ Comment: This is a test share, with a maximum of 7 users -- | |_ Users: 0, Max: 7 -- | |_ Path: C:\Documents and Settings\Ron\Desktop\test -- | Restricted shares: -- | ADMIN$ -- | |_ Type: STYPE_DISKTREE_HIDDEN -- | |_ Comment: Remote Admin -- | |_ Users: 0, Max: -- | |_ Path: C:\WINNT -- | C$ -- | |_ Type: STYPE_DISKTREE_HIDDEN -- | |_ Comment: Default share -- | |_ Users: 0, Max: -- |_ |_ Path: C:\ -- --@args smbusername The SMB username to log in with. The forms "DOMAIN\username" and "username@DOMAIN" -- are not understood. To set a domain, use the smbdomain argument. --@args smbdomain The domain to log in with. If you aren't in a domained environment, then anything -- will (should?) be accepted by the server. --@args smbpassword The password to connect with. Be cautious with this, since some servers will lock -- accounts if the incorrect password is given. Although it's rare that the -- Administrator account can be locked out, in the off chance that it can, you could -- get yourself in trouble. --@args smbhash A password hash to use when logging in. This is given as a single hex string (32 -- characters) or a pair of hex strings (both 32 characters, optionally separated by a -- single character). These hashes are the LanMan or NTLM hash of the user's password, -- and are stored on disk or in memory. They can be retrieved from memory -- using the fgdump or pwdump tools. --@args smbguest If this is set to true or 1, a guest login will be attempted if the normal one -- fails. This should be harmless, but I thought I would disable it by default anyway -- because I'm not entirely sure of any possible consequences. --@args smbtype The type of SMB authentication to use. These are the possible options: -- * v1: Sends LMv1 and NTLMv1. -- * LMv1: Sends LMv1 only. -- * NTLMv1: Sends NTLMv1 only (default). -- * v2: Sends LMv2 and NTLMv2. -- * LMv2: Sends LMv2 only. -- The default, NTLMv1, is a pretty -- decent compromise between security and compatibility. If you are paranoid, you might -- want to use v2 or lmv2 for this. (Actually, if you're paranoid, you should be -- avoiding this protocol altogether :P). If you're using an extremely old system, you -- might need to set this to v1 or lm, which are less secure but more compatible. ----------------------------------------------------------------------- author = "Ron Bowes" copyright = "Ron Bowes" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery","intrusive"} require 'msrpc' require 'smb' require 'stdnse' hostrule = function(host) local port = smb.get_port(host) if(port == nil) then return false else return true end end ---Attempts to enumerate the shares on a remote system using MSRPC calls. This will likely fail -- against a modern system, but will succeed against Windows 2000. -- --@param host The host object. --@return Status (true or false). --@return List of shares (if status is true) or an an error string (if status is false). local function samr_enum_shares(host) local status, smbstate local bind_result, netshareenumall_result -- Create the SMB session status, smbstate = msrpc.start_smb(host, msrpc.SRVSVC_PATH) if(status == false) then return false, smbstate end -- Bind to SRVSVC service status, bind_result = msrpc.bind(smbstate, msrpc.SRVSVC_UUID, msrpc.SRVSVC_VERSION, nil) if(status == false) then smb.stop(smbstate) return false, bind_result end -- Call netsharenumall status, netshareenumall_result = msrpc.srvsvc_netshareenumall(smbstate, host.ip) if(status == false) then smb.stop(smbstate) return false, netshareenumall_result end -- Stop the SMB session smb.stop(smbstate) return true, netshareenumall_result['shares'] end ---Attempts to connect to a list of shares as the anonymous user, returning which ones -- it has and doesn't have access to. -- --@param host The host object. --@param shares An array of shares to check. --@return List of shares we're allowed to access. --@return List of shares that exist but are denied to us. function check_shares(host, shares) local smbstate local i local allowed_shares = {} local denied_shares = {} -- Begin the SMB session status, smbstate = smb.start(host) if(status == false) then return false, smbstate end -- Negotiate the protocol status, err = smb.negotiate_protocol(smbstate) if(status == false) then smb.stop(smbstate) return false, err end -- Start up a null session status, err = smb.start_session(smbstate, "", "", "", "", "LM") if(status == false) then smb.stop(smbstate) return false, err end -- Connect to the shares stdnse.print_debug(2, "EnumShares: Testing %d shares", #shares) for i = 1, #shares, 1 do -- Change the share to the '\\ip\share' format local share = string.format("\\\\%s\\%s", host.ip, shares[i]) -- Try connecting to the tree stdnse.print_debug(3, "EnumShares: Testing share %s", share) status, err = smb.tree_connect(smbstate, share) -- If it fails, checkwhy if(status == false) then -- If the result was ACCESS_DENIED, record it if(err == 0xc0000022 or err == 'NT_STATUS_ACCESS_DENIED') then stdnse.print_debug(3, "EnumShares: Access was denied") denied_shares[#denied_shares + 1] = shares[i] else stdnse.print_debug(3, "EnumShares: Share didn't pan out: %s", err) end else -- Add it to allowed shares stdnse.print_debug(3, "EnumShares: Access was granted") allowed_shares[#allowed_shares + 1] = shares[i] smb.tree_disconnect(smbstate) end end -- Log off the user smb.stop(smbstate) return true, allowed_shares, denied_shares end ---Attempts to retrieve additional information about a share. Will fail unless we have -- administrative access. -- --@param host The host object. --@return Status (true or false). --@return List of shares (if status is true) or an an error string (if status is false). local function get_share_info(host, name) local status, smbstate local response = {} -- Create the SMB session status, smbstate = msrpc.start_smb(host, msrpc.SRVSVC_PATH) if(status == false) then return false, smbstate end -- Bind to SRVSVC service status, bind_result = msrpc.bind(smbstate, msrpc.SRVSVC_UUID, msrpc.SRVSVC_VERSION, nil) if(status == false) then smb.stop(smbstate) return false, bind_result end -- Call NetShareGetInfo status, netsharegetinfo_result = msrpc.srvsvc_netsharegetinfo(smbstate, host.ip, name, 2) if(status == false) then smb.stop(smbstate) return false, netsharegetinfo_result end smb.stop(smbstate) return true, netsharegetinfo_result end action = function(host) local result, shared local response = " \n" local shares = {} local allowed, denied -- Try and do this the good way, make a MSRPC call to get the shares result, shares = samr_enum_shares(host) -- If that failed, try doing it with brute force. This almost certainly won't find everything, but it's the -- best we can do. if(result == false) then if(nmap.debugging() > 0) then response = response .. string.format("Couldn't enum all shares, checking for common ones (%s)\n", shares) end -- Take some common share names I've seen shares = {"IPC$", "ADMIN$", "TEST", "TEST$", "HOME", "HOME$"} -- Try every alphabetic share, with and without a trailing '$' for i = string.byte("A", 1), string.byte("Z", 1), 1 do shares[#shares + 1] = string.char(i) shares[#shares + 1] = string.char(i) .. "$" end end -- Break them into anonymous/authenticated shares status, allowed, denied = check_shares(host, shares) if(status == false) then if(nmap.debugging() > 0) then return "ERROR: " .. allowed else return nil end end if(result == false or nmap.verbosity() == 0) then return response .. string.format("Anonymous shares: %s\nRestricted shares: %s\n", stdnse.strjoin(", ", allowed), stdnse.strjoin(", ", denied)) else response = response .. string.format("Anonymous shares:\n") for i = 1, #allowed, 1 do local status, info = get_share_info(host, allowed[i]) response = response .. string.format(" %s\n", allowed[i]) if(status == false) then stdnse.print_debug(2, "Error getting information for share %s: %s", allowed[i], info) else if(info['max_users'] == 0xFFFFFFFF) then info['max_users'] = "" end response = response .. string.format(" |_ Type: %s\n", info['strtype']) response = response .. string.format(" |_ Comment: %s\n", info['comment']) response = response .. string.format(" |_ Users: %s, Max: %s\n", info['current_users'], info['max_users']) response = response .. string.format(" |_ Path: %s\n", info['path']) end end response = response .. string.format("Restricted shares:\n") for i = 1, #denied, 1 do local status, info = get_share_info(host, denied[i]) response = response .. string.format(" %s\n", denied[i]) if(status == false) then stdnse.print_debug(2, "Error getting information for share %s: %s", denied[i], info) else if(info['max_users'] == 0xFFFFFFFF) then info['max_users'] = "" end response = response .. string.format(" |_ Type: %s\n", info['strtype']) response = response .. string.format(" |_ Comment: %s\n", info['comment']) response = response .. string.format(" |_ Users: %s, Max: %s\n", info['current_users'], info['max_users']) response = response .. string.format(" |_ Path: %s\n", info['path']) end end return response end end