mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Clean up some typos and differences. Most have been normalized to whatever form of the name occurred in the largest number of scripts. Paulino was contacted directly and requested his email be added to all of his credits.
313 lines
12 KiB
Lua
313 lines
12 KiB
Lua
local _G = require "_G"
|
|
local creds = require "creds"
|
|
local http = require "http"
|
|
local nmap = require "nmap"
|
|
local shortport = require "shortport"
|
|
local stdnse = require "stdnse"
|
|
local string = require "string"
|
|
local table = require "table"
|
|
|
|
description = [[
|
|
Tests for access with default credentials used by a variety of web applications and devices.
|
|
|
|
It works similar to http-enum, we detect applications by matching known paths and launching a login routine using default credentials when found.
|
|
This script depends on a fingerprint file containing the target's information: name, category, location paths, default credentials and login routine.
|
|
|
|
You may select a category if you wish to reduce the number of requests. We have categories like:
|
|
* <code>web</code> - Web applications
|
|
* <code>routers</code> - Routers
|
|
* <code>voip</code> - VOIP devices
|
|
* <code>security</code>
|
|
|
|
Please help improve this script by adding new entries to nselib/data/http-default-accounts.lua
|
|
|
|
Remember each fingerprint must have:
|
|
* <code>name</code> - Descriptive name
|
|
* <code>category</code> - Category
|
|
* <code>login_combos</code> - Table of login combinations
|
|
* <code>paths</code> - Paths table containing the possible location of the target
|
|
* <code>login_check</code> - Login function of the target
|
|
|
|
In addition, a fingerprint may have:
|
|
* <code>target_check</code> - Target validation function. If defined, it will be
|
|
called to validate the target before attempting
|
|
any logins.
|
|
|
|
Default fingerprint file: /nselib/data/http-default-accounts-fingerprints.lua
|
|
This script was based on http-enum.
|
|
]]
|
|
|
|
---
|
|
-- @usage
|
|
-- nmap -p80 --script http-default-accounts host/ip
|
|
-- @output
|
|
-- PORT STATE SERVICE REASON
|
|
-- 80/tcp open http syn-ack
|
|
-- |_http-default-accounts: [Cacti] credentials found -> admin:admin Path:/cacti/
|
|
-- Final times for host: srtt: 94615 rttvar: 71012 to: 378663
|
|
--
|
|
-- @args http-default-accounts.basepath Base path to append to requests. Default: "/"
|
|
-- @args http-default-accounts.fingerprintfile Fingerprint filename. Default:http-default-accounts-fingerprints.lua
|
|
-- @args http-default-accounts.category Selects a category of fingerprints to use.
|
|
--
|
|
-- Other useful arguments relevant to this script:
|
|
-- http.pipeline Sets max number of petitions in the same request.
|
|
-- http.useragent User agent for HTTP requests
|
|
--
|
|
-- Revision History
|
|
-- 2013-08-13 nnposter
|
|
-- * added support for target_check()
|
|
---
|
|
|
|
author = "Paulino Calderon <calderon@websec.mx>"
|
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
|
categories = {"discovery", "auth", "safe"}
|
|
|
|
portrule = shortport.http
|
|
|
|
---
|
|
--validate_fingerprints(fingerprints)
|
|
--Returns an error string if there is something wrong with
|
|
--fingerprint table.
|
|
--Modified's version of http-enums validation code
|
|
--@param fingerprints Fingerprint table
|
|
--@return Error string if its an invalid fingerprint table
|
|
---
|
|
local function validate_fingerprints(fingerprints)
|
|
|
|
for i, fingerprint in pairs(fingerprints) do
|
|
if(type(i) ~= 'number') then
|
|
return "The 'fingerprints' table is an array, not a table; all indexes should be numeric"
|
|
end
|
|
-- Validate paths
|
|
if(not(fingerprint.paths) or
|
|
(type(fingerprint.paths) ~= 'table' and type(fingerprint.paths) ~= 'string') or
|
|
(type(fingerprint.paths) == 'table' and #fingerprint.paths == 0)) then
|
|
return "Invalid path found in fingerprint entry #" .. i
|
|
end
|
|
if(type(fingerprint.paths) == 'string') then
|
|
fingerprint.paths = {fingerprint.paths}
|
|
end
|
|
for i, path in pairs(fingerprint.paths) do
|
|
-- Validate index
|
|
if(type(i) ~= 'number') then
|
|
return "The 'paths' table is an array, not a table; all indexes should be numeric"
|
|
end
|
|
-- Convert the path to a table if it's a string
|
|
if(type(path) == 'string') then
|
|
fingerprint.paths[i] = {path=fingerprint.paths[i]}
|
|
path = fingerprint.paths[i]
|
|
end
|
|
-- Make sure the paths table has a 'path'
|
|
if(not(path['path'])) then
|
|
return "The 'paths' table requires each element to have a 'path'."
|
|
end
|
|
end
|
|
-- Check login combos
|
|
for i, combo in pairs(fingerprint.login_combos) do
|
|
-- Validate index
|
|
if(type(i) ~= 'number') then
|
|
return "The 'login_combos' table is an array, not a table; all indexes should be numeric"
|
|
end
|
|
-- Make sure the login_combos table has at least one login combo
|
|
if(not(combo['username']) or not(combo["password"])) then
|
|
return "The 'login_combos' table requires each element to have a 'username' and 'password'."
|
|
end
|
|
end
|
|
|
|
-- Make sure they include the login function
|
|
if(type(fingerprint.login_check) ~= "function") then
|
|
return "Missing or invalid login_check function in entry #"..i
|
|
end
|
|
-- Make sure that the target validation is a function
|
|
if(fingerprint.target_check and type(fingerprint.target_check) ~= "function") then
|
|
return "Invalid target_check function in entry #"..i
|
|
end
|
|
-- Are they missing any fields?
|
|
if(fingerprint.category and type(fingerprint.category) ~= "string") then
|
|
return "Missing or invalid category in entry #"..i
|
|
end
|
|
if(fingerprint.name and type(fingerprint.name) ~= "string") then
|
|
return "Missing or invalid name in entry #"..i
|
|
end
|
|
end
|
|
end
|
|
|
|
---
|
|
-- load_fingerprints(filename, category)
|
|
-- Loads data from file and returns table of fingerprints if sanity checks are passed
|
|
-- Based on http-enum's load_fingerprints()
|
|
-- @param filename Fingerprint filename
|
|
-- @param cat Category of fingerprints to use
|
|
-- @return Table of fingerprints
|
|
---
|
|
local function load_fingerprints(filename, cat)
|
|
local file, filename_full, fingerprints
|
|
|
|
-- Check if fingerprints are cached
|
|
if(nmap.registry.http_default_accounts_fingerprints ~= nil) then
|
|
stdnse.print_debug(1, "%s: Loading cached fingerprints", SCRIPT_NAME)
|
|
return nmap.registry.http_default_accounts_fingerprints
|
|
end
|
|
|
|
-- Try and find the file
|
|
-- If it isn't in Nmap's directories, take it as a direct path
|
|
filename_full = nmap.fetchfile('nselib/data/' .. filename)
|
|
if(not(filename_full)) then
|
|
filename_full = filename
|
|
end
|
|
|
|
-- Load the file
|
|
stdnse.print_debug(1, "%s: Loading fingerprints: %s", SCRIPT_NAME, filename_full)
|
|
local env = setmetatable({fingerprints = {}}, {__index = _G});
|
|
file = loadfile(filename_full, "t", env)
|
|
if( not(file) ) then
|
|
stdnse.print_debug(1, "%s: Couldn't load the file: %s", SCRIPT_NAME, filename_full)
|
|
return false, "Couldn't load fingerprint file: " .. filename_full
|
|
end
|
|
file()
|
|
fingerprints = env.fingerprints
|
|
|
|
-- Validate fingerprints
|
|
local valid_flag = validate_fingerprints(fingerprints)
|
|
if type(valid_flag) == "string" then
|
|
return false, valid_flag
|
|
end
|
|
|
|
-- Category filter
|
|
if ( cat ) then
|
|
local filtered_fingerprints = {}
|
|
for _, fingerprint in pairs(fingerprints) do
|
|
if(fingerprint.category == cat) then
|
|
table.insert(filtered_fingerprints, fingerprint)
|
|
end
|
|
end
|
|
fingerprints = filtered_fingerprints
|
|
end
|
|
|
|
-- Check there are fingerprints to use
|
|
if(#fingerprints == 0 ) then
|
|
return false, "No fingerprints were loaded after processing ".. filename
|
|
end
|
|
|
|
return true, fingerprints
|
|
end
|
|
|
|
---
|
|
-- format_basepath(basepath)
|
|
-- Modifies a given path so that it can be later prepended to another absolute
|
|
-- path to form a new absolute path.
|
|
-- @param basepath Basepath string
|
|
-- @return Basepath string with a leading slash and no trailing slashes.
|
|
-- (Empty string is returned if the input is an empty string
|
|
-- or "/".)
|
|
---
|
|
local function format_basepath(basepath)
|
|
if basepath:sub(1,1) ~= "/" then
|
|
basepath = "/" .. basepath
|
|
end
|
|
return basepath:gsub("/+$","")
|
|
end
|
|
|
|
---
|
|
-- register_http_credentials(username, password)
|
|
-- Stores HTTP credentials in the registry. If the registry entry hasn't been
|
|
-- initiated, it will create it and store the credentials.
|
|
-- @param login_username Username
|
|
-- @param login_password Password
|
|
---
|
|
local function register_http_credentials(host, port, login_username, login_password)
|
|
local c = creds.Credentials:new( SCRIPT_NAME, host, port )
|
|
c:add(login_username, login_password, creds.State.VALID )
|
|
end
|
|
|
|
---
|
|
-- MAIN
|
|
-- Here we iterate through the paths to try to find a target. When a target is found
|
|
-- the login routine is initialized to check for default credentials authentication
|
|
---
|
|
action = function(host, port)
|
|
local fingerprintload_status, status, fingerprints, requests, results
|
|
local fingerprint_filename = stdnse.get_script_args("http-default-accounts.fingerprintfile") or "http-default-accounts-fingerprints.lua"
|
|
local category = stdnse.get_script_args("http-default-accounts.category") or false
|
|
local basepath = stdnse.get_script_args("http-default-accounts.basepath") or "/"
|
|
local output_lns = {}
|
|
|
|
-- Identify servers that answer 200 to invalid HTTP requests and exit as these would invalidate the tests
|
|
local _, http_status, _ = http.identify_404(host,port)
|
|
if ( http_status == 200 ) then
|
|
stdnse.print_debug(1, "%s: Exiting due to ambiguous response from web server on %s:%s. All URIs return status 200.", SCRIPT_NAME, host.ip, port.number)
|
|
return false
|
|
end
|
|
|
|
--Load fingerprint data or abort
|
|
status, fingerprints = load_fingerprints(fingerprint_filename, category)
|
|
if(not(status)) then
|
|
return stdnse.format_output(false, fingerprints)
|
|
end
|
|
stdnse.print_debug(1, "%s: %d fingerprints were loaded", SCRIPT_NAME, #fingerprints)
|
|
|
|
--Format basepath: Removes or adds slashs
|
|
basepath = format_basepath(basepath)
|
|
|
|
-- Add requests to the http pipeline
|
|
requests = {}
|
|
stdnse.print_debug(1, "%s: Trying known locations under path '%s' (change with '%s.basepath' argument)", SCRIPT_NAME, basepath, SCRIPT_NAME)
|
|
for i = 1, #fingerprints, 1 do
|
|
for j = 1, #fingerprints[i].paths, 1 do
|
|
requests = http.pipeline_add(basepath .. fingerprints[i].paths[j].path, nil, requests, 'GET')
|
|
end
|
|
end
|
|
|
|
-- Nuclear launch detected!
|
|
results = http.pipeline_go(host, port, requests, nil)
|
|
if results == nil then
|
|
return "[ERROR] HTTP request table is empty. This should not happen since we at least made one request."
|
|
end
|
|
|
|
-- Record 404 response, later it will be used to determine if page exists
|
|
local result, result_404, known_404 = http.identify_404(host, port)
|
|
if(result == false) then
|
|
return stdnse.format_output(false, result_404)
|
|
end
|
|
|
|
-- Iterate through responses to find a candidate for login routine
|
|
local j = 1
|
|
|
|
for i, fingerprint in ipairs(fingerprints) do
|
|
local credentials_found = false
|
|
stdnse.print_debug(1, "%s: Processing %s", SCRIPT_NAME, fingerprint.name)
|
|
for _, probe in ipairs(fingerprint.paths) do
|
|
|
|
if (results[j] and not(credentials_found)) then
|
|
local path = basepath .. probe['path']
|
|
|
|
if http.page_exists(results[j], result_404, known_404, path, true)
|
|
and (not fingerprint.target_check
|
|
or fingerprint.target_check(host, port, path, results[j]))
|
|
then
|
|
for _, login_combo in ipairs(fingerprint.login_combos) do
|
|
stdnse.print_debug(2, "%s: Trying login combo -> %s:%s", SCRIPT_NAME, login_combo["username"], login_combo["password"])
|
|
--Check default credentials
|
|
if( fingerprint.login_check(host, port, path, login_combo["username"], login_combo["password"]) ) then
|
|
|
|
--Valid credentials found
|
|
stdnse.print_debug(1, "%s:[%s] valid default credentials found.", SCRIPT_NAME, fingerprint.name)
|
|
output_lns[#output_lns + 1] = string.format("[%s] credentials found -> %s:%s Path:%s",
|
|
fingerprint.name, login_combo["username"], login_combo["password"], path)
|
|
-- Add to http credentials table
|
|
register_http_credentials(host, port, login_combo["username"], login_combo["password"])
|
|
credentials_found = true
|
|
end
|
|
end
|
|
end
|
|
end
|
|
j = j + 1
|
|
end
|
|
end
|
|
|
|
if #output_lns > 0 then
|
|
return stdnse.strjoin("\n", output_lns)
|
|
end
|
|
end
|