mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 21:21:31 +00:00
with modifications from [2].
** Short description from [1] **
I have created a patch to NSE that replaces runlevels with a table of
dependencies that clearly outlines what other scripts the script
depends on. The table is of the form:
dependences = {"script1", script2", ...}
Runlevels become an internal representation of the order of scripts
that are generated by the dependencies. Dependencies only enforce
an execution order and not a requirement for execution.
[1] http://seclists.org/nmap-dev/2009/q4/295
[2] http://seclists.org/nmap-dev/2009/q4/446
286 lines
10 KiB
Lua
286 lines
10 KiB
Lua
description = [[
|
|
Attempts to enumerate domains on a system, along with their policies. This generally requires
|
|
credentials, except against Windows 2000. In addition to the actual domain, the "Builtin"
|
|
domain is generally displayed. Windows returns this in the list of domains, but its policies
|
|
don't appear to be used anywhere.
|
|
|
|
Much of the information provided is useful to a penetration tester, because it tells the
|
|
tester what types of policies to expect. For example, if passwords have a minimum length of 8,
|
|
the tester can trim his database to match; if the minimum length is 14, the tester will
|
|
probably start looking for sticky notes on people's monitors.
|
|
|
|
Another useful piece of information is the password lockouts -- a penetration tester often wants
|
|
to know whether or not there's a risk of negatively impacting a network, and this will
|
|
indicate it. The SID is displayed, which may be useful in other tools; the users are listed,
|
|
which uses different functions than <code>smb-enum-users.nse</code> (though likely won't
|
|
get different results), and the date and time the domain was created may give some insight into
|
|
its history.
|
|
|
|
After the initial <code>bind</code> to SAMR, the sequence of calls is:
|
|
* <code>Connect4</code>: get a connect_handle
|
|
* <code>EnumDomains</code>: get a list of the domains (stop here if you just want the names).
|
|
* <code>QueryDomain</code>: get the SID for the domain.
|
|
* <code>OpenDomain</code>: get a handle for each domain.
|
|
* <code>QueryDomainInfo2</code>: get the domain information.
|
|
* <code>QueryDomainUsers</code>: get a list of the users in the domain.
|
|
]]
|
|
|
|
---
|
|
--@usage
|
|
-- nmap --script smb-enum-domains.nse -p445 <host>
|
|
-- sudo nmap -sU -sS --script smb-enum-domains.nse -p U:137,T:139 <host>
|
|
--
|
|
--@output
|
|
-- Host script results:
|
|
-- | smb-enum-domains:
|
|
-- | | WINDOWS2003 (S-1-5-21-4146152237-3614947961-1862238888)
|
|
-- | | | Groups: HelpServicesGroup, IIS_WPG, TelnetClients
|
|
-- | | | Users: Administrator, ASPNET, Guest, IUSR_WINDOWS2003, IWAM_WINDOWS2003, ron, SUPPORT_388945a0, test
|
|
-- | | | Creation time: 2009-10-17 12:46:43
|
|
-- | | | Passwords: min length: n/a; min age: n/a; max age: 42 days; history: n/a
|
|
-- | | |_ Account lockout disabled
|
|
-- | | Builtin (S-1-5-32)
|
|
-- | | | Groups: Administrators, Backup Operators, Distributed COM Users, Guests, Network Configuration Operators, Performance Log Users, Performance Monitor Users, Power Users, Print Operators, Remote Desktop Users, Replicator, Users
|
|
-- | | | Users: n/a
|
|
-- | | | Creation time: 2009-10-17 12:46:43
|
|
-- | | | Passwords: min length: n/a; min age: n/a; max age: 42 days; history: n/a
|
|
-- |_ |_ |_ Account lockout disabled
|
|
--
|
|
-----------------------------------------------------------------------
|
|
|
|
author = "Ron Bowes"
|
|
copyright = "Ron Bowes"
|
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
|
categories = {"discovery","intrusive"}
|
|
dependencies = {"smb-brute"}
|
|
|
|
require 'msrpc'
|
|
require 'smb'
|
|
require 'stdnse'
|
|
|
|
-- TODO: This script needs some love...
|
|
|
|
hostrule = function(host)
|
|
return smb.get_port(host) ~= nil
|
|
end
|
|
|
|
local function get_domain_info(smbstate, domain)
|
|
local sid
|
|
local domain_handle
|
|
|
|
-- Call LookupDomain()
|
|
status, lookupdomain_result = msrpc.samr_lookupdomain(smbstate, connect_handle, domain)
|
|
if(status == false) then
|
|
return false, "Couldn't look up the domain: " .. lookupdomain_result
|
|
end
|
|
|
|
-- Save the sid
|
|
sid = lookupdomain_result['sid']
|
|
|
|
-- Call OpenDomain()
|
|
status, opendomain_result = msrpc.samr_opendomain(smbstate, connect_handle, sid)
|
|
if(status == false) then
|
|
return false, opendomain_result
|
|
end
|
|
|
|
-- Save the domain handle
|
|
domain_handle = opendomain_result['domain_handle']
|
|
|
|
-- Call QueryDomainInfo2() to get domain properties. We call these for three types -- 1, 8, and 12, since those return
|
|
-- the most useful information.
|
|
status_1, querydomaininfo2_result_1 = msrpc.samr_querydomaininfo2(smbstate, domain_handle, 1)
|
|
status_8, querydomaininfo2_result_8 = msrpc.samr_querydomaininfo2(smbstate, domain_handle, 8)
|
|
status_12, querydomaininfo2_result_12 = msrpc.samr_querydomaininfo2(smbstate, domain_handle, 12)
|
|
|
|
if(status_1 == false) then
|
|
return false, querydomaininfo2_result_1
|
|
end
|
|
|
|
if(status_8 == false) then
|
|
return false, querydomaininfo2_result_8
|
|
end
|
|
|
|
if(status_12 == false) then
|
|
return false, thenquerydomaininfo2_result_12
|
|
end
|
|
|
|
-- Call EnumDomainUsers() to get users
|
|
status, enumdomainusers_result = msrpc.samr_enumdomainusers(smbstate, domain_handle)
|
|
if(status == false) then
|
|
return false, enumdomainusers_result
|
|
end
|
|
|
|
-- Call EnumDomainAliases() to get groups
|
|
local status, enumdomaingroups_result = msrpc.samr_enumdomainaliases(smbstate, domain_handle)
|
|
if(status == false) then
|
|
return false, enumdomaingroups_result
|
|
end
|
|
|
|
-- Close the domain handle
|
|
msrpc.samr_close(smbstate, domain_handle)
|
|
|
|
-- Create a list of groups
|
|
local groups = {}
|
|
if(enumdomaingroups_result['sam'] ~= nil and enumdomaingroups_result['sam']['entries'] ~= nil) then
|
|
for _, group in ipairs(enumdomaingroups_result['sam']['entries']) do
|
|
table.insert(groups, group.name)
|
|
end
|
|
end
|
|
|
|
-- Create the list of users
|
|
local names = {}
|
|
if(enumdomainusers_result['sam'] ~= nil and enumdomainusers_result['sam']['entries'] ~= nil) then
|
|
for _, name in ipairs(enumdomainusers_result['sam']['entries']) do
|
|
table.insert(names, name.name)
|
|
end
|
|
end
|
|
|
|
-- Our output table
|
|
local response = {}
|
|
|
|
-- Finally, start filling in the response!
|
|
response['name'] = string.format("%s (%s)", domain, sid)
|
|
|
|
-- Add the list of groups as a comma-separated list
|
|
if(groups and (#groups > 0)) then
|
|
table.insert(response, string.format("Groups: %s", stdnse.strjoin(", ", groups)))
|
|
else
|
|
table.insert(response, string.format("Groups: n/a"))
|
|
end
|
|
|
|
-- Add the list of users as a comma-separated list
|
|
if(names and (#names > 0)) then
|
|
table.insert(response, string.format("Users: %s", stdnse.strjoin(", ", names)))
|
|
else
|
|
table.insert(response, string.format("Users: n/a"))
|
|
end
|
|
|
|
|
|
|
|
if(querydomaininfo2_result_8['info']['domain_create_time'] ~= 0) then
|
|
table.insert(response, string.format("Creation time: %s", os.date("%Y-%m-%d %H:%M:%S", querydomaininfo2_result_8['info']['domain_create_time'])))
|
|
end
|
|
|
|
-- Password characteristics
|
|
local min_password_length = querydomaininfo2_result_1['info']['min_password_length']
|
|
local max_password_age = querydomaininfo2_result_1['info']['max_password_age'] / 60 / 60 / 24
|
|
local min_password_age = querydomaininfo2_result_1['info']['min_password_age'] / 60 / 60 / 24
|
|
local password_history = querydomaininfo2_result_1['info']['password_history_length']
|
|
|
|
if(min_password_length > 0) then
|
|
min_password_length = string.format("%d characters", min_password_length)
|
|
else
|
|
min_password_length = "n/a"
|
|
end
|
|
|
|
if(max_password_age > 0 and max_password_age < 5000) then
|
|
max_password_age = string.format("%d days", max_password_age)
|
|
else
|
|
max_password_age = "n/a"
|
|
end
|
|
|
|
if(min_password_age > 0) then
|
|
min_password_age = string.format("%d days", min_password_age)
|
|
else
|
|
min_password_age = "n/a"
|
|
end
|
|
|
|
if(password_history > 0) then
|
|
password_history = string.format("%d passwords", password_history)
|
|
else
|
|
password_history = "n/a"
|
|
end
|
|
|
|
table.insert(response, string.format("Passwords: min length: %s; min age: %s; max age: %s; history: %s", min_password_length, min_password_age, max_password_age, password_history))
|
|
|
|
local lockout_duration = querydomaininfo2_result_12['info']['lockout_duration']
|
|
if(lockout_duration < 0) then
|
|
lockout_duration = string.format("for %d minutes", querydomaininfo2_result_12['info']['lockout_duration'])
|
|
else
|
|
lockout_duration = "until manually reset"
|
|
end
|
|
|
|
if(querydomaininfo2_result_12['info']['lockout_threshold'] > 0) then
|
|
table.insert(response, string.format("Password lockout: %d attempts in under %d minutes will lock the account %s", querydomaininfo2_result_12['info']['lockout_threshold'], querydomaininfo2_result_12['info']['lockout_window'] / 60, lockout_duration))
|
|
else
|
|
table.insert(response, string.format("Account lockout disabled"))
|
|
end
|
|
|
|
local password_properties = querydomaininfo2_result_1['info']['password_properties']
|
|
|
|
if(#password_properties > 0) then
|
|
local password_properties_response = {}
|
|
password_properties_response['name'] = "Password properties:"
|
|
for j = 1, #password_properties, 1 do
|
|
table.insert(password_properties_response, msrpc.samr_PasswordProperties_tostr(password_properties[j]))
|
|
end
|
|
table.insert(response, password_properties_response)
|
|
end
|
|
|
|
return true, response
|
|
end
|
|
|
|
|
|
action = function(host)
|
|
|
|
local response = {}
|
|
local status, smbstate
|
|
local i, j
|
|
|
|
-- Create the SMB session
|
|
status, smbstate = msrpc.start_smb(host, msrpc.SAMR_PATH)
|
|
if(status == false) then
|
|
return stdnse.format_output(false, smbstate)
|
|
end
|
|
|
|
-- Bind to SAMR service
|
|
status, bind_result = msrpc.bind(smbstate, msrpc.SAMR_UUID, msrpc.SAMR_VERSION, nil)
|
|
if(status == false) then
|
|
return stdnse.format_output(false, bind_result)
|
|
end
|
|
|
|
-- Call connect4()
|
|
status, connect4_result = msrpc.samr_connect4(smbstate, host.ip)
|
|
if(status == false) then
|
|
return stdnse.format_output(false, connect4_result)
|
|
end
|
|
|
|
-- Save the connect_handle
|
|
connect_handle = connect4_result['connect_handle']
|
|
|
|
-- Call EnumDomains()
|
|
status, enumdomains_result = msrpc.samr_enumdomains(smbstate, connect_handle)
|
|
if(status == false) then
|
|
return stdnse.format_output(false, enumdomains_result)
|
|
end
|
|
|
|
-- If no domains were returned, print an error (I don't expect this will actually happen)
|
|
if(#enumdomains_result['sam']['entries'] == 0) then
|
|
return stdnse.format_output(false, "Couldn't find any domains")
|
|
end
|
|
|
|
for i = 1, #enumdomains_result['sam']['entries'], 1 do
|
|
local domain = enumdomains_result['sam']['entries'][i]['name']
|
|
local status, domain_info = get_domain_info(smbstate, domain)
|
|
|
|
if(not(status)) then
|
|
local error_table = {}
|
|
error_table['name'] = "Domain: " .. domain
|
|
error_table['warning'] = "Couldn't get info for the domain: " .. domain_info
|
|
table.insert(response, error_table)
|
|
else
|
|
table.insert(response, domain_info)
|
|
end
|
|
|
|
end
|
|
|
|
-- Close the connect handle
|
|
msrpc.samr_close(smbstate, connect_handle)
|
|
|
|
-- Close the SMB session
|
|
msrpc.stop_smb(smbstate)
|
|
|
|
return stdnse.format_output(true, response)
|
|
end
|
|
|