mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
MS SQL NSE scripts run on database instances, which can be TCP or named pipes. With this change, all TCP instances on scanned ports will have script output attached under the port as a portrule script. Named pipe instances and TCP instances on unscanned ports will be displayed in the hostrule script output at the end of the host's output. Utility function mssql.Helper.InitScript makes it easy to write scripts that just work on a per-instance basis, without bothering where to put the output. Discovery will be done once per host, regardless of how many scripts are run, and can be guaranteed to be done before the script's action takes place.
291 lines
11 KiB
Lua
291 lines
11 KiB
Lua
local mssql = require "mssql"
|
|
local nmap = require "nmap"
|
|
local stdnse = require "stdnse"
|
|
local string = require "string"
|
|
local table = require "table"
|
|
local unpwdb = require "unpwdb"
|
|
|
|
-- -*- mode: lua -*-
|
|
-- vim: set filetype=lua :
|
|
|
|
description = [[
|
|
Performs password guessing against Microsoft SQL Server (ms-sql). Works best in
|
|
conjunction with the <code>broadcast-ms-sql-discover</code> script.
|
|
|
|
SQL Server credentials required: No (will not benefit from <code>mssql.username</code> & <code>mssql.password</code>).
|
|
|
|
Run criteria:
|
|
* Host script: Will run if the <code>mssql.instance-all</code>, <code>mssql.instance-name</code> or <code>mssql.instance-port</code> script arguments are used (see mssql.lua).
|
|
* Port script: Will run against any services identified as SQL Servers, but only if the <code>mssql.instance-all</code>, <code>mssql.instance-name</code> and <code>mssql.instance-port</code> script arguments are NOT used.
|
|
|
|
WARNING: SQL Server 2005 and later versions include support for account lockout
|
|
policies (which are enforced on a per-user basis). If an account is locked out,
|
|
the script will stop running for that instance, unless the
|
|
<code>ms-sql-brute.ignore-lockout</code> argument is used.
|
|
|
|
NOTE: Communication with instances via named pipes depends on the <code>smb</code>
|
|
library. To communicate with (and possibly to discover) instances via named pipes,
|
|
the host must have at least one SMB port (e.g. TCP 445) that was scanned and
|
|
found to be open. Additionally, named pipe connections may require Windows
|
|
authentication to connect to the Windows host (via SMB) in addition to the
|
|
authentication required to connect to the SQL Server instances itself. See the
|
|
documentation and arguments for the <code>smb</code> library for more information.
|
|
|
|
NOTE: By default, the ms-sql-* scripts may attempt to connect to and communicate
|
|
with ports that were not included in the port list for the Nmap scan. This can
|
|
be disabled using the <code>mssql.scanned-ports-only</code> script argument.
|
|
]]
|
|
|
|
---
|
|
-- @see ms-sql-empty-password.nse
|
|
--
|
|
-- @usage
|
|
-- nmap -p 445 --script ms-sql-brute --script-args mssql.instance-all,userdb=customuser.txt,passdb=custompass.txt <host>
|
|
-- nmap -p 1433 --script ms-sql-brute --script-args userdb=customuser.txt,passdb=custompass.txt <host>
|
|
--
|
|
-- @output
|
|
-- | ms-sql-brute:
|
|
-- | [192.168.100.128\TEST]
|
|
-- | No credentials found
|
|
-- | Warnings:
|
|
-- | sa: AccountLockedOut
|
|
-- | [192.168.100.128\PROD]
|
|
-- | Credentials found:
|
|
-- | webshop_reader:secret => Login Success
|
|
-- | testuser:secret1234 => PasswordMustChange
|
|
-- |_ lordvader:secret1234 => Login Success
|
|
--
|
|
----
|
|
-- @args ms-sql-brute.ignore-lockout WARNING! Including this argument will cause
|
|
-- the script to continue attempting to brute-forcing passwords for users
|
|
-- even after a user has been locked out. This may result in many SQL
|
|
-- Server logins being locked out!
|
|
--
|
|
-- @args ms-sql-brute.brute-windows-accounts Enable targeting Windows accounts
|
|
-- as part of the brute force attack. This should be used in conjunction
|
|
-- with the mssql library's mssql.domain argument.
|
|
--
|
|
|
|
-- Created 01/17/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>
|
|
-- Revised 02/01/2011 - v0.2 (Chris Woodbury)
|
|
-- - Added ability to run against all instances on a host;
|
|
-- - Added recognition of account-locked out and password-expired error codes;
|
|
-- - Added storage of credentials on a per-instance basis
|
|
-- - Added compatibility with changes in mssql.lua
|
|
|
|
author = "Patrik Karlsson"
|
|
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
|
|
categories = {"brute", "intrusive"}
|
|
|
|
dependencies = {"broadcast-ms-sql-discover", "ms-sql-empty-password"}
|
|
|
|
--- Returns formatted output for the given instance
|
|
local function create_instance_output_table( instance )
|
|
|
|
local instanceOutput = {}
|
|
instanceOutput["name"] = string.format( "[%s]", instance:GetName() )
|
|
if ( instance.ms_sql_brute.credentials ) then
|
|
local credsOutput = {}
|
|
credsOutput["name"] = "Credentials found:"
|
|
table.insert( instanceOutput, credsOutput )
|
|
|
|
for username, result in pairs( instance.ms_sql_brute.credentials ) do
|
|
local password = result[1]
|
|
local errorCode = result[2]
|
|
password = password:len()>0 and password or "<empty>"
|
|
if errorCode then
|
|
local errorMessage = mssql.LoginErrorMessage[ errorCode ] or "unknown error"
|
|
table.insert( credsOutput, string.format( "%s:%s => %s", username, password, errorMessage ) )
|
|
else
|
|
table.insert( credsOutput, string.format( "%s:%s => Login Success", username, password ) )
|
|
end
|
|
end
|
|
|
|
if ( #credsOutput == 0 ) then
|
|
table.insert( instanceOutput, "No credentials found" )
|
|
end
|
|
end
|
|
|
|
if ( instance.ms_sql_brute.warnings ) then
|
|
local warningsOutput = {}
|
|
warningsOutput["name"] = "Warnings:"
|
|
table.insert( instanceOutput, warningsOutput )
|
|
|
|
for _, warning in ipairs( instance.ms_sql_brute.warnings ) do
|
|
table.insert( warningsOutput, warning )
|
|
end
|
|
end
|
|
|
|
if ( instance.ms_sql_brute.errors ) then
|
|
local errorsOutput = {}
|
|
errorsOutput["name"] = "Errors:"
|
|
table.insert( instanceOutput, errorsOutput )
|
|
|
|
for _, error in ipairs( instance.ms_sql_brute.errors ) do
|
|
table.insert( errorsOutput, error )
|
|
end
|
|
end
|
|
|
|
return stdnse.format_output(true, instanceOutput)
|
|
|
|
end
|
|
|
|
|
|
local function test_credentials( instance, helper, username, password )
|
|
local database = "tempdb"
|
|
local stopUser, stopInstance = false, false
|
|
|
|
local status, result = helper:ConnectEx( instance )
|
|
local loginErrorCode
|
|
if( status ) then
|
|
stdnse.debug2("Attempting login to %s as %s/%s", instance:GetName(), username, password )
|
|
status, result, loginErrorCode = helper:Login( username, password, database, instance.host.ip )
|
|
end
|
|
helper:Disconnect()
|
|
|
|
local passwordIsGood, canLogin
|
|
if status then
|
|
passwordIsGood = true
|
|
canLogin = true
|
|
elseif ( loginErrorCode ) then
|
|
if ( ( loginErrorCode ~= mssql.LoginErrorType.InvalidUsernameOrPassword ) and
|
|
( loginErrorCode ~= mssql.LoginErrorType.NotAssociatedWithTrustedConnection ) ) then
|
|
stopUser = true
|
|
end
|
|
|
|
if ( loginErrorCode == mssql.LoginErrorType.PasswordExpired ) then passwordIsGood = true
|
|
elseif ( loginErrorCode == mssql.LoginErrorType.PasswordMustChange ) then passwordIsGood = true
|
|
elseif ( loginErrorCode == mssql.LoginErrorType.AccountLockedOut ) then
|
|
stdnse.debug1("Account %s locked out on %s", username, instance:GetName() )
|
|
table.insert( instance.ms_sql_brute.warnings, string.format( "%s: Account is locked out.", username ) )
|
|
if ( not stdnse.get_script_args( "ms-sql-brute.ignore-lockout" ) ) then
|
|
stopInstance = true
|
|
end
|
|
end
|
|
if ( mssql.LoginErrorMessage[ loginErrorCode ] == nil ) then
|
|
stdnse.debug2("%s: Attemping login to %s as (%s/%s): Unknown login error number: %s",
|
|
SCRIPT_NAME, instance:GetName(), username, password, loginErrorCode )
|
|
table.insert( instance.ms_sql_brute.warnings, string.format( "Unknown login error number: %s", loginErrorCode ) )
|
|
end
|
|
stdnse.debug3("%s: Attempt to login to %s as (%s/%s): %d (%s)",
|
|
SCRIPT_NAME, instance:GetName(), username, password, loginErrorCode, tostring( mssql.LoginErrorMessage[ loginErrorCode ] ) )
|
|
else
|
|
table.insert( instance.ms_sql_brute.errors, string.format("Network error. Skipping instance. Error: %s", result ) )
|
|
stopUser = true
|
|
stopInstance = true
|
|
end
|
|
|
|
if ( passwordIsGood ) then
|
|
stopUser = true
|
|
|
|
instance.ms_sql_brute.credentials[ username ] = { password, loginErrorCode }
|
|
-- Add credentials for other ms-sql scripts to use but don't
|
|
-- add accounts that need to change passwords
|
|
if ( canLogin ) then
|
|
instance.credentials[ username ] = password
|
|
-- Legacy storage method (does not distinguish between instances)
|
|
nmap.registry.mssqlusers = nmap.registry.mssqlusers or {}
|
|
nmap.registry.mssqlusers[username]=password
|
|
end
|
|
end
|
|
|
|
return stopUser, stopInstance
|
|
end
|
|
|
|
--- Processes a single instance, attempting to detect an empty password for "sa"
|
|
process_instance = function ( instance )
|
|
|
|
-- One of this script's features is that it will report an instance's
|
|
-- in both the port-script results and the host-script results. In order to
|
|
-- avoid redundant login attempts on an instance, we will just make the
|
|
-- attempt once and then re-use the results. We'll use a mutex to make sure
|
|
-- that multiple script instances (e.g. a host-script and a port-script)
|
|
-- working on the same SQL Server instance can only enter this block one at
|
|
-- a time.
|
|
local mutex = nmap.mutex( instance )
|
|
mutex( "lock" )
|
|
|
|
-- If this instance has already been tested (e.g. if we got to it by both the
|
|
-- hostrule and the portrule), don't test it again.
|
|
if ( instance.tested_brute ~= true ) then
|
|
instance.tested_brute = true
|
|
|
|
instance.credentials = instance.credentials or {}
|
|
instance.ms_sql_brute = instance.ms_sql_brute or {}
|
|
instance.ms_sql_brute.credentials = instance.ms_sql_brute.credentials or {}
|
|
instance.ms_sql_brute.warnings = instance.ms_sql_brute.warnings or {}
|
|
instance.ms_sql_brute.errors = instance.ms_sql_brute.errors or {}
|
|
|
|
local result, status
|
|
local stopUser, stopInstance
|
|
local usernames, passwords, username, password
|
|
local helper = mssql.Helper:new()
|
|
|
|
if ( not instance:HasNetworkProtocols() ) then
|
|
stdnse.debug1("%s has no network protocols enabled.", instance:GetName() )
|
|
table.insert( instance.ms_sql_brute.errors, "No network protocols enabled." )
|
|
stopInstance = true
|
|
end
|
|
|
|
status, usernames = unpwdb.usernames()
|
|
if ( not(status) ) then
|
|
stdnse.debug1("Failed to load usernames list." )
|
|
table.insert( instance.ms_sql_brute.errors, "Failed to load usernames list." )
|
|
stopInstance = true
|
|
end
|
|
|
|
if ( status ) then
|
|
status, passwords = unpwdb.passwords()
|
|
if ( not(status) ) then
|
|
stdnse.debug1("Failed to load passwords list." )
|
|
table.insert( instance.ms_sql_brute.errors, "Failed to load passwords list." )
|
|
stopInstance = true
|
|
end
|
|
end
|
|
|
|
if ( status ) then
|
|
for username in usernames do
|
|
if stopInstance then break end
|
|
|
|
-- See if the password is the same as the username (which may not
|
|
-- be in the password list)
|
|
stopUser, stopInstance = test_credentials( instance, helper, username, username )
|
|
|
|
for password in passwords do
|
|
if stopUser then break end
|
|
|
|
stopUser, stopInstance = test_credentials( instance, helper, username, password )
|
|
end
|
|
|
|
passwords("reset")
|
|
end
|
|
end
|
|
end
|
|
|
|
-- The password testing has been finished. Unlock the mutex.
|
|
mutex( "done" )
|
|
|
|
return create_instance_output_table( instance )
|
|
|
|
end
|
|
|
|
local do_action
|
|
do_action, portrule, hostrule = mssql.Helper.InitScript(process_instance)
|
|
|
|
action = function(...)
|
|
|
|
local domain, bruteWindows = stdnse.get_script_args("mssql.domain", "ms-sql-brute.brute-windows-accounts")
|
|
|
|
if ( domain and not(bruteWindows) ) then
|
|
local ret = "\n " ..
|
|
"Windows authentication was enabled but the argument\n " ..
|
|
"ms-sql-brute.brute-windows-accounts was not given. As there is currently no\n " ..
|
|
"way of detecting accounts being locked out when Windows authentication is \n " ..
|
|
"used, make sure that the amount entries in the password list\n " ..
|
|
"(passdb argument) are at least 2 entries below the lockout threshold."
|
|
return ret
|
|
end
|
|
|
|
return do_action(...)
|
|
end
|