summaryrefslogtreecommitdiffstats
path: root/nmap_ftp.cc
diff options
context:
space:
mode:
Diffstat (limited to 'nmap_ftp.cc')
-rw-r--r--nmap_ftp.cc356
1 files changed, 356 insertions, 0 deletions
diff --git a/nmap_ftp.cc b/nmap_ftp.cc
new file mode 100644
index 0000000..a867258
--- /dev/null
+++ b/nmap_ftp.cc
@@ -0,0 +1,356 @@
+
+/***************************************************************************
+ * nmap_ftp.cc -- Nmap's FTP routines used for FTP bounce scan (-b)
+ * *
+ ***********************IMPORTANT NMAP LICENSE TERMS************************
+ *
+ * The Nmap Security Scanner is (C) 1996-2023 Nmap Software LLC ("The Nmap
+ * Project"). Nmap is also a registered trademark of the Nmap Project.
+ *
+ * This program is distributed under the terms of the Nmap Public Source
+ * License (NPSL). The exact license text applying to a particular Nmap
+ * release or source code control revision is contained in the LICENSE
+ * file distributed with that version of Nmap or source code control
+ * revision. More Nmap copyright/legal information is available from
+ * https://nmap.org/book/man-legal.html, and further information on the
+ * NPSL license itself can be found at https://nmap.org/npsl/ . This
+ * header summarizes some key points from the Nmap license, but is no
+ * substitute for the actual license text.
+ *
+ * Nmap is generally free for end users to download and use themselves,
+ * including commercial use. It is available from https://nmap.org.
+ *
+ * The Nmap license generally prohibits companies from using and
+ * redistributing Nmap in commercial products, but we sell a special Nmap
+ * OEM Edition with a more permissive license and special features for
+ * this purpose. See https://nmap.org/oem/
+ *
+ * If you have received a written Nmap license agreement or contract
+ * stating terms other than these (such as an Nmap OEM license), you may
+ * choose to use and redistribute Nmap under those terms instead.
+ *
+ * The official Nmap Windows builds include the Npcap software
+ * (https://npcap.com) for packet capture and transmission. It is under
+ * separate license terms which forbid redistribution without special
+ * permission. So the official Nmap Windows builds may not be redistributed
+ * without special permission (such as an Nmap OEM license).
+ *
+ * Source is provided to this software because we believe users have a
+ * right to know exactly what a program is going to do before they run it.
+ * This also allows you to audit the software for security holes.
+ *
+ * Source code also allows you to port Nmap to new platforms, fix bugs, and add
+ * new features. You are highly encouraged to submit your changes as a Github PR
+ * or by email to the dev@nmap.org mailing list for possible incorporation into
+ * the main distribution. Unless you specify otherwise, it is understood that
+ * you are offering us very broad rights to use your submissions as described in
+ * the Nmap Public Source License Contributor Agreement. This is important
+ * because we fund the project by selling licenses with various terms, and also
+ * because the inability to relicense code has caused devastating problems for
+ * other Free Software projects (such as KDE and NASM).
+ *
+ * The free version of Nmap is distributed in the hope that it will be
+ * useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Warranties,
+ * indemnification and commercial support are all available through the
+ * Npcap OEM program--see https://nmap.org/oem/
+ *
+ ***************************************************************************/
+
+/* $Id$ */
+#include "nmap.h"
+#include "nmap_ftp.h"
+#include "output.h"
+#include "NmapOps.h"
+#include "nmap_error.h"
+#include "tcpip.h"
+#include "Target.h"
+#include "nmap_tty.h"
+extern NmapOps o;
+
+struct ftpinfo get_default_ftpinfo(void) {
+#if (defined(IN_ADDR_DEEPSTRUCT) || defined(SOLARIS))
+ /* Note that struct in_addr in solaris is 3 levels deep just to store an
+ * unsigned int! */
+ struct ftpinfo ftp = { FTPUSER, FTPPASS, "", { { { 0 } } } , 21, 0};
+#else
+ struct ftpinfo ftp = { FTPUSER, FTPPASS, "", { 0 }, 21, 0};
+#endif
+ return ftp;
+}
+
+/* parse a URL stype ftp string of the form user:pass@server:portno */
+int parse_bounce_argument(struct ftpinfo *ftp, char *url) {
+ char *p = url, *q, *s;
+
+ if ((q = strrchr(url, '@'))) { /* we have user and/or pass */
+ *q++ = '\0';
+
+ if ((s = strchr(p, ':'))) { /* we have user AND pass */
+ *s++ = '\0';
+ strncpy(ftp->pass, s, 255);
+ } else { /* we ONLY have user */
+ log_write(LOG_STDOUT, "Assuming %s is a username, and using the default password: %s\n",
+ p, ftp->pass);
+ }
+
+ strncpy(ftp->user, p, 63);
+ } else {
+ q = url;
+ }
+
+ /* q points to beginning of server name */
+ if ((s = strchr(q, ':'))) { /* we have portno */
+ *s++ = '\0';
+ ftp->port = atoi(s);
+ }
+
+ strncpy(ftp->server_name, q, FQDN_LEN+1);
+
+ ftp->user[63] = ftp->pass[255] = ftp->server_name[FQDN_LEN] = 0;
+
+ return 1;
+}
+
+int ftp_anon_connect(struct ftpinfo *ftp) {
+ int sd;
+ struct sockaddr_in sock;
+ int res;
+ char recvbuf[2048];
+ char command[512];
+
+ if (o.verbose || o.debugging)
+ log_write(LOG_STDOUT, "Attempting connection to ftp://%s:%s@%s:%i\n",
+ ftp->user, ftp->pass, ftp->server_name, ftp->port);
+
+ if ((sd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0) {
+ gh_perror("Couldn't create %s socket", __func__);
+ return 0;
+ }
+ socket_bindtodevice(sd, o.device);
+
+ sock.sin_family = AF_INET;
+ sock.sin_addr.s_addr = ftp->server.s_addr;
+ sock.sin_port = htons(ftp->port);
+ res = connect(sd, (struct sockaddr *) &sock, sizeof(struct sockaddr_in));
+ if (res < 0)
+ fatal("Your FTP bounce proxy server won't talk to us!");
+ if (o.verbose || o.debugging)
+ log_write(LOG_STDOUT, "Connected:");
+ while ((res = recvtime(sd, recvbuf, sizeof(recvbuf) - 1, 7, NULL)) > 0) {
+ if (o.debugging || o.verbose) {
+ recvbuf[res] = '\0';
+ log_write(LOG_STDOUT, "%s", recvbuf);
+ }
+ }
+ if (res < 0)
+ pfatal("recv problem from FTP bounce server");
+
+ Snprintf(command, 511, "USER %s\r\n", ftp->user);
+
+ send(sd, command, strlen(command), 0);
+ res = recvtime(sd, recvbuf, sizeof(recvbuf) - 1, 12, NULL);
+ if (res <= 0)
+ pfatal("recv problem from FTP bounce server");
+ recvbuf[res] = '\0';
+ if (o.debugging)
+ log_write(LOG_STDOUT, "sent username, received: %s", recvbuf);
+ if (recvbuf[0] == '5')
+ fatal("Your FTP bounce server doesn't like the username \"%s\"", ftp->user);
+
+ if (!strncmp(recvbuf, "230", 3)) {
+ // 230 User logged in
+ // No need to send PASS
+ if (o.verbose)
+ log_write(LOG_STDOUT, "Login credentials accepted by FTP server!\n");
+ ftp->sd = sd;
+ return sd;
+ }
+ Snprintf(command, 511, "PASS %s\r\n", ftp->pass);
+
+ send(sd, command, strlen(command), 0);
+ res = recvtime(sd, recvbuf, sizeof(recvbuf) - 1, 12, NULL);
+ if (res < 0)
+ pfatal("recv problem from FTP bounce server");
+ if (!res) {
+ error("Timeout from bounce server ...");
+ } else {
+ recvbuf[res] = '\0';
+ if (o.debugging)
+ log_write(LOG_STDOUT, "sent password, received: %s", recvbuf);
+ if (recvbuf[0] == '5')
+ fatal("Your FTP bounce server refused login combo (%s/%s)", ftp->user, ftp->pass);
+ }
+ while ((res = recvtime(sd, recvbuf, sizeof(recvbuf) - 1, 2, NULL)) > 0) {
+ if (o.debugging) {
+ recvbuf[res] = '\0';
+ log_write(LOG_STDOUT, "%s", recvbuf);
+ }
+ }
+ if (res < 0)
+ pfatal("recv problem from FTP bounce server");
+ if (o.verbose)
+ log_write(LOG_STDOUT, "Login credentials accepted by FTP server!\n");
+
+ ftp->sd = sd;
+ return sd;
+}
+
+/* FTP bounce attack scan. This function is rather lame and should be
+ rewritten. But I don't think it is used much anyway. If I'm going to
+ allow FTP bounce scan, I should really allow SOCKS proxy scan. */
+void bounce_scan(Target *target, u16 *portarray, int numports,
+ struct ftpinfo *ftp) {
+ o.current_scantype = BOUNCE_SCAN;
+
+ ScanProgressMeter *SPM;
+ int res , sd = ftp->sd, i = 0;
+ const char *t = (const char *)target->v4hostip();
+ int retriesleft = FTP_RETRIES;
+ char recvbuf[2048];
+ char targetstr[20];
+ char command[512];
+ unsigned short portno, p1, p2;
+ int timedout;
+ bool privok = false;
+
+ if (numports == 0)
+ return; /* nothing to scan for */
+
+ Snprintf(targetstr, 20, "%d,%d,%d,%d,", UC(t[0]), UC(t[1]), UC(t[2]), UC(t[3]));
+
+ SPM = new ScanProgressMeter(scantype2str(BOUNCE_SCAN));
+ for (i = 0; i < numports; i++) {
+
+ /* Check for timeout */
+ if (target->timedOut(NULL)) {
+ Snprintf(recvbuf, sizeof(recvbuf), "Target timed out");
+ SPM->endTask(NULL, recvbuf);
+ delete SPM;
+ return;
+ }
+
+ portno = htons(portarray[i]);
+ p1 = ((unsigned char *) &portno)[0];
+ p2 = ((unsigned char *) &portno)[1];
+ Snprintf(command, 512, "PORT %s%i,%i\r\n", targetstr, p1, p2);
+ if (o.debugging)
+ log_write(LOG_STDOUT, "Attempting command: %s", command);
+ if (send(sd, command, strlen(command), 0) < 0 ) {
+ gh_perror("send in %s", __func__);
+ if (retriesleft) {
+ if (o.verbose || o.debugging)
+ log_write(LOG_STDOUT, "Our FTP proxy server hung up on us! retrying\n");
+ retriesleft--;
+ close(sd);
+ ftp->sd = ftp_anon_connect(ftp);
+ if (ftp->sd < 0) {
+ Snprintf(recvbuf, sizeof(recvbuf), "Error connecting");
+ SPM->endTask(NULL, recvbuf);
+ delete SPM;
+ return;
+ }
+ sd = ftp->sd;
+ i--;
+ } else {
+ error("Our socket descriptor is dead and we are out of retries. Giving up.");
+ close(sd);
+ ftp->sd = -1;
+ Snprintf(recvbuf, sizeof(recvbuf), "Max retries exceeded");
+ SPM->endTask(NULL, recvbuf);
+ delete SPM;
+ return;
+ }
+ } else { /* Our send is good */
+ res = recvtime(sd, recvbuf, 2048, 15, NULL);
+ if (res <= 0) {
+ perror("recv problem from FTP bounce server");
+ } else { /* our recv is good */
+ recvbuf[res] = '\0';
+ if (o.debugging)
+ log_write(LOG_STDOUT, "result of port query on port %i: %s",
+ portarray[i], recvbuf);
+ if (recvbuf[0] == '5' && !privok) {
+ if (portarray[i] > 1023) {
+ fatal("Your FTP bounce server sucks, it won't let us feed bogus ports!");
+ } else {
+ error("Your FTP bounce server doesn't allow privileged ports, skipping them.");
+ while (i < numports && portarray[i] < 1024) i++;
+ if (i >= numports) {
+ fatal("And you didn't want to scan any unprivileged ports. Giving up.");
+ }
+ }
+ } else { /* Not an error message */
+ if (portarray[i] < 1024) {
+ privok = true;
+ }
+ if (send(sd, "LIST\r\n", 6, 0) > 0 ) {
+ res = recvtime(sd, recvbuf, 2048, 12, &timedout);
+ if (res < 0) {
+ perror("recv problem from FTP bounce server");
+ } else if (res == 0) {
+ recvbuf[res] = '\0';
+ if (timedout)
+ target->ports.setPortState(portarray[i], IPPROTO_TCP, PORT_FILTERED);
+ else target->ports.setPortState(portarray[i], IPPROTO_TCP, PORT_CLOSED);
+ } else {
+ recvbuf[res] = '\0';
+ if (o.debugging)
+ log_write(LOG_STDOUT, "result of LIST: %s", recvbuf);
+ if (!strncmp(recvbuf, "500", 3)) {
+ /* oh dear, we are not aligned properly */
+ if (o.verbose || o.debugging)
+ error("FTP command misalignment detected ... correcting.");
+ res = recvtime(sd, recvbuf, 2048, 10, NULL);
+ }
+ if (recvbuf[0] == '1') {
+ res = recvtime(sd, recvbuf, 2048, 10, &timedout);
+ if (res < 0)
+ perror("recv problem from FTP bounce server");
+ else if (timedout || res == 0) {
+ // Timed out waiting for LIST to complete; probably filtered.
+ if(send(sd, "ABOR\r\n", 6, 0) > 0) {
+ target->ports.setPortState(portarray[i], IPPROTO_TCP, PORT_FILTERED);
+ }
+ // Get response and discard
+ res = recvtime(sd, recvbuf, 2048, 10, &timedout);
+ recvbuf[0] = '\0';
+ goto nextport;
+ }
+ else {
+ recvbuf[res] = '\0';
+ if (o.debugging)
+ log_write(LOG_STDOUT, "nxt line: %s", recvbuf);
+ if (recvbuf[0] == '4' && recvbuf[1] == '2' && recvbuf[2] == '6') {
+ target->ports.forgetPort(portarray[i], IPPROTO_TCP);
+ if (o.debugging || o.verbose)
+ log_write(LOG_STDOUT, "Changed my mind about port %i\n", portarray[i]);
+ }
+ }
+ }
+ if (recvbuf[0] == '2') {
+ target->ports.setPortState(portarray[i], IPPROTO_TCP, PORT_OPEN);
+ } else {
+ /* This means the port is closed ... */
+ target->ports.setPortState(portarray[i], IPPROTO_TCP, PORT_CLOSED);
+ }
+ }
+ }
+ }
+ }
+ }
+ nextport:
+ if (SPM->mayBePrinted(NULL)) {
+ SPM->printStatsIfNecessary((double) i / numports, NULL);
+ }
+ else if (keyWasPressed()) {
+ SPM->printStats((double) i / numports, NULL);
+ log_flush(LOG_STDOUT);
+ }
+ }
+
+ Snprintf(recvbuf, sizeof(recvbuf), "%d total ports", numports);
+ SPM->endTask(NULL, recvbuf);
+ delete SPM;
+ return;
+}