summaryrefslogtreecommitdiffstats
path: root/nselib/msrpc.lua
diff options
context:
space:
mode:
Diffstat (limited to 'nselib/msrpc.lua')
-rw-r--r--nselib/msrpc.lua5309
1 files changed, 5309 insertions, 0 deletions
diff --git a/nselib/msrpc.lua b/nselib/msrpc.lua
new file mode 100644
index 0000000..2a94243
--- /dev/null
+++ b/nselib/msrpc.lua
@@ -0,0 +1,5309 @@
+---
+-- By making heavy use of the <code>smb</code> library, this library will call various MSRPC
+-- functions. The functions used here can be accessed over TCP ports 445 and 139,
+-- with an established session. A NULL session (the default) will work for some
+-- functions and operating systems (or configurations), but not for others.
+--
+-- To make use of these function calls, a SMB session with the server has to be
+-- established. This can be done manually with the <code>smb</code> library, or the function
+-- <code>start_smb</code> can be called. A session has to be created, then the IPC$
+-- tree opened.
+--
+-- Next, the interface has to be bound. The <code>bind()</code> function will take care of that.
+--
+-- After that, you're free to call any function that's part of that interface. In
+-- other words, if you bind to the SAMR interface, you can only call the <code>samr_</code>
+-- functions, for <code>lsa_</code> functions, bind to the LSA interface, etc. Although functions
+-- can technically be called in any order, many functions depend on the
+-- value returned by other functions. I indicate those in the function comments,
+-- so keep an eye out. SAMR functions, for example, require a call to
+-- <code>connect4</code>.
+--
+-- Something to note is that these functions, for the most part, return a whole ton
+-- of stuff in a table; basically, everything that is returned by the function.
+-- Generally, if you want to know exactly what you have access to, either display the
+-- returned data with a <code>print_table</code>-type function, or check the documentation (Samba 4.0's
+-- <code>.idl</code> files (in <code>samba_4.0/source/librpc/idl</code>; see below for link) are what I based
+-- the names on).
+--
+-- The parameters for each function are converted to a string of bytes in a process
+-- called "marshalling". Functions here take arguments that match what a user would
+-- logically want to send. These are marshalled by using functions in the
+-- <code>msrpctypes</code> module. Those functions require a table of values that
+-- isn't very use friendly; as such, it's generated, when possible, in the functions
+-- in this module. The value returned, on the other hand, is returned directly to the
+-- user; I don't want to limit what data they can use, and it's difficult to rely on
+-- servers to format it consistently (sometimes a <code>null</code> is returned, and
+-- other times an empty array or blank string), so I put the onus on the scripts to
+-- deal with the returned values.
+--
+-- When implementing this, I used Wireshark's output significantly, as well as Samba's
+-- <code>.idl</code> files for reference:
+-- http://websvn.samba.org/cgi-bin/viewcvs.cgi/branches/SAMBA_4_0/source/librpc/idl/.
+-- I'm not a lawyer, but I don't expect that this is a breach of Samba's copyright --
+-- if it is, please talk to me and I'll make arrangements to re-license this or to
+-- remove references to Samba.
+--
+-- Revised 07/25/2012 - added Printer Spooler Service (spoolss) RPC functions and
+-- constants [Aleksandar Nikolic]
+--@author Ron Bowes <ron@skullsecurity.net>
+--@copyright Same as Nmap--See https://nmap.org/book/man-legal.html
+-----------------------------------------------------------------------
+
+local datetime = require "datetime"
+local ipOps = require "ipOps"
+local math = require "math"
+local msrpctypes = require "msrpctypes"
+local netbios = require "netbios"
+local os = require "os"
+local smb = require "smb"
+local stdnse = require "stdnse"
+local string = require "string"
+local stringaux = require "stringaux"
+local table = require "table"
+local unicode = require "unicode"
+_ENV = stdnse.module("msrpc", stdnse.seeall)
+
+-- The path, UUID, and version for SAMR
+SAMR_PATH = "\\samr"
+SAMR_UUID = "\x78\x57\x34\x12\x34\x12\xcd\xab\xef\x00\x01\x23\x45\x67\x89\xac"
+SAMR_VERSION = 0x01
+
+-- The path, UUID, and version for SRVSVC
+SRVSVC_PATH = "\\srvsvc"
+SRVSVC_UUID = "\xc8\x4f\x32\x4b\x70\x16\xd3\x01\x12\x78\x5a\x47\xbf\x6e\xe1\x88"
+SRVSVC_VERSION = 0x03
+
+-- The path, UUID, and version for SPOOLSS
+SPOOLSS_PATH = "\\spoolss"
+SPOOLSS_UUID = "\x78\x56\x34\x12\x34\x12\xcd\xab\xef\x00\x01\x23\x45\x67\x89\xab"
+SPOOLSS_VERSION = 0x01
+
+-- The path, UUID, and version for LSA
+LSA_PATH = "\\lsarpc"
+LSA_UUID = "\x78\x57\x34\x12\x34\x12\xcd\xab\xef\x00\x01\x23\x45\x67\x89\xab"
+LSA_VERSION = 0
+
+-- The path, UUID, and version for WINREG
+WINREG_PATH = "\\winreg"
+WINREG_UUID = "\x01\xd0\x8c\x33\x44\x22\xf1\x31\xaa\xaa\x90\x00\x38\x00\x10\x03"
+WINREG_VERSION = 1
+
+-- The path, UUID, and version for SVCCTL
+SVCCTL_PATH = "\\svcctl"
+SVCCTL_UUID = "\x81\xbb\x7a\x36\x44\x98\xf1\x35\xad\x32\x98\xf0\x38\x00\x10\x03"
+SVCCTL_VERSION = 2
+
+-- The path, UUID, and version for ATSVC
+ATSVC_PATH = "\\atsvc"
+ATSVC_UUID = "\x82\x06\xf7\x1f\x51\x0a\xe8\x30\x07\x6d\x74\x0b\xe8\xce\xe9\x8b"
+ATSVC_VERSION = 1
+
+
+-- UUID and version for epmapper e1af8308-5d1f-11c9-91a4-08002b14a0fa v3.0
+EPMAPPER_PATH = "\\epmapper"
+EPMAPPER_UUID = "\x08\x83\xaf\xe1\x1f\x5d\xc9\x11\x91\xa4\x08\x00\x2b\x14\xa0\xfa"
+EPMAPPER_VERSION = 3
+
+
+-- This is the only transfer syntax I've seen in the wild, not that I've looked hard. It seems to work well.
+TRANSFER_SYNTAX = "\x04\x5d\x88\x8a\xeb\x1c\xc9\x11\x9f\xe8\x08\x00\x2b\x10\x48\x60"
+
+-- The 'referent_id' value is ignored, as far as I can tell, so this value is passed for it. No, it isn't random. :)
+REFERENT_ID = 0x50414d4e
+
+-- The maximum length of a packet fragment
+MAX_FRAGMENT = 0x800
+
+---The number of SAMR records to pull at once. This was originally 1, but since I've written
+-- proper fragmentation code, I've successfully done it with 110 users, although I'd be surprised
+-- if you couldn't go a lot higher. I had some issues that I suspect was UNIX truncating packets,
+-- so I scaled it back.
+local SAMR_GROUPSIZE = 20
+
+---The number of LSA RIDs to check at once. I've successfully tested with up to about 110. Note that
+-- due to very long message sizes, Wireshark might truncate packets if you have more than 30 together,
+-- so for debugging, setting this to 30 might be a plan. Like SAMR, I scaled this back due to UNIX
+-- truncation.
+local LSA_GROUPSIZE = 20
+
+---The number of consecutive empty groups to stop after. Basically, this means that after
+-- <code>LSA_MINEMPTY</code> groups of <code>LSA_GROUPSIZE</code> users come back empty, we give
+-- up. Raising this could find more users, but at the expense of more packets.
+local LSA_MINEMPTY = 10
+
+---Mapping between well known MSRPC UUIDs and corresponding exe/service
+local UUID2EXE = {
+ ["1ff70682-0a51-30e8-076d-740be8cee98b"] = "mstask.exe atsvc interface (Scheduler service)",
+ ["3faf4738-3a21-4307-b46c-fdda9bb8c0d5"] = "AudioSrv AudioSrv interface (Windows Audio service)",
+ ["6bffd098-a112-3610-9833-012892020162"] = "Browser browser interface (Computer Browser service)",
+ ["91ae6020-9e3c-11cf-8d7c-00aa00c091be"] = "certsrv.exe ICertPassage interface (Certificate services)",
+ ["5ca4a760-ebb1-11cf-8611-00a0245420ed"] = "termsrv.exe winstation_rpc interface",
+ ["c8cb7687-e6d3-11d2-a958-00c04f682e16"] = "WebClient davclntrpc interface (WebDAV client service)",
+ ["50abc2a4-574d-40b3-9d66-ee4fd5fba076"] = "dns.exe DnsServer interface (DNS Server service)",
+ ["e1af8308-5d1f-11c9-91a4-08002b14a0fa"] = "RpcSs epmp interface (RPC endpoint mapper)",
+ ["82273fdc-e32a-18c3-3f78-827929dc23ea"] = "Eventlog eventlog interface (Eventlog service)",
+ ["3d267954-eeb7-11d1-b94e-00c04fa3080d"] = "lserver.exe Terminal Server Licensing",
+ ["894de0c0-0d55-11d3-a322-00c04fa321a1"] = "winlogon.exe InitShutdown interface",
+ ["8d0ffe72-d252-11d0-bf8f-00c04fd9126b"] = "CryptSvc IKeySvc interface (Cryptographic services)",
+ ["0d72a7d4-6148-11d1-b4aa-00c04fb66ea0"] = "CryptSvc ICertProtect interface (Cryptographic services)",
+ ["d6d70ef0-0e3b-11cb-acc3-08002b1d29c4"] = "locator.exe NsiS interface (RPC Locator service)",
+ ["342cfd40-3c6c-11ce-a893-08002b2e9c6d"] = "llssrv.exe llsrpc interface (Licensing Logging service)",
+ ["12345778-1234-abcd-ef00-0123456789ab"] = "lsass.exe lsarpc interface",
+ ["3919286a-b10c-11d0-9ba8-00c04fd92ef5"] = "lsass.exe dssetup interface",
+ ["5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc"] = "messenger msgsvcsend interface (Messenger service)",
+ ["2f5f3220-c126-1076-b549-074d078619da"] = "netdde.exe nddeapi interface (NetDDE service)",
+ ["4fc742e0-4a10-11cf-8273-00aa004ae673"] = "Dfssvc netdfs interface (Distributed File System service)",
+ ["12345678-1234-abcd-ef00-01234567cffb"] = "Netlogon netlogon interface (Net Logon service)",
+ ["8d9f4e40-a03d-11ce-8f69-08003e30051b"] = "PlugPlay pnp interface (Plug and Play service)",
+ -- ["8d9f4e40-a03d-11ce-8f69-08003e30051b"] = "PlugPlay pnp interface (Plug and Play Windows Vista service)",
+ ["d335b8f6-cb31-11d0-b0f9-006097ba4e54"] = "PolicyAgent PolicyAgent interface (IPSEC Policy Agent (Windows 2000))",
+ -- ["12345678-1234-abcd-ef00-0123456789ab"] = "PolicyAgent winipsec interface (IPsec Services)",
+ ["369ce4f0-0fdc-11d3-bde8-00c04f8eee78"] = "winlogon.exe pmapapi interface",
+ ["c9378ff1-16f7-11d0-a0b2-00aa0061426a"] = "lsass.exe IPStoreProv interface (Protected Storage)",
+ ["8f09f000-b7ed-11ce-bbd2-00001a181cad"] = "mprdim.dll Remote Access",
+ ["12345778-1234-abcd-ef00-0123456789ac"] = "lsass.exe samr interface",
+ ["93149ca2-973b-11d1-8c39-00c04fb984f9"] = "services.exe SceSvc",
+ ["12b81e99-f207-4a4c-85d3-77b42f76fd14"] = "seclogon ISeclogon interface (Secondary logon service)",
+ ["83da7c00-e84f-11d2-9807-00c04f8ec850"] = "winlogon.exe sfcapi interface (Windows File Protection)",
+ -- ["12345678-1234-abcd-ef00-0123456789ab"] = "spoolsv.exe spoolss interface (Spooler service)",
+ ["4b324fc8-1670-01d3-1278-5a47bf6ee188"] = "services.exe (w2k) or svchost.exe (wxp and w2k3) srvsvc interface (Server service)",
+ ["4b112204-0e19-11d3-b42b-0000f81feb9f"] = "ssdpsrv ssdpsrv interface (SSDP service)",
+ ["367aeb81-9844-35f1-ad32-98f038001003"] = "services.exe svcctl interface (Services control manager)",
+ ["2f5f6520-ca46-1067-b319-00dd010662da"] = "Tapisrv tapsrv interface (Telephony service)",
+ ["300f3532-38cc-11d0-a3f0-0020af6b0add"] = "Trkwks trkwks interface (Distributed Link Tracking Client)",
+ ["8fb6d884-2388-11d0-8c35-00c04fda2795"] = "w32time w32time interface (Windows Time)",
+ -- ["8fb6d884-2388-11d0-8c35-00c04fda2795"] = "w32time w32time interface (Windows Time (Windows Server 2003, Windows Vista))",
+ ["a002b3a0-c9b7-11d1-ae88-0080c75e4ec1"] = "winlogon.exe GetUserToken interface",
+ ["338cd001-2244-31f1-aaaa-900038001003"] = "RemoteRegistry winreg interface (Remote registry service)",
+ ["45f52c28-7f9f-101a-b52b-08002b2efabe"] = "wins.exe winsif interface (WINS service)",
+ ["6bffd098-a112-3610-9833-46c3f87e345a"] = "services.exe (w2k) or svchost.exe (wxp and w2k3) wkssvc interface (Workstation service)"
+}
+
+
+--- This is a wrapper around the SMB class, designed to get SMB going quickly for MSRPC calls.
+--
+-- This will connect to the SMB server, negotiate the protocol, open a session,
+-- connect to the IPC$ share, and open the named pipe given by 'path'. When
+-- this successfully returns, the 'smbstate' table can be immediately used for
+-- MSRPC (the <code>bind</code> function should be called right after).
+--
+-- Note that the smbstate table is the same one used in the SMB files
+-- (obviously), so it will contain the various results/information places in
+-- there by SMB functions.
+--
+--@param host The host object.
+--@param path The path to the named pipe; for example, msrpc.SAMR_PATH or
+-- msrpc.SRVSVC_PATH.
+--@param disable_extended [optional] If set to 'true', disables extended
+-- security negotiations.
+--@param overrides [optional] Overrides variables in all the SMB functions.
+--@return status true or false
+--@return smbstate if status is true, or an error message.
+function start_smb(host, path, disable_extended, overrides)
+ overrides = overrides or {}
+ local _, sharename = smb.get_fqpn(host, "IPC$")
+ return smb.start_ex(host, true, true, sharename, path, disable_extended, overrides)
+end
+
+--- A wrapper around the <code>smb.stop</code> function.
+--
+-- I only created it to add symmetry, so client code doesn't have to call both
+-- msrpc and smb functions.
+--
+--@param state The SMB state table.
+function stop_smb(state)
+ smb.stop(state)
+end
+
+--- Bind to a MSRPC interface.
+--
+-- Two common interfaces are SAML and SRVSVC, and can be found as
+-- constants at the top of this file. Once this function has successfully returned, any MSRPC
+-- call can be made (provided it doesn't depend on results from other MSRPC calls).
+--
+--@param smbstate The SMB state table
+--@param interface_uuid The interface to bind to. There are constants defined for these (<code>SAMR_UUID</code>,
+-- etc.)
+--@param interface_version The interface version to use. There are constants at the top (<code>SAMR_VERSION</code>,
+-- etc.)
+--@param transfer_syntax The transfer syntax to use. I don't really know what this is, but the value
+-- was always the same on my tests. You can use the constant at the top (<code>TRANSFER_SYNTAX</code>), or
+-- just set this parameter to 'nil'.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a
+-- table of values, none of which are especially useful.
+function bind(smbstate, interface_uuid, interface_version, transfer_syntax)
+ local status, result
+ local parameters, data
+ local pos, align
+ local result
+
+ stdnse.debug2("MSRPC: Sending Bind() request")
+
+ -- Use the only transfer_syntax value I know of.
+ if(transfer_syntax == nil) then
+ transfer_syntax = TRANSFER_SYNTAX
+ end
+
+ data = string.pack("<BBBB>I4<I2I2I4I2I2I4BxxxI2Bx",
+ 0x05, -- Version (major)
+ 0x00, -- Version (minor)
+ 0x0B, -- Packet type (0x0B = bind)
+ 0x03, -- Packet flags (0x03 = first frag + last frag)
+ 0x10000000, -- Data representation (big endian)
+ 0x0048, -- Frag length
+ 0x0000, -- Auth length
+ 0x41414141, -- Call ID (I use 'AAAA' because it's easy to recognize)
+ MAX_FRAGMENT, -- Max transmit frag
+ MAX_FRAGMENT, -- Max receive frag
+ 0x00000000, -- Assoc group
+ 0x01, -- Number of items
+ 0x0000, -- Context ID
+ 0x01) -- Number of transaction items. */
+ .. interface_uuid -- Interface (eg. SRVSVC UUID: 4b324fc8-1670-01d3-1278-5a47bf6ee188)
+ .. string.pack("<I2I2",
+ interface_version, -- Interface version (major)
+ 0x0000) -- Interface version (minor)
+ .. transfer_syntax -- Transfer syntax
+ .. string.pack("<I4", 2) -- Syntax version
+
+ status, result = smb.write_file(smbstate, data, 0)
+ if(status ~= true) then
+ return false, result
+ end
+
+ status, result = smb.read_file(smbstate, 0, MAX_FRAGMENT)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: Received Bind() result")
+
+ -- Make these easier to access.
+ parameters = result['parameters']
+ data = result['data']
+
+ -- Extract the first part from the response
+ local fmt = "<BBBB>I4<I2I2I4"
+ if #data < string.packsize(fmt) then
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.version_major, result.version_minor, result.packet_type, result.packet_flags,
+ result.data_representation, result.frag_length, result.auth_length,
+ result.call_id, pos = string.unpack(fmt, data)
+
+ -- Check if the packet type was a fault
+ if(result['packet_type'] == 0x03) then -- MSRPC_FAULT
+ return false, "Bind() returned a fault (packet type)"
+ end
+ -- Check if the flags indicate DID_NOT_EXECUTE
+ if((result['packet_flags'] & 0x20) == 0x20) then
+ return false, "Bind() returned a fault (flags)"
+ end
+ -- Check if it requested authorization (I've never seen this, but wouldn't know how to handle it)
+ if(result['auth_length'] ~= 0) then
+ return false, "Bind() returned an 'auth length', which we don't know how to deal with"
+ end
+ -- Check if the packet was fragmented (I've never seen this, but wouldn't know how to handle it)
+ if((result['packet_flags'] & 0x03) ~= 0x03) then
+ return false, "Bind() returned a fragmented packet, which we don't know how to handle"
+ end
+ -- Check if the wrong message type was returned
+ if(result['packet_type'] ~= 0x0c) then
+ return false, "Bind() returned an unexpected packet type (not BIND_ACK)"
+ end
+ -- Ensure the proper call_id was echoed back (if this is wrong, it's likely because our read is out of sync, not a bad server)
+ if(result['call_id'] ~= 0x41414141) then
+ return false, "MSRPC call returned an incorrect 'call_id' value"
+ end
+
+ -- If we made it this far, then we have a valid Bind() result. Pull out some more parameters.
+ local fmt = "<I2I2I4I2"
+ if #data - pos + 1 < string.packsize(fmt) then
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.max_transmit_frag, result.max_receive_frag, result.assoc_group,
+ result.secondary_address_length, pos = string.unpack(fmt, data, pos)
+
+ -- Read the secondary address
+ if #data - pos + 1 < result.secondary_address_length + 1 then -- +1 to account for num_results below
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.secondary_address, pos = string.unpack(("<c%d"):format(result.secondary_address_length), data, pos)
+ pos = pos + ((4 - ((pos - 1) % 4)) % 4); -- Alignment -- don't ask how I came up with this, it was a lot of drawing, and there's probably a far better way
+
+ -- Read the number of results
+ result.num_results, pos = string.unpack("<B", data, pos)
+ pos = pos + ((4 - ((pos - 1) % 4)) % 4); -- Alignment
+
+ -- Verify we got back what we expected
+ if(result['num_results'] ~= 1) then
+ return false, "Bind() returned the incorrect number of result"
+ end
+
+ -- Read in the last bits
+ local fmt = "<I2I2c16I4"
+ if #data - pos + 1 < string.packsize(fmt) then
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.ack_result, result.align, result.transfer_syntax, result.syntax_version, pos = string.unpack(fmt, data, pos)
+
+ return true, result
+end
+
+--- Call a MSRPC function on the remote server, with the given opnum and arguments.
+--
+-- I opted to make this a local function for design reasons -- scripts
+-- shouldn't be directly calling a function, if a function I haven't written is
+-- needed, it ought to be added to this file.
+--
+-- Anyways, this function takes the opnum and marshalled arguments, and passes
+-- it down to the SMB layer. The SMB layer sends out a
+-- <code>SMB_COM_TRANSACTION</code> packet, and parses the result. Once the SMB
+-- stuff has been stripped off the result, it's passed down here, cleaned up
+-- some more, and returned to the caller.
+--
+-- There's a reason that SMB is sometimes considered to be between layer 4 and
+-- 7 on the OSI model. :)
+--
+--@param smbstate The SMB state table (after <code>bind</code> has been called).
+--@param opnum The operating number (ie, the function). Find this in the
+-- MSRPC documentation or with a packet logger.
+--@param arguments The marshalled arguments to pass to the function. Currently,
+-- marshalling is all done manually.
+--@return status true or false
+--@return If status is false, result is an error message. Otherwise, result is
+-- a table of values, the most useful one being 'arguments', which are
+-- the values returned by the server. If the packet is fragmented, the
+-- fragments will be reassembled and 'arguments' will represent all the
+-- arguments; however, the rest of the result table will represent the
+-- most recent fragment.
+function call_function(smbstate, opnum, arguments)
+ local status, result
+ local parameters, data
+ local pos, align
+ local result
+ local first = true
+ local is_first, is_last
+
+ data = string.pack("<BBBB>I4<I2I2I4I4I2I2",
+ 0x05, -- Version (major)
+ 0x00, -- Version (minor)
+ 0x00, -- Packet type (0x00 = request)
+ 0x03, -- Packet flags (0x03 = first frag + last frag)
+ 0x10000000, -- Data representation (big endian)
+ 0x18 + #arguments, -- Frag length (0x18 = the size of this data)
+ 0x0000, -- Auth length
+ 0x41414141, -- Call ID (I use 'AAAA' because it's easy to recognize)
+ #arguments, -- Alloc hint
+ 0x0000, -- Context ID
+ opnum) -- Opnum
+ .. arguments
+
+ stdnse.debug3("MSRPC: Calling function 0x%02x with %d bytes of arguments", opnum, #arguments)
+
+ -- Pass the information up to the smb layer
+ status, result = smb.write_file(smbstate, data, 0)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Loop over the fragments
+ local arguments = ""
+ repeat
+ -- Read the information from the smb layer
+ status, result = smb.read_file(smbstate, 0, 0x1001)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make these easier to access.
+ parameters = result['parameters']
+ data = result['data']
+
+ -- Extract the first part from the response
+ local fmt = "<BBBB>I4<I2I2I4"
+ if #data < string.packsize(fmt) then
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.version_major, result.version_minor, result.packet_type,
+ result.packet_flags, result.data_representation, result.frag_length,
+ result.auth_length, result.call_id, pos = string.unpack(fmt, data)
+
+ -- Check if we're fragmented
+ is_first = ((result['packet_flags'] & 0x01) == 0x01)
+ is_last = ((result['packet_flags'] & 0x02) == 0x02)
+
+ -- We have a fragmented packet, make sure it's the first (if we're on the first)
+ if(first == true and is_first == false) then
+ return false, "MSRPC: First fragment doesn't have proper 'first' (0x01) flag set"
+ end
+
+ -- We have a fragmented packet, make sure it isn't the first (if we aren't on the first)
+ if(first == false and is_first) then
+ return false, "MSRPC: Middle (or last) fragment doesn't have proper 'first' (0x01) flag set"
+ end
+
+ -- Check if there was an error
+ if(result['packet_type'] == 0x03) then -- MSRPC_FAULT
+ return false, "MSRPC call returned a fault (packet type)"
+ end
+ if((result['packet_flags'] & 0x20) == 0x20) then
+ return false, "MSRPC call returned a fault (flags)"
+ end
+ if(result['auth_length'] ~= 0) then
+ return false, "MSRPC call returned an 'auth length', which we don't know how to deal with"
+ end
+ if(result['packet_type'] ~= 0x02) then
+ return false, "MSRPC call returned an unexpected packet type (not RESPONSE)"
+ end
+ if(result['call_id'] ~= 0x41414141) then
+ return false, "MSRPC call returned an incorrect 'call_id' value"
+ end
+
+ -- Extract some more
+ local fmt = "<I4I2BB"
+ if #data - pos + 1 < string.packsize(fmt) then
+ return false, "MSRPC: ERROR: Ran off the end of SMB packet; likely due to server truncation"
+ end
+ result.alloc_hint, result.context_id, result.cancel_count, align, pos = string.unpack(fmt, data, pos)
+
+ -- Rest is the arguments
+ arguments = arguments .. string.sub(data, pos)
+
+ -- No longer the 'first'
+ first = false
+ until is_last == true
+
+ result['arguments'] = arguments
+
+ stdnse.debug3("MSRPC: Function call successful, %d bytes of returned arguments", #result['arguments'])
+
+ return true, result
+end
+
+---LANMAN API calls use different conventions than everything else, so make a separate function for them.
+function call_lanmanapi(smbstate, opnum, paramdesc, datadesc, data)
+ local status, result
+ local parameters = ""
+ local pos
+
+ parameters = string.pack("<I2zz",
+ opnum,
+ paramdesc, -- Parameter Descriptor
+ datadesc) -- Return Descriptor
+ .. data
+
+ stdnse.debug1("MSRPC: Sending Browser Service request")
+ status, result = smb.send_transaction_named_pipe(smbstate, parameters, nil, "\\PIPE\\LANMAN", true)
+
+ if(not(status)) then
+ return false, "Couldn't call LANMAN API: " .. result
+ end
+
+ return true, result
+end
+
+--- Queries the (master) browser service for a list of server that it manages
+--
+-- @param smbstate The SMB state table (after <code>bind</code> has been called).
+-- @param domain (optional) string containing the domain name to query
+-- @param server_type number containing a server bit mask to use to filter responses
+-- @param detail_level number containing either 0 or 1
+function rap_netserverenum2(smbstate, domain, server_type, detail_level)
+
+ local NETSERVERENUM2 = 0x0068
+ local paramdesc = (domain and "WrLehDz" or "WrLehDO")
+ assert( detail_level > 0 and detail_level < 2, "detail_level must be either 0 or 1")
+ local datadesc = ( detail_level == 0 and "B16" or "B16BBDz")
+ local data = string.pack("<I2I2I4", detail_level,
+ 14724,
+ server_type)
+ .. (domain or "")
+
+ local status, result = call_lanmanapi(smbstate, NETSERVERENUM2, paramdesc, datadesc, data )
+
+ if ( not(status) ) then
+ return false, "MSRPC: NetServerEnum2 call failed"
+ end
+
+ local parameters = result.parameters
+ local data = result.data
+
+ stdnse.debug1("MSRPC: Parsing Browser Service response")
+ local status, convert, entry_count, available_entries, pos = string.unpack("<I2I2I2I2", parameters)
+
+ if(status ~= 0) then
+ return false, string.format("Call to Browser Service failed with status = %d", status)
+ end
+
+ stdnse.debug1("MSRPC: Browser service returned %d entries", entry_count)
+
+
+ local pos = 1
+ local entries = {}
+
+ for i = 1, entry_count, 1 do
+ local server = {}
+
+ server.name, pos = string.unpack("<z", data, pos)
+ stdnse.debug1("MSRPC: Found name: %s", server.name)
+
+ -- pos needs to be rounded to the next even multiple of 16
+ pos = pos + ( 16 - (#server.name % 16) ) - 1
+
+ if ( detail_level > 0 ) then
+ local comment_offset, _
+ server.version = {}
+ server.version.major, server.version.minor,
+ server.type, comment_offset, _, pos = string.unpack("<BBI4I2I2", data, pos)
+
+ server.comment, pos = string.unpack("<z", data, (comment_offset - convert + 1))
+ end
+ table.insert(entries, server)
+ end
+
+ return true, entries
+end
+
+---A proxy to a <code>msrpctypes</code> function that converts a ShareType to
+-- an English string.
+--
+-- I implemented this as a proxy so scripts don't have to make direct calls to
+-- <code>msrpctypes</code> functions.
+--
+--@param val The value to convert.
+--@return A string that can be displayed to the user.
+function srvsvc_ShareType_tostr(val)
+ return msrpctypes.srvsvc_ShareType_tostr(val)
+end
+
+---Call the MSRPC function <code>netshareenumall</code> on the remote system.
+--
+-- This function basically returns a list of all the shares on the system.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's
+-- a good idea to have it)
+--@return status true or false
+--@return If status is false, result is an error message. Otherwise, result is
+-- a table of values, the most useful one being 'shares', which is a
+-- list of the system's shares.
+function srvsvc_netshareenumall(smbstate, server)
+ local status, result
+ local arguments
+ local pos, align
+
+ local level
+ local ctr, referent, count, max_count
+
+ stdnse.debug2("MSRPC: Calling NetShareEnumAll() [%s]", smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc
+ arguments = msrpctypes.marshall_unicode_ptr("\\\\" .. server, true)
+
+ -- [in,out] uint32 level
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in,out,switch_is(level)] srvsvc_NetShareCtr ctr
+ .. msrpctypes.marshall_srvsvc_NetShareCtr(0, {array=nil})
+
+ -- [in] uint32 max_buffer,
+ .. msrpctypes.marshall_int32(4096)
+
+ -- [out] uint32 totalentries
+ -- [in,out] uint32 *resume_handle*
+ .. msrpctypes.marshall_int32_ptr(0)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0F, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetShareEnumAll() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc
+ -- [in,out] uint32 level
+ pos, result['level'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in,out,switch_is(level)] srvsvc_NetShareCtr ctr
+ pos, result['ctr'] = msrpctypes.unmarshall_srvsvc_NetShareCtr(arguments, pos, level)
+ if(pos == nil) then
+ return false, "unmarshall_srvsvc_NetShareCtr() returned an error"
+ end
+
+ -- [out] uint32 totalentries
+ pos, result['totalentries'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in,out] uint32 *resume_handle
+ pos, result['resume_handle'] = msrpctypes.unmarshall_int32_ptr(arguments, pos)
+
+ -- The return value
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netshareenumall)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netshareenumall)"
+ end
+
+ return true, result
+end
+
+---Call the MSRPC function <code>netsharegetinfo</code> on the remote system. This function retrieves extra information about a share
+-- on the system.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's a good idea to have it)
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'shares', which is a list of the system's shares.
+function srvsvc_netsharegetinfo(smbstate, server, share, level)
+ stdnse.debug2("Calling NetShareGetInfo(%s, %s, %d)", server, share, level)
+
+ --NetGetShareInfo seems to reject FQPN and reads the server value from the request
+ --If any function called this function using a FQPN, this should take care of it.
+ local _, _, sharename = string.find(share, "\\\\.*\\(.*)")
+ if sharename then
+ share = sharename
+ end
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ local arguments = msrpctypes.marshall_unicode_ptr("\\\\" .. server, true)
+
+ -- [in] [string,charset(UTF16)] uint16 share_name[],
+ .. msrpctypes.marshall_unicode(share, true)
+
+ -- [in] uint32 level,
+ .. msrpctypes.marshall_int32(level)
+
+ -- [out,switch_is(level)] srvsvc_NetShareInfo info
+
+
+ -- Do the call
+ local status, result = call_function(smbstate, 0x10, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetShareGetInfo() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ local pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ -- [in] [string,charset(UTF16)] uint16 share_name[],
+ -- [in] uint32 level,
+ -- [out,switch_is(level)] srvsvc_NetShareInfo info
+ pos, result['info'] = msrpctypes.unmarshall_srvsvc_NetShareInfo(arguments, pos)
+ if(pos == nil) then
+ return false, "unmarshall_srvsvc_NetShareInfo() returned an error"
+ end
+
+ -- The return value
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netsharegetinfo)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netsharegetinfo)"
+ end
+
+ return true, result
+end
+
+
+---Call the <code>NetSessEnum</code> function, which gets a list of active sessions on the host. For this function,
+-- a session is defined as a connection to a file share.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's a good idea to have it)
+--@return (status, result) If status is false, result is an error message. Otherwise, result is an array of tables.
+-- Each table contains the elements 'user', 'client', 'active', and 'idle'.
+function srvsvc_netsessenum(smbstate, server)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling NetSessEnum() [%s]", smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+
+ -- [in] [string,charset(UTF16)] uint16 *client,
+ .. msrpctypes.marshall_unicode_ptr(nil)
+
+ -- [in] [string,charset(UTF16)] uint16 *user,
+ .. msrpctypes.marshall_unicode_ptr(nil)
+
+ -- [in,out] uint32 level,
+ .. msrpctypes.marshall_int32(10) -- 10 seems to be the only useful one allowed anonymously
+
+ -- [in,out,switch_is(level)] srvsvc_NetSessCtr ctr,
+ .. msrpctypes.marshall_srvsvc_NetSessCtr(10, {array=nil})
+
+ -- [in] uint32 max_buffer,
+ .. msrpctypes.marshall_int32(0xFFFFFFFF)
+
+ -- [out] uint32 totalentries,
+ -- [in,out] uint32 *resume_handle
+ .. msrpctypes.marshall_int32_ptr(0)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0C, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetSessEnum() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ local count
+ local sessions = {}
+ local referent_id
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ -- [in] [string,charset(UTF16)] uint16 *client,
+ -- [in] [string,charset(UTF16)] uint16 *user,
+ -- [in,out] uint32 level,
+ pos, result['level'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in,out,switch_is(level)] srvsvc_NetSessCtr ctr,
+ pos, result['ctr'] = msrpctypes.unmarshall_srvsvc_NetSessCtr(arguments, pos)
+ if(pos == nil) then
+ return false, "unmarshall_srvsvc_NetSessCtr() returned an error"
+ end
+
+ -- [in] uint32 max_buffer,
+ -- [out] uint32 totalentries,
+ pos, result['totalentries'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in,out] uint32 *resume_handle
+ pos, result['resume_handle'] = msrpctypes.unmarshall_int32_ptr(arguments, pos)
+
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netsessenum)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netsessenum)"
+ end
+
+ return true, result
+end
+
+--- Calls the <code>NetServerGetStatistics</code> function, which grabs a bunch of statistics on the server.
+-- This function requires administrator access to call.
+--
+-- Note: Wireshark 1.0.3 doesn't parse this packet properly.
+--
+--@param smbstate The SMB state table
+--@param server The IP or name of the server (I don't think this is actually used, but it's
+-- good practice to send it).
+--
+--@return A table containing the following values:
+-- * 'start' The time when statistics collection started (or when the statistics were last cleared). The value is
+-- stored as the number of seconds that have elapsed since 00:00:00, January 1, 1970, GMT. To calculate
+-- the length of time that statistics have been collected, subtract the value of this member from the
+-- present time. 'start_date' is the date as a string.
+-- * 'fopens' The number of times a file is opened on a server. This includes the number of times named pipes are opened.
+-- * 'devopens' The number of times a server device is opened.
+-- * 'jobsqueued' The number of server print jobs spooled.
+-- * 'sopens' The number of times the server session started.
+-- * 'stimedout' The number of times the server session automatically disconnected.
+-- * 'serrorout' The number of times the server sessions failed with an error.
+-- * 'pwerrors' The number of server password violations.
+-- * 'permerrors' The number of server access permission errors.
+-- * 'syserrors' The number of server system errors.
+-- * 'bytessent' The number of server bytes sent to the network.
+-- * 'bytesrcvd' The number of server bytes received from the network.
+-- * 'avresult' The average server result time (in milliseconds).
+-- * 'reqbufneed' The number of times the server required a request buffer but failed to allocate one. This value indicates that the server parameters may need adjustment.
+-- * 'bigbufneed' The number of times the server required a big buffer but failed to allocate one. This value indicates that the server parameters may need adjustment.
+function srvsvc_netservergetstatistics(smbstate, server)
+ local status, result
+ local arguments
+ local pos, align
+
+ local service = "SERVICE_SERVER"
+
+ stdnse.debug2("MSRPC: Calling NetServerGetStatistics() [%s]", smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+
+ -- [in] [string,charset(UTF16)] uint16 *service,
+ .. msrpctypes.marshall_unicode_ptr(service, true)
+
+ -- [in] uint32 level,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 options,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [out] srvsvc_Statistics stat
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x18, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetServerGetStatistics() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ -- [in] [string,charset(UTF16)] uint16 *service,
+ -- [in] uint32 level,
+ -- [in] uint32 options,
+ -- [out] srvsvc_Statistics stat
+ pos, result['stat'] = msrpctypes.unmarshall_srvsvc_Statistics_ptr(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netservergetstatistics)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netservergetstatistics)"
+ end
+
+ return true, result
+end
+
+---Call the NetPathCompare() function, which indirectly calls NetPathCanonicalize(),
+-- the target of ms08-067. I'm currently only using this to trigger ms08-067.
+--
+-- The string used by Metasploit and other free tools to check for this vulnerability is
+-- '\AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\..\n'. On vulnerable systems, this will be
+-- accepted and this function will return '0'. On patched systems, this will be rejected
+-- and return <code>ERROR_INVALID_PARAMETER</code>.
+--
+-- Note that the srvsvc.exe process occasionally crashes when attempting this.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's a good idea to have it)
+--@param path1 The first path to compare
+--@param path2 The second path to compare
+--@param pathtype The pathtype to pass to the function (I always use '1')
+--@param pathflags The pathflags to pass to the function (I always use '0')
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values containing
+-- 'return'.
+function srvsvc_netpathcompare(smbstate, server, path1, path2, pathtype, pathflags)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling NetPathCompare(%s, %s) [%s]", path1, path2, smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+
+ -- [in] [string,charset(UTF16)] uint16 path1[],
+ .. msrpctypes.marshall_unicode(path1, true)
+
+ -- [in] [string,charset(UTF16)] uint16 path2[],
+ .. msrpctypes.marshall_unicode(path2, true)
+
+ -- [in] uint32 pathtype,
+ .. msrpctypes.marshall_int32(pathtype)
+
+ -- [in] uint32 pathflags
+ .. msrpctypes.marshall_int32(pathflags)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x20, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetPathCompare() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ -- [in] [string,charset(UTF16)] uint16 path1[],
+ -- [in] [string,charset(UTF16)] uint16 path2[],
+ -- [in] uint32 pathtype,
+ -- [in] uint32 pathflags
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netpathcompare)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netpathcompare)"
+ end
+
+ return true, result
+
+end
+
+
+---Call the NetPathCanonicalize() function, which is the target of ms08-067.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's a good idea to have it)
+--@param path The path to canonicalize
+--@return (status, result, error_result) If status is false, result is an error message and error_result is
+-- the result table. Otherwise, result is a table of values.
+function srvsvc_netpathcanonicalize(smbstate, server, path)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling NetPathCanonicalize(%s) [%s]", path, smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+ -- [in] [string,charset(UTF16)] uint16 path[],
+ .. msrpctypes.marshall_unicode(path, true)
+ -- [out] [size_is(maxbuf)] uint8 can_path[],
+ -- [in] uint32 maxbuf,
+ .. msrpctypes.marshall_int32(2)
+
+ -- [in] [string,charset(UTF16)] uint16 prefix[],
+ .. msrpctypes.marshall_unicode("\\", true)
+
+ -- [in,out] uint32 pathtype,
+ .. msrpctypes.marshall_int32(1)
+ -- [in] uint32 pathflags
+ .. msrpctypes.marshall_int32(1)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x1F, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: NetPathCanonicalize() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *server_unc,
+ -- [in] [string,charset(UTF16)] uint16 path[],
+ -- [out] [size_is(maxbuf)] uint8 can_path[],A
+ -- [in] uint32 maxbuf,
+ -- [in] [string,charset(UTF16)] uint16 prefix[],
+ -- [in,out] uint32 pathtype,
+ -- [in] uint32 pathflags
+
+ -- NOTE: This isn't being done correctly.. due to Wireshark's broken parsing,
+ -- and Samba's possibly-broken definition, I'm not sure how this is supposed
+ -- to be parsed.
+ pos, result['max_count'] = msrpctypes.unmarshall_int32(arguments, pos)
+ pos, result['can_path'] = msrpctypes.unmarshall_int32(arguments, pos)
+ pos, result['type'] = msrpctypes.unmarshall_int32(arguments, pos)
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (srvsvc.netpathcanonicalize)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (srvsvc.netpathcanonicalize)", result
+ end
+
+ return true, result
+
+end
+
+
+---Call the RpcOpenPrinterEx() function whose opnum is 69.
+--
+-- http://msdn.microsoft.com/en-us/library/cc244809%28v=prot.13%29.aspx
+--@param smbstate The SMB state table
+--@param printer Printer share name
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a printer handle.
+function spoolss_open_printer(smbstate,printer)
+ local machine = msrpctypes.marshall_unicode_ptr("",true)
+ local user = msrpctypes.marshall_unicode_ptr("",true)
+
+ local arguments = msrpctypes.marshall_unicode_ptr(printer,true)
+ .. msrpctypes.marshall_int32(0)
+ --devmod container
+ .. msrpctypes.marshall_int32(0)
+ .. msrpctypes.marshall_int32(0)
+ --access we require
+ .. msrpctypes.marshall_int32(0x02020000)
+ -- spool client container
+ .. msrpctypes.marshall_int32(1)
+ .. msrpctypes.marshall_int32(1)
+ .. msrpctypes.marshall_int32(12345135)
+
+ local arguments2 = string.sub(machine,1,4)
+ .. string.sub(user,1,4)
+ .. msrpctypes.marshall_int32(7600)
+ .. msrpctypes.marshall_int32(3)
+ .. msrpctypes.marshall_int32(0)
+ .. msrpctypes.marshall_int32(9)
+ .. string.sub(machine,5,#machine)
+ .. string.sub(user,5,#user)
+ arguments2 = msrpctypes.marshall_int32(#arguments2+4) .. arguments2
+
+ local status, result = call_function(smbstate, 69, arguments .. arguments2)
+ if not status then
+ stdnse.debug1("MSRPC spoolss_open_printer(): %s ",result)
+ end
+ return status,result
+
+end
+
+---Call the RpcStartDocPrinter() function whose opnum is 17.
+--
+-- http://msdn.microsoft.com/en-us/library/cc244828%28v=prot.10%29.aspx
+--@param smbstate The SMB state table
+--@param printer_handle Printer handle returned by spoolss_open_printer()
+--@param filename Name of the file to print to
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a print job id.
+function spoolss_start_doc_printer(smbstate,printer_handle,filename)
+ local document_name = msrpctypes.marshall_unicode_ptr("nmap_test",true)
+ local fname = msrpctypes.marshall_unicode_ptr(filename,true)
+ local dtype = msrpctypes.marshall_int32(0)
+
+ local arguments = printer_handle .. msrpctypes.marshall_int32(1)
+
+ local document_container = msrpctypes.marshall_int32(1)
+ .. msrpctypes.marshall_int32(12332131)
+ .. string.sub(document_name,1,4)
+ .. string.sub(fname,1,4)
+ .. string.sub(dtype,1,4)
+ .. string.sub(document_name,5,#document_name)
+ .. string.sub(fname,5,#fname)
+ .. string.sub(dtype,5,#dtype)
+
+ local status, result = call_function(smbstate, 17, arguments .. document_container)
+ if not status then
+ stdnse.debug1("MSRPC spoolss_start_doc_printer(): %s",result)
+ end
+ return status,result
+end
+
+---Call the RpcWritePrinter() function whose opnum is 19.
+--
+-- http://msdn.microsoft.com/en-us/library/cc244831%28v=prot.10%29
+--@param smbstate The SMB state table
+--@param printer_handle Printer handle returned by spoolss_open_printer()
+--@param data Actual data to write to a file
+--@return (status, result) If status is false, result is an error message. Otherwise, result is number of bytes written.
+function spoolss_write_printer(smbstate,printer_handle,data)
+ local padding_len = 4 - math.fmod(#data,4)
+ local data_padding = nil
+ if not (padding_len == 4) then
+ data_padding = string.rep('\0', padding_len)
+ end
+ local arguments = printer_handle .. msrpctypes.marshall_int32(#data)
+ --.. msrpctypes.marshall_int32(#data)
+ .. data
+ .. (data_padding or "")
+ .. msrpctypes.marshall_int32(#data)
+ local status,result = call_function(smbstate, 19, arguments)
+ if not status then
+ stdnse.debug1("MSRPC spoolss_write_printer(): %s",result)
+ end
+ return status,result
+end
+
+---Call the EndDocPrinter() function whose opnum is 23.
+--
+-- http://msdn.microsoft.com/en-us/library/cc244783%28v=prot.10%29
+--@param smbstate The SMB state table
+--@param printer_handle Printer handle returned by spoolss_open_printer()
+--@return (status, result) If status is false, result is an error message.
+function spoolss_end_doc_printer(smbstate,printer_handle)
+ local status,result = call_function(smbstate,23,printer_handle)
+ if not status then
+ stdnse.debug1("MSRPC spoolss_end_doc_printer(): %s",result)
+ end
+ return status,result
+end
+
+---Call the RpcAbortPrinter() function whose opnum is 21.
+--
+-- http://msdn.microsoft.com/en-us/library/cc244757%28v=prot.13%29
+--@param smbstate The SMB state table
+--@param printer_handle Printer handle returned by spoolss_open_printer()
+--@return (status, result) If status is false, result is an error message.
+function spoolss_abort_printer(smbstate,printer_handle)
+ local status,result = call_function(smbstate,21,printer_handle)
+ if not status then
+ stdnse.debug1("MSRPC spoolss_abort_printer(): %s",result)
+ end
+ return status,result
+end
+
+
+---Helper function to convert binary UUID representation to usual string.
+--
+--@param uuid UUID byte string
+--@return UUID converted to string representation
+function uuid_to_string(uuid)
+ -- Mixed-endian; first 3 parts are little-endian, next 2 are big-endian
+ local A, B, C, D, E = string.unpack("<I4I2I2>c2c6", uuid)
+ return ("%08x-%04x-%04x-%s-%s"):format(A, B, C, stdnse.tohex(D), stdnse.tohex(E))
+end
+
+--- Helper function that maps known UUIDs to corresponding exe/services.
+--
+--@param uuid
+--@return Corresponding service and description as a string or nil.
+function string_uuid_to_exe(uuid)
+ return UUID2EXE[uuid]
+end
+
+--- Lookup endpoint mapper for endpoints
+--
+-- Queries the remote endpoint mapper and parses data into a table with following values:
+-- *'new_handle'
+-- *'annotation'
+-- *'uuid'
+-- *'exe'
+-- *'tcp_port'
+-- *'udp_port'
+-- *'ip_addr'
+-- *'ncalrpc'
+-- *'ncacn_np'
+-- *'netbios'
+-- *'ncacn_http'
+--@param smbstate The SMB state table.
+--@param handle Handle to use for query.
+--@return (status,lookup_result) If status is false, lookup_result contains an error string, otherwise it's a lookup response table.
+function epmapper_lookup(smbstate,handle)
+ if handle == nil then -- if it's a first request, send a null handle
+ handle = string.rep('\0', 20)
+ end
+ -- void ept_lookup(
+ -- [in] handle_t h,
+ -- [in] unsigned32 inquiry_type,
+ -- [in] uuid_p_t object,
+ -- [in] rpc_if_id_p_t interface_id,
+ -- [in] unsigned32 vers_option,
+ -- [in, out] ept_lookup_handle_t *entry_handle,
+ -- [in] unsigned32 max_ents,
+ -- [out] unsigned32 *num_ents,
+ -- [out, length_is(*num_ents), size_is(max_ents)]
+ -- ept_entry_t entries[],
+ -- [out] error_status_t *status
+ -- );
+ local params = msrpctypes.marshall_int32(0) .. msrpctypes.marshall_int32(0) .. msrpctypes.marshall_int32(0) .. msrpctypes.marshall_int32(0)
+ .. handle .. msrpctypes.marshall_int32(1)
+
+ local status,result = call_function(smbstate,2,params)
+ if not status then
+ stdnse.debug1("MSRPC epmapper_lookup(): %s",result)
+ end
+
+ local data = result.data
+ -- parse data
+ -- skip 24 bytes of common DCE header
+ local pos
+ local lookup_response = {
+ new_handle = nil,
+ annotation = nil,
+ uuid = nil,
+ exe = nil,
+ tcp_port = nil,
+ udp_port = nil,
+ ip_addr = nil,
+ ncalrpc = nil,
+ ncacn_np = nil,
+ netbios = nil,
+ ncacn_http = nil
+ }
+
+ lookup_response.new_handle = string.sub(data,25,44)
+
+ -- stdnse.debug1("new_handle: %s", stdnse.tohex(new_handle))
+
+ local num_entries
+ num_entries, pos = string.unpack("<I4", data, 45)
+ if num_entries == 0 then
+ return false, "finished"
+ end
+ --skip max count, offset, actual count
+ pos = pos + 12
+ --skip object ,
+ pos = pos + 16
+ pos = pos + 8
+ local annotation_length
+ annotation_length, pos = string.unpack("<I4", data, pos)
+ if annotation_length > 1 then
+ lookup_response.annotation = string.sub(data,pos,pos+annotation_length-2)
+ end
+ local padding = (4-(annotation_length%4))
+ if padding == 4 then padding = 0 end
+ pos = pos + annotation_length + padding
+ --skip lengths
+ pos = pos + 8
+ local num_floors,floor_len,uuid, address_type,address_len,tcp_port,udp_port,ip_addr,saved_pos,ncalrpc,ncacn_np,netbios,ncacn_http
+ num_floors, pos = string.unpack("<I2", data, pos)
+
+ for i = 1, num_floors do
+ saved_pos = pos
+ floor_len, pos = string.unpack("<I2", data, pos)
+
+ if i == 1 then
+ uuid = string.sub(data,pos+1,pos+16)
+ lookup_response.uuid = uuid_to_string(uuid)
+ lookup_response.exe = string_uuid_to_exe(lookup_response.uuid)
+ else
+ if not (i == 2) and not (i == 3) then -- just skip floor 2 and 3
+ address_type, address_len, pos = string.unpack("<BI2", data, pos)
+ if address_type == 0x07 then
+ lookup_response.tcp_port, pos = string.unpack(">I2", data, pos)
+ elseif address_type == 0x08 then
+ lookup_response.udp_port, pos = string.unpack(">I2", data, pos)
+ elseif address_type == 0x09 then
+ local ip
+ ip, pos = string.unpack("c4", data, pos)
+ lookup_response.ip_addr = ipOps.str_to_ip(ip)
+ elseif address_type == 0x0f then
+ lookup_response.ncacn_np = string.sub(data,pos,pos+address_len-2)
+ floor_len = floor_len + address_len - 2
+ elseif address_type == 0x10 then
+ lookup_response.ncalrpc = string.sub(data,pos,pos+address_len-2)
+ floor_len = floor_len + address_len - 2
+ elseif address_type == 0x11 then
+ lookup_response.netbios = string.sub(data,pos,pos+address_len-2)
+ floor_len = floor_len + address_len - 2
+ elseif address_type == 0x1f then
+ lookup_response.ncacn_http, pos = string.unpack(">I2", data, pos)
+ else
+ stdnse.debug1("unknown address type %x",address_type)
+ end
+ end
+ end
+ pos = saved_pos + floor_len + 6
+ end
+ return status,lookup_response
+end
+
+---A proxy to a <code>msrpctypes</code> function that converts a PasswordProperties to an English string.
+--
+-- I implemented this as a proxy so scripts don't have to make direct calls to
+-- <code>msrpctypes</code> functions.
+--
+--@param val The value to convert.
+--@return A string that can be displayed to the user.
+function samr_PasswordProperties_tostr(val)
+ return msrpctypes.samr_PasswordProperties_tostr(val)
+end
+
+---A proxy to a <code>msrpctypes</code> function that converts a AcctFlags to
+-- an English string.
+--
+-- I implemented this as a proxy so scripts don't have to make direct calls to
+-- <code>msrpctypes</code> functions.
+--
+--@param val The value to convert.
+--@return A string that can be displayed to the user.
+function samr_AcctFlags_tostr(val)
+ return msrpctypes.samr_AcctFlags_tostr(val)
+end
+
+---Call the <code>connect4</code> function, to obtain a "connect handle".
+--
+-- This must be done before calling many of the SAMR functions.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's
+-- a good idea to have it)
+--@return status true or false
+--@return If status is false, result is an error message. Otherwise, result is
+-- a table of values, the most useful one being 'connect_handle', which
+-- is required to call other functions.
+function samr_connect4(smbstate, server)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling Connect4() [%s]", smbstate['ip'])
+
+ -- [in,string,charset(UTF16)] uint16 *system_name,
+ arguments = msrpctypes.marshall_unicode_ptr("\\\\" .. server, true)
+
+ -- [in] uint32 unknown,
+ .. msrpctypes.marshall_int32(0x02)
+
+ -- [in] samr_ConnectAccessMask access_mask,
+ .. msrpctypes.marshall_samr_ConnectAccessMask("SAMR_ACCESS_ENUM_DOMAINS|SAMR_ACCESS_OPEN_DOMAIN")
+ -- [out,ref] policy_handle *connect_handle
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x3E, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: Connect4() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+ -- [in,string,charset(UTF16)] uint16 *system_name,
+ -- [in] uint32 unknown,
+ -- [in] samr_ConnectAccessMask access_mask,
+ -- [out,ref] policy_handle *connect_handle
+ pos, result['connect_handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.connect4)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.connect4)"
+ end
+
+ return true, result
+end
+
+---Call the <code>enumdomains</code> function, which returns a list of all domains in use by the system.
+--
+--@param smbstate The SMB state table
+--@param connect_handle The connect_handle, returned by samr_connect4()
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'domains', which is a list of the domains.
+function samr_enumdomains(smbstate, connect_handle)
+ local status, result
+ local arguments
+ local result
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling EnumDomains() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *connect_handle,
+ arguments = msrpctypes.marshall_policy_handle(connect_handle)
+
+ -- [in,out,ref] uint32 *resume_handle,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 buf_size,
+ .. msrpctypes.marshall_int32(0x2000)
+
+ -- [out] samr_SamArray *sam,
+ -- [out] uint32 num_entries
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x06, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: EnumDomains() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+
+ -- [in,ref] policy_handle *connect_handle,
+ -- [in,out,ref] uint32 *resume_handle,
+ pos, result['resume_handle'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in] uint32 buf_size,
+ -- [out] samr_SamArray *sam,
+ pos, result['sam'] = msrpctypes.unmarshall_samr_SamArray_ptr(arguments, pos)
+
+ -- [out] uint32 num_entries
+ pos, result['num_entries'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.enumdomains)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.enumdomains)"
+ end
+
+ return true, result
+end
+
+---Call the <code>LookupDomain</code> function, which converts a domain's name into its sid, which is
+-- required to do operations on the domain.
+--
+--@param smbstate The SMB state table
+--@param connect_handle The connect_handle, returned by <code>samr_connect4</code>
+--@param domain The name of the domain (all domain names can be obtained with <code>samr_enumdomains</code>)
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'sid', which is required to call other functions.
+function samr_lookupdomain(smbstate, connect_handle, domain)
+ local status, result
+ local arguments
+ local pos, align
+ local referent_id
+
+ stdnse.debug2("MSRPC: Calling LookupDomain(%s) [%s]", domain, smbstate['ip'])
+
+ -- [in,ref] policy_handle *connect_handle,
+ arguments = msrpctypes.marshall_policy_handle(connect_handle)
+
+ -- [in,ref] lsa_String *domain_name,
+ .. msrpctypes.marshall_lsa_String(domain)
+
+ -- [out] dom_sid2 *sid
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x05, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: LookupDomain() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+
+
+ -- [in,ref] policy_handle *connect_handle,
+ -- [in,ref] lsa_String *domain_name,
+ -- [out] dom_sid2 *sid
+ pos, result['sid'] = msrpctypes.unmarshall_dom_sid2_ptr(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.lookupdomain)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.lookupdomain)"
+ end
+
+ return true, result
+end
+
+---Call <code>OpenDomain</code>, which returns a handle to the domain identified by the given sid.
+-- This is required before calling certain functions.
+--
+--@param smbstate The SMB state table
+--@param connect_handle The connect_handle, returned by <code>samr_connect4</code>
+--@param sid The sid for the domain, returned by <code>samr_lookupdomain</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'domain_handle', which is used to call other functions.
+function samr_opendomain(smbstate, connect_handle, sid)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenDomain(%s) [%s]", sid, smbstate['ip'])
+
+ -- [in,ref] policy_handle *connect_handle,
+ arguments = msrpctypes.marshall_policy_handle(connect_handle)
+
+ -- [in] samr_DomainAccessMask access_mask,
+ .. msrpctypes.marshall_samr_DomainAccessMask("DOMAIN_ACCESS_LOOKUP_INFO_1|DOMAIN_ACCESS_LOOKUP_INFO_2|DOMAIN_ACCESS_ENUM_ACCOUNTS|DOMAIN_ACCESS_OPEN_ACCOUNT")
+
+ -- [in,ref] dom_sid2 *sid,
+ .. msrpctypes.marshall_dom_sid2(sid)
+
+ -- [out,ref] policy_handle *domain_handle
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x07, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenDomain() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *connect_handle,
+ -- [in] samr_DomainAccessMask access_mask,
+ -- [in,ref] dom_sid2 *sid,
+ -- [out,ref] policy_handle *domain_handle
+ pos, result['domain_handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.opendomain)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.opendomain)"
+ end
+
+ return true, result
+end
+
+---Call <code>EnumDomainUsers</code>, which returns a list of users only. To get more information about the users, the
+-- QueryDisplayInfo() function can be used.
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'names', which is a list of usernames in that domain.
+function samr_enumdomainusers(smbstate, domain_handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling EnumDomainUsers() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *domain_handle,
+ arguments = msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in,out,ref] uint32 *resume_handle,
+ .. msrpctypes.marshall_int32_ptr(nil)
+
+ -- [in] samr_AcctFlags acct_flags,
+ .. msrpctypes.marshall_samr_AcctFlags("ACB_NONE")
+
+ -- [in] uint32 max_size,
+ .. msrpctypes.marshall_int32(0x0400)
+
+ -- [out] samr_SamArray *sam,
+ -- [out] uint32 num_entries
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0d, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: EnumDomainUsers() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *domain_handle,
+ -- [in,out,ref] uint32 *resume_handle,
+ pos, result['resume_handle'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in] samr_AcctFlags acct_flags,
+ -- [in] uint32 max_size,
+ -- [out] samr_SamArray *sam,
+ pos, result['sam'] = msrpctypes.unmarshall_samr_SamArray_ptr(arguments, pos)
+
+ -- [out] uint32 num_entries
+ pos, result['num_entries'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.enumdomainusers)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.enumdomainusers)"
+ end
+
+ return true, result
+
+end
+
+---Call <code>QueryDisplayInfo</code>, which returns a list of users with accounts on the system, as well as extra information about
+-- them (their full name and description).
+--
+-- I found in testing that trying to get all the users at once is a mistake, it returns ERR_BUFFER_OVERFLOW, so instead I'm
+-- only reading one user at a time. My recommendation is to start at <code>index</code> = 0, and increment until you stop getting
+-- an error indicator in <code>result['return']</code>.
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain handle, returned by <code>samr_opendomain</code>
+--@param index The index of the user to check; the first user is 0, next is 1, etc.
+--@param count [optional] The number of users to return; you may want to be careful about going too high. Default: 1.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful ones being 'names', a list of all the usernames, and 'details', a further list of tables with the elements
+-- 'name', 'fullname', and 'description' (note that any of them can be nil if the server didn't return a value). Finally,
+-- 'flags' is the numeric flags for the user, while 'flags_list' is an array of strings, representing the flags.
+function samr_querydisplayinfo(smbstate, domain_handle, index, count)
+ local status, result
+ local arguments
+ local pos, align
+
+ if(count == nil) then
+ count = 1
+ end
+
+ -- This loop is because, in my testing, if I asked for all the results at once, it would blow up (ERR_BUFFER_OVERFLOW). So, instead,
+ -- I put a little loop here and grab the names individually.
+ stdnse.debug2("MSRPC: Calling QueryDisplayInfo(%d) [%s]", index, smbstate['ip'])
+
+ -- [in,ref] policy_handle *domain_handle,
+ arguments = msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in] uint16 level,
+ .. msrpctypes.marshall_int16(1) -- Level (1 = users, 3 = groups, 4 = usernames only)
+
+ -- [in] uint32 start_idx,
+ .. msrpctypes.marshall_int32(index)
+
+ -- [in] uint32 max_entries,
+ .. msrpctypes.marshall_int32(count)
+
+ -- [in] uint32 buf_size,
+ .. msrpctypes.marshall_int32(0x7FFFFFFF)
+
+ -- [out] uint32 total_size,
+ -- [out] uint32 returned_size,
+ -- [out,switch_is(level)] samr_DispInfo info
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x28, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: QueryDisplayInfo() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *domain_handle,
+ -- [in] uint16 level,
+ -- [in] uint32 start_idx,
+ -- [in] uint32 max_entries,
+ -- [in] uint32 buf_size,
+ -- [out] uint32 total_size,
+ pos, result['total_size'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out] uint32 returned_size,
+ pos, result['returned_size'] = msrpctypes.unmarshall_int32(arguments, pos)
+ -- [out,switch_is(level)] samr_DispInfo info
+ pos, result['info'] = msrpctypes.unmarshall_samr_DispInfo(arguments, pos)
+ if(pos == nil) then
+ return false, "SMB: An error occurred while calling unmarshall_samr_DispInfo"
+ end
+
+ -- Get the return value
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.querydisplayall)"
+ end
+ if(result['return'] ~= 0 and result['return'] ~= smb.status_codes['NT_STATUS_MORE_ENTRIES']) then
+ return false, smb.get_status_name(result['return']) .. " (samr.querydisplayinfo)"
+ end
+
+ return true, result
+end
+
+---Call <code>QueryDomainInfo2</code>, which grabs various data about a domain.
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@param level The level, which determines which type of information to query for. See the @return section
+-- for details.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values,
+-- and the values that are returned are dependent on the 'level' settings:
+-- Level 1:
+-- 'min_password_length' (in characters)
+-- 'password_history_length' (in passwords)
+-- 'password_properties'
+-- 'password_properties_list' (array of strings)
+-- 'max_password_age' (in days)
+-- 'min_password_age' (in days)
+-- Level 8
+-- 'create_time' (1/10ms since 1601)
+-- 'create_date' (string)
+-- Level 12
+-- 'lockout_duration' (in minutes)
+-- 'lockout_window' (in minutes)
+-- 'lockout_threshold' (in attempts)
+function samr_querydomaininfo2(smbstate, domain_handle, level)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling QueryDomainInfo2(%d) [%s]", level, smbstate['ip'])
+
+ -- [in,ref] policy_handle *domain_handle,
+ arguments = msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in] uint16 level,
+ .. msrpctypes.marshall_int32(level)
+
+ -- [out,switch_is(level)] samr_DomainInfo *info
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x2e, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: QueryDomainInfo2() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *domain_handle,
+ -- [in] uint16 level,
+ -- [out,switch_is(level)] samr_DomainInfo *info
+ pos, result['info'] = msrpctypes.unmarshall_samr_DomainInfo_ptr(arguments, pos)
+ if(pos == nil) then
+ return false, "unmarshall_samr_DomainInfo_ptr() returned an error"
+ end
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.querydomaininfo2)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.querydomaininfo2)"
+ end
+
+ return true, result
+end
+
+---Call the <code>EnumDomainAliases</code> function, which retrieves a list of groups for a given domain
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+function samr_enumdomainaliases(smbstate, domain_handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ arguments = ''
+
+ -- [in] policy_handle *domain_handle,
+ .. msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in,out,ref] uint32 *resume_handle,
+ .. msrpctypes.marshall_int32_ptr(nil)
+
+ -- [out,ref] samr_SamArray **sam,
+ -- [in] uint32 max_size, (note: Wireshark says this is flags. Either way..)
+ .. msrpctypes.marshall_int32(0x400)
+
+ -- [out,ref] uint32 *num_entries
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0f, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] policy_handle *domain_handle,
+ -- [in,out,ref] uint32 *resume_handle,
+ pos, result['resume_handle'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] samr_SamArray **sam,
+ pos, result['sam'] = msrpctypes.unmarshall_samr_SamArray_ptr(arguments, pos)
+
+ -- [in] uint32 max_size,
+ -- [out,ref] uint32 *num_entries
+ pos, result['num_entries'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.enumdomainaliases)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.enumdomainaliases)"
+ end
+
+ return true, result
+end
+
+---Call the <code>EnumDomainAliases</code> function, which retrieves a list of groups for a given domain
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+function samr_lookupnames(smbstate, domain_handle, names)
+ local status, result
+ local arguments
+ local pos, align
+
+ arguments = ''
+
+ -- [in,ref] policy_handle *domain_handle,
+ .. msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in,range(0,1000)] uint32 num_names,
+ .. msrpctypes.marshall_int32(#names)
+
+ -- [in,size_is(1000),length_is(num_names)] lsa_String names[],
+ .. msrpctypes.marshall_lsa_String_array2(names)
+
+ -- [out,ref] samr_Ids *rids,
+ -- [out,ref] samr_Ids *types
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x11, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *domain_handle,
+ -- [in,range(0,1000)] uint32 num_names,
+ -- [in,size_is(1000),length_is(num_names)] lsa_String names[],
+ -- [out,ref] samr_Ids *rids,
+ pos, result['rids'] = msrpctypes.unmarshall_samr_Ids(arguments, pos)
+
+ -- [out,ref] samr_Ids *types
+ pos, result['types'] = msrpctypes.unmarshall_samr_Ids(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.lookupnames)"
+ end
+ if(result['return'] == smb.status_codes['NT_STATUS_NONE_MAPPED']) then
+ return false, "Couldn't find any names the host recognized"
+ end
+
+ if(result['return'] ~= 0 and result['return'] ~= smb.status_codes['NT_STATUS_SOME_NOT_MAPPED']) then
+ return false, smb.get_status_name(result['return']) .. " (samr.lookupnames)"
+ end
+
+ return true, result
+end
+
+---Call the <code>OpenAlias</code> function, which gets a handle to a group.
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@param rid The RID of the alias
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+function samr_openalias(smbstate, domain_handle, rid)
+ local status, result
+ local arguments
+ local pos, align
+
+ arguments = ''
+
+ -- [in,ref] policy_handle *domain_handle,
+ .. msrpctypes.marshall_policy_handle(domain_handle)
+
+ -- [in] samr_AliasAccessMask access_mask,
+ .. msrpctypes.marshall_int32(0x0002000c) -- Full read permission
+
+ -- [in] uint32 rid,
+ .. msrpctypes.marshall_int32(rid)
+
+ -- [out,ref] policy_handle *alias_handle
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x1b, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *domain_handle,
+ -- [in] samr_AliasAccessMask access_mask,
+ -- [in] uint32 rid,
+ -- [out,ref] policy_handle *alias_handle
+ pos, result['alias_handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.openalias)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.openalias)"
+ end
+
+ return true, result
+end
+
+---Call the <code>GetAliasMembership</code> function.
+--Sends the "raw" data, without marshaling.
+--
+--@param smbstate The SMB state table
+--@param alias_handle The alias_handle, already marshaled
+--@param args Actual data to send, already marshaled
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+function samr_getaliasmembership(smbstate, alias_handle,args)
+ local status, result
+ local arguments = alias_handle .. args
+ -- Do the call
+ status, result = call_function(smbstate, 0x10, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ return true, result
+end
+
+---Call the <code>GetMembersInAlias</code> function, which retrieves a list of users in
+-- a group.
+--
+--@param smbstate The SMB state table
+--@param alias_handle The alias_handle, returned by <code>samr_openalias</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+function samr_getmembersinalias(smbstate, alias_handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ arguments = ''
+
+ -- [in,ref] policy_handle *alias_handle,
+ .. msrpctypes.marshall_policy_handle(alias_handle)
+ -- [out,ref] lsa_SidArray *sids
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x21, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *alias_handle,
+ -- [out,ref] lsa_SidArray *sids
+ pos, result['sids'] = msrpctypes.unmarshall_lsa_SidArray(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.getmembersinalias)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.getmembersinalias)"
+ end
+
+ return true, result
+end
+
+-- Call the <code>LookupRids</code> function, which converts a list of RIDs to
+-- names.
+--
+--NOTE: This doesn't appear to work (it generates a fault, despite the packet being properly formatted).
+--if you ever feel like you need this function, check out <code>lsa_lookupsids2</code>.
+--
+--@param smbstate The SMB state table
+--@param domain_handle The domain_handle, returned by <code>samr_opendomain</code>
+--@param rids An array of RIDs to look up
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+--function samr_lookuprids(smbstate, domain_handle, rids)
+-- local status, result
+-- local arguments
+-- local pos, align
+--
+-- arguments = ''
+--
+---- [in,ref] policy_handle *domain_handle,
+-- arguments = arguments .. msrpctypes.marshall_policy_handle(domain_handle)
+---- [in,range(0,1000)] uint32 num_rids,
+-- arguments = arguments .. msrpctypes.marshall_int32(#rids)
+---- [in,size_is(1000),length_is(num_rids)] uint32 rids[],
+-- arguments = arguments .. msrpctypes.marshall_int32_array(rids)
+---- [out,ref] lsa_Strings *names,
+---- [out,ref] samr_Ids *types
+--
+--
+-- -- Do the call
+-- status, result = call_function(smbstate, 0x12, arguments)
+-- if(status ~= true) then
+-- return false, result
+-- end
+--
+-- -- Make arguments easier to use
+-- arguments = result['arguments']
+-- pos = 1
+--
+---- [in,ref] policy_handle *domain_handle,
+---- [in,range(0,1000)] uint32 num_rids,
+---- [in,size_is(1000),length_is(num_rids)] uint32 rids[],
+---- [out,ref] lsa_Strings *names,
+---- [out,ref] samr_Ids *types
+--
+--
+-- pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+--stdnse.debug1("Return = %08x\n", result['return'])
+-- if(result['return'] == nil) then
+-- return false, "Read off the end of the packet (samr.getmembersinalias)"
+-- end
+-- if(result['return'] ~= 0) then
+-- return false, smb.get_status_name(result['return']) .. " (samr.getmembersinalias)"
+-- end
+--
+-- return true, result
+--end
+
+
+
+---Call the <code>close</code> function, which closes a handle of any type (for example, domain_handle or connect_handle)
+--@param smbstate The SMB state table
+--@param handle The handle to close
+--@return (status, result) If status is false, result is an error message. Otherwise, result is potentially
+-- a table of values, none of which are likely to be used.
+function samr_close(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+
+ stdnse.debug2("MSRPC: Calling Close() [%s]", smbstate['ip'])
+
+ -- [in,out,ref] policy_handle *handle
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x01, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: Close() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (samr.close)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (samr.close)"
+ end
+
+ return true, result
+end
+
+---Call the <code>LsarOpenPolicy2</code> function, to obtain a "policy handle". This must be done before calling many
+-- of the LSA functions.
+--
+--@param smbstate The SMB state table
+--@param server The IP or Hostname of the server (seems to be ignored but it's a good idea to have it)
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'policy_handle', which is required to call other functions.
+function lsa_openpolicy2(smbstate, server)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling LsarOpenPolicy2() [%s]", smbstate['ip'])
+
+ -- [in,unique] [string,charset(UTF16)] uint16 *system_name,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+
+ -- [in] lsa_ObjectAttribute *attr,
+ .. msrpctypes.marshall_lsa_ObjectAttribute()
+
+ -- [in] uint32 access_mask,
+ .. msrpctypes.marshall_int32(0x00000800)
+
+ -- [out] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x2C, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: LsarOpenPolicy2() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,unique] [string,charset(UTF16)] uint16 *system_name,
+ -- [in] lsa_ObjectAttribute *attr,
+ -- [in] uint32 access_mask,
+ -- [out] policy_handle *handle
+ pos, result['policy_handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (lsa.openpolicy2)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (lsa.openpolicy2)"
+ end
+
+ return true, result
+end
+
+---Call the <code>LsarLookupNames2</code> function, to convert the server's name into a sid.
+--
+--@param smbstate The SMB state table
+--@param policy_handle The policy handle returned by <code>lsa_openpolicy2</code>
+--@param names An array of names to look up. To get a SID, only one of the names needs to be valid.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+-- The most useful result is 'domains', which is a list of domains known to the server. And, for each of the
+-- domains, there is a 'name' entry, which is a string, and a 'sid' entry, which is yet another object which
+-- can be passed to functions that understand SIDs.
+function lsa_lookupnames2(smbstate, policy_handle, names)
+ local status, result
+ local arguments
+ local result
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling LsarLookupNames2(%s) [%s]", stringaux.strjoin(", ", names), smbstate['ip'])
+
+
+ -- [in] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(policy_handle)
+
+ -- [in,range(0,1000)] uint32 num_names,
+ .. msrpctypes.marshall_int32(#names)
+
+ -- [in,size_is(num_names)] lsa_String names[],
+ .. msrpctypes.marshall_lsa_String_array(names)
+
+ -- [out,unique] lsa_RefDomainList *domains,
+ -- [in,out] lsa_TransSidArray2 *sids,
+ .. msrpctypes.marshall_lsa_TransSidArray2({nil})
+
+ -- [in] lsa_LookupNamesLevel level,
+ .. msrpctypes.marshall_lsa_LookupNamesLevel("LOOKUP_NAMES_ALL")
+
+ -- [in,out] uint32 *count,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 unknown1,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 unknown2
+ .. msrpctypes.marshall_int32(2)
+
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x3a, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: LsarLookupNames2() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+
+ -- [in] policy_handle *handle,
+ -- [in,range(0,1000)] uint32 num_names,
+ -- [in,size_is(num_names)] lsa_String names[],
+ -- [out,unique] lsa_RefDomainList *domains,
+ pos, result['domains'] = msrpctypes.unmarshall_lsa_RefDomainList_ptr(arguments, pos)
+
+ -- [in,out] lsa_TransSidArray2 *rids,
+ pos, result['rids'] = msrpctypes.unmarshall_lsa_TransSidArray2(arguments, pos)
+
+ -- [in] lsa_LookupNamesLevel level,
+ -- [in,out] uint32 *count,
+ pos, result['count'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in] uint32 unknown1,
+ -- [in] uint32 unknown2
+
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (lsa.lookupnames2)"
+ end
+ if(result['return'] == smb.status_codes['NT_STATUS_NONE_MAPPED']) then
+ return false, "Couldn't find any names the host recognized"
+ end
+
+ if(result['return'] ~= 0 and result['return'] ~= smb.status_codes['NT_STATUS_SOME_NOT_MAPPED']) then
+ return false, smb.get_status_name(result['return']) .. " (lsa.lookupnames2)"
+ end
+
+ return true, result
+end
+
+---Call the <code>LsarLookupSids2</code> function, to convert a list of SIDs to their names
+--
+--@param smbstate The SMB state table
+--@param policy_handle The policy handle returned by <code>lsa_openpolicy2</code>
+--@param sids The SIDs to look up (will probably be the server's SID with "-[rid]" appended
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values.
+-- The element 'domains' is identical to the lookupnames2() element called 'domains'. The element 'names' is a
+-- list of strings, for the usernames (not necessary a 1:1 mapping with the RIDs), and the element 'details' is
+-- a table containing more information about each name, even if the name wasn't found (this one is a 1:1 mapping
+-- with the RIDs).
+function lsa_lookupsids2(smbstate, policy_handle, sids)
+ local status, result
+ local arguments
+ local result
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling LsarLookupSids2(%s) [%s]", stringaux.strjoin(", ", sids), smbstate['ip'])
+
+ -- [in] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(policy_handle)
+
+ -- [in] lsa_SidArray *sids,
+ .. msrpctypes.marshall_lsa_SidArray(sids)
+
+ -- [out,unique] lsa_RefDomainList *domains,
+ -- [in,out] lsa_TransNameArray2 *names,
+ .. msrpctypes.marshall_lsa_TransNameArray2(nil)
+
+ -- [in] uint16 level,
+ .. msrpctypes.marshall_int16(1)
+
+ -- [in,out] uint32 *count,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 unknown1,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] uint32 unknown2
+ .. msrpctypes.marshall_int32(2)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x39, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+
+ -- [in] policy_handle *handle,
+ -- [in] lsa_SidArray *sids,
+ -- [out,unique] lsa_RefDomainList *domains,
+ pos, result['domains'] = msrpctypes.unmarshall_lsa_RefDomainList_ptr(arguments, pos)
+
+ -- [in,out] lsa_TransNameArray2 *names,
+ pos, result['names'] = msrpctypes.unmarshall_lsa_TransNameArray2(arguments, pos)
+
+ -- [in] uint16 level,
+ -- [in,out] uint32 *count,
+ local count
+ pos, result['count'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [in] uint32 unknown1,
+ -- [in] uint32 unknown2
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (lsa.lookupnames2)"
+ end
+ if(result['return'] ~= 0 and result['return'] ~= smb.status_codes['NT_STATUS_SOME_NOT_MAPPED'] and result['return'] ~= smb.status_codes['NT_STATUS_NONE_MAPPED']) then
+ return false, smb.get_status_name(result['return']) .. " (lsa.lookupsids2)"
+ end
+
+ stdnse.debug3("MSRPC: LsarLookupSids2(): Returning")
+ return true, result
+
+end
+
+---Call the <code>close</code> function, which closes a session created with a <code>lsa_openpolicy</code>-style function
+--@param smbstate The SMB state table
+--@param handle The handle to close
+--@return (status, result) If status is false, result is an error message. Otherwise, result is potentially
+-- a table of values, none of which are likely to be used.
+function lsa_close(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling LsaClose() [%s]", smbstate['ip'])
+
+ -- [in,out] policy_handle *handle
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x00, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,out] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (lsa.close)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (lsa.close)"
+ end
+
+ stdnse.debug3("MSRPC: LsaClose() returned successfully")
+ return true, result
+end
+
+---A proxy to a <code>msrpctypes</code> function that converts a SidType to an
+-- English string.
+--
+-- I implemented this as a proxy so scripts don't have to make direct calls to
+-- <code>msrpctypes</code> functions.
+--
+--@param val The value to convert.
+--@return A string that can be displayed to the user.
+function lsa_SidType_tostr(val)
+ return msrpctypes.lsa_SidType_tostr(val)
+end
+
+
+---Call the <code>OpenHKU</code> function, to obtain a handle to the HKEY_USERS hive
+--
+--@param smbstate The SMB state table
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'handle', which is required to call other winreg functions.
+function winreg_openhku(smbstate)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenHKU() [%s]", smbstate['ip'])
+
+ -- [in] uint16 *system_name,
+ arguments = msrpctypes.marshall_int16_ptr(0x1337, true)
+
+ -- [in] winreg_AccessMask access_mask,
+ .. msrpctypes.marshall_winreg_AccessMask('MAXIMUM_ALLOWED_ACCESS')
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x04, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenHKU() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] uint16 *system_name,
+ -- [in] winreg_AccessMask access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.openhku)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.openhku)"
+ end
+
+ return true, result
+
+end
+
+---Call the <code>OpenHKLM</code> function, to obtain a handle to the HKEY_LOCAL_MACHINE hive
+--
+--@param smbstate The SMB state table
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'handle', which is required to call other winreg functions.
+function winreg_openhklm(smbstate)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenHKLM() [%s]", smbstate['ip'])
+
+ -- [in] uint16 *system_name,
+ arguments = msrpctypes.marshall_int16_ptr(0x1337, true)
+
+ -- [in] winreg_AccessMask access_mask,
+ .. msrpctypes.marshall_winreg_AccessMask('MAXIMUM_ALLOWED_ACCESS')
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x02, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenHKLM() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] uint16 *system_name,
+ -- [in] winreg_AccessMask access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.openhklm)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.openhklm)"
+ end
+
+ return true, result
+end
+
+---Call the <code>OpenHKPD</code> function, to obtain a handle to the hidden HKEY_PERFORMANCE_DATA hive
+--
+--@param smbstate The SMB state table
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'handle', which is required to call other winreg functions.
+function winreg_openhkpd(smbstate)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenHKPD() [%s]", smbstate['ip'])
+
+ -- [in] uint16 *system_name,
+ arguments = msrpctypes.marshall_int16_ptr(0x1337, true)
+
+ -- [in] winreg_AccessMask access_mask,
+ .. msrpctypes.marshall_winreg_AccessMask('MAXIMUM_ALLOWED_ACCESS')
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x03, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenHKPD() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] uint16 *system_name,
+ -- [in] winreg_AccessMask access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.openhkpd)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.openhkpd)"
+ end
+
+ return true, result
+end
+
+---Call the <code>OpenHKCU</code> function, to obtain a handle to the HKEY_CURRENT_USER hive
+--
+--@param smbstate The SMB state table
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'handle', which is required to call other winreg functions.
+function winreg_openhkcu(smbstate)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenHKCU() [%s]", smbstate['ip'])
+
+ -- [in] uint16 *system_name,
+ arguments = msrpctypes.marshall_int16_ptr(0x1337, true)
+
+ -- [in] winreg_AccessMask access_mask,
+ .. msrpctypes.marshall_winreg_AccessMask('MAXIMUM_ALLOWED_ACCESS')
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x01, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenHKCU() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] uint16 *system_name,
+ -- [in] winreg_AccessMask access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.openhkcu)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.openhkcu)"
+ end
+
+ return true, result
+
+end
+
+
+
+---Calls the Windows registry function <code>EnumKey</code>, which returns a single key
+-- under the given handle, at the index of 'index'.
+--
+--@param smbstate The SMB state table
+--@param handle A handle to hive or key. <code>winreg_openhku</code> provides a usable key, for example.
+--@param index The index of the key to return. Generally you'll start at 0 and increment until
+-- an error is returned.
+--@param name The <code>name</code> buffer. This should be set to the empty string; however, setting to 'nil' can have
+-- interesting effects on Windows 2000 (I experienced crashes).
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'name', which is the name of the current key
+function winreg_enumkey(smbstate, handle, index, name)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling EnumKey(%d) [%s]", index, smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] uint32 enum_index,
+ .. msrpctypes.marshall_int32(index)
+
+ -- [in,out,ref] winreg_StringBuf *name,
+ -- NOTE: if the 'name' parameter here is set to 'nil', the service on a fully patched Windows 2000 system
+ -- may crash.
+ .. msrpctypes.marshall_winreg_StringBuf({name=""}, 520)
+
+ -- [in,out,unique] winreg_StringBuf *keyclass,
+ .. msrpctypes.marshall_winreg_StringBuf_ptr({name=nil})
+
+ -- [in,out,unique] NTTIME *last_changed_time
+ .. msrpctypes.marshall_NTTIME_ptr(0)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x09, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: EnumKey() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ local referent_id
+
+ pos = 1
+
+ -- [in,ref] policy_handle *handle,
+ -- [in] uint32 enum_index,
+ -- [in,out,ref] winreg_StringBuf *name,
+ pos, result['name'] = msrpctypes.unmarshall_winreg_StringBuf(arguments, pos)
+
+ -- [in,out,unique] winreg_StringBuf *keyclass,
+ pos, result['keyclass'] = msrpctypes.unmarshall_winreg_StringBuf_ptr(arguments, pos)
+
+ -- [in,out,unique] NTTIME *last_changed_time
+ pos, result['changed_time'] = msrpctypes.unmarshall_NTTIME_ptr(arguments, pos)
+ result['changed_date'] = datetime.format_timestamp(result['changed_time'])
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.enumkey)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.enumkey)"
+ end
+
+ return true, result
+
+end
+
+--- Calls the function <code>OpenKey</code>, which obtains a handle to a named key.
+--
+--@param smbstate The SMB state table
+--@param handle A handle to hive or key. <code>winreg_openhku</code> provides a usable key, for example.
+--@param keyname The name of the key to open.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one being 'handle', which is a handle to the newly opened key.
+function winreg_openkey(smbstate, handle, keyname)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenKey(%s) [%s]", keyname, smbstate['ip'])
+
+ -- [in,ref] policy_handle *parent_handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] winreg_String keyname,
+ .. msrpctypes.marshall_winreg_String({name=keyname})
+
+ -- [in] uint32 unknown,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] winreg_AccessMask access_mask,
+ .. msrpctypes.marshall_winreg_AccessMask('MAXIMUM_ALLOWED_ACCESS')
+
+ -- [out,ref] policy_handle *handle
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0F, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenKey() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *parent_handle,
+ -- [in] winreg_String keyname,
+ -- [in] uint32 unknown,
+ -- [in] winreg_AccessMask access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.openkey)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.openkey)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>QueryInfoKey</code>, which obtains information about an opened key.
+--
+--@param smbstate The SMB state table
+--@param handle A handle to the key that's being queried.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one, at least for me, being 'last_changed_time'/'last_changed_date', which are the date and time that the
+-- key was changed.
+function winreg_queryinfokey(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling QueryInfoKey() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in,out,ref] winreg_String *classname,
+ .. msrpctypes.marshall_winreg_String({name=""}, 2048)
+
+ -- [out,ref] uint32 *num_subkeys,
+ -- [out,ref] uint32 *max_subkeylen,
+ -- [out,ref] uint32 *max_subkeysize,
+ -- [out,ref] uint32 *num_values,
+ -- [out,ref] uint32 *max_valnamelen,
+ -- [out,ref] uint32 *max_valbufsize,
+ -- [out,ref] uint32 *secdescsize,
+ -- [out,ref] NTTIME *last_changed_time
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x10, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: QueryInfoKey() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *handle,
+ -- [in,out,ref] winreg_String *classname,
+ pos, result['classname'] = msrpctypes.unmarshall_winreg_String(arguments, pos)
+
+ -- [out,ref] uint32 *num_subkeys,
+ pos, result['subkeys'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *max_subkeylen,
+ pos, result['subkeylen'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *max_subkeysize,
+ pos, result['subkeysize'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *num_values,
+ pos, result['num_values'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *max_valnamelen,
+ pos, result['max_valnamelen'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *max_valbufsize,
+ pos, result['max_valbufsize'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] uint32 *secdescsize,
+ pos, result['secdescsize'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- [out,ref] NTTIME *last_changed_time
+ pos, result['last_changed_time'] = msrpctypes.unmarshall_NTTIME(arguments, pos)
+ result['last_changed_date'] = datetime.format_timestamp(result['last_changed_time'])
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.queryinfokey)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.queryinfokey)"
+ end
+
+ return true, result
+end
+
+
+--- Calls the function <code>QueryValue</code>, which returns the value of the requested key.
+--
+--@param smbstate The SMB state table
+--@param handle A handle to the key that's being queried.
+--@param value The value we're looking for.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, the most
+-- useful one, at least for me, being 'last_changed_time'/'last_changed_date', which are the date and time that the
+-- key was changed.
+function winreg_queryvalue(smbstate, handle, value)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling QueryValue(%s) [%s]", value, smbstate['ip'])
+
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] winreg_String value_name,
+ .. msrpctypes.marshall_winreg_String({name=value})
+
+ -- [in,out] winreg_Type *type,
+ .. msrpctypes.marshall_winreg_Type_ptr("REG_NONE")
+
+ -- [in,out,size_is(*size),length_is(*length)] uint8 *data,
+ .. msrpctypes.marshall_int8_array_ptr("", 1000000)
+
+ -- [in,out] uint32 *size,
+ .. msrpctypes.marshall_int32_ptr(1000000)
+
+ -- [in,out] uint32 *length
+ .. msrpctypes.marshall_int32_ptr(0)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x11, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: QueryValue() returned successfully")
+ local length, referent_id
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+
+ -- [in,ref] policy_handle *handle,
+ -- [in] winreg_String value_name,
+ -- [in,out] winreg_Type *type,
+ pos, result['type'] = msrpctypes.unmarshall_winreg_Type_ptr(arguments, pos)
+
+ -- [in,out,size_is(*size),length_is(*length)] uint8 *data,
+ pos, result['data'] = msrpctypes.unmarshall_int8_array_ptr(arguments, pos)
+
+ -- Format the type properly and put it in "value"
+ if(result['data'] ~= nil) then
+ local _
+ if(result['type'] == "REG_DWORD") then
+ result['value'] = string.unpack("<I4", result['data'])
+ elseif(result['type'] == "REG_SZ" or result['type'] == "REG_MULTI_SZ" or result['type'] == "REG_EXPAND_SZ") then
+ _, result['value'] = msrpctypes.unicode_to_string(result['data'], 1, #result['data'] / 2)
+ elseif(result['type'] == "REG_BINARY") then
+ result['value'] = result['data']
+ elseif(result['type'] == "REG_NONE") then
+ result['value'] = ""
+ else
+ stdnse.debug1("MSRPC ERROR: Unknown type: %s", result['type'])
+ result['value'] = result['type']
+ end
+ else
+ result['value'] = nil
+ end
+
+ -- [in,out] uint32 *size,
+ pos, result['size'] = msrpctypes.unmarshall_int32_ptr(arguments, pos)
+
+ -- [in,out] uint32 *length
+ pos, result['length'] = msrpctypes.unmarshall_int32_ptr(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.queryvalue)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.queryvalue)"
+ end
+
+ return true, result
+end
+
+
+
+--- Calls the function <code>CloseKey</code>, which closes an opened handle. Strictly speaking, this doesn't have to be called (Windows
+-- will close the key for you), but it's good manners to clean up after yourself.
+--
+--@param smbstate The SMB state table
+--@param handle the handle to be closed.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values, none of
+-- which are especially useful.
+function winreg_closekey(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling CloseKey() [%s]", smbstate['ip'])
+
+ -- [in,out,ref] policy_handle *handle
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x05, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: CloseKey() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (winreg.closekey)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (winreg.closekey)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>OpenSCManagerA</code>, which gets a handle to the service manager. Should be closed with
+-- <code>CloseServiceHandle</code> when finished.
+--
+--@param smbstate The SMB state table
+--@param machinename The name or IP of the machine.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_openscmanagera(smbstate, machinename)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenSCManagerA() [%s]", smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *MachineName,
+ arguments = msrpctypes.marshall_ascii_ptr("\\\\" .. machinename)
+
+ -- [in] [string,charset(UTF16)] uint16 *DatabaseName,
+ .. msrpctypes.marshall_ascii_ptr(nil)
+
+ -- [in] uint32 access_mask,
+ -- .. msrpctypes.marshall_int32(0x000f003f)
+ .. msrpctypes.marshall_int32(0x00000002)
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x1b, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenSCManagerA() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *MachineName,
+ -- [in] [string,charset(UTF16)] uint16 *DatabaseName,
+ -- [in] uint32 access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.openscmanagera)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.openscmanagera)"
+ end
+
+ return true, result
+end
+
+
+--- Calls the function <code>OpenSCManagerW</code>, which gets a handle to the service manager. Should be closed with
+-- <code>CloseServiceHandle</code> when finished.
+--
+--@param smbstate The SMB state table
+--@param machinename The name or IP of the machine.
+--@param access_mask The access_mask to open the service with.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_openscmanagerw(smbstate, machinename, access_mask)
+ local status, result
+ local arguments
+ local pos, align
+
+ -- if(1 == 1) then
+ -- return svcctl_openscmanagera(smbstate, machinename)
+ -- end
+
+ stdnse.debug2("MSRPC: Calling OpenSCManagerW() [%s]", smbstate['ip'])
+
+ -- [in] [string,charset(UTF16)] uint16 *MachineName,
+ arguments = msrpctypes.marshall_unicode_ptr("\\\\" .. machinename, true)
+
+ -- [in] [string,charset(UTF16)] uint16 *DatabaseName,
+ .. msrpctypes.marshall_unicode_ptr(nil, true)
+
+ -- [in] uint32 access_mask,
+ -- .. msrpctypes.marshall_int32(0x000f003f)
+ .. msrpctypes.marshall_int32(access_mask)
+
+ -- [out,ref] policy_handle *handle
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0f, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenSCManagerW() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in] [string,charset(UTF16)] uint16 *MachineName,
+ -- [in] [string,charset(UTF16)] uint16 *DatabaseName,
+ -- [in] uint32 access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.openscmanagerw)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.openscmanagerw)"
+ end
+
+ return true, result
+end
+
+
+--- Calls the function <code>CloseServiceHandle</code>, which releases a handle.
+--
+--@param smbstate The SMB state table
+--@param handle The handle to be closed.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_closeservicehandle(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling CloseServiceHandle() [%s]", smbstate['ip'])
+
+ -- [in,out,ref] policy_handle *handle
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x00, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenSCManagerA() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.closeservicehandle)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.closeservicehandle)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>CreateServiceW</code>, which creates a service on the remote machine. This should
+-- be deleted with <code>DeleteService</code> when finished.
+--
+--@param smbstate The SMB state table
+--@param handle The handle created by <code>OpenSCManagerW</code>
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_createservicew(smbstate, handle, service_name, display_name, path)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling CreateServiceW() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *scmanager_handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] [string,charset(UTF16)] uint16 ServiceName[],
+ .. msrpctypes.marshall_unicode(service_name, true)
+
+ -- [in] [string,charset(UTF16)] uint16 *DisplayName,
+ .. msrpctypes.marshall_unicode_ptr(display_name, true)
+
+ -- [in] uint32 desired_access,
+ .. msrpctypes.marshall_int32(0x000f01ff) -- Access: Max
+
+ -- [in] uint32 type,
+ .. msrpctypes.marshall_int32(0x00000010) -- Type: own process
+
+ -- [in] uint32 start_type,
+ .. msrpctypes.marshall_int32(0x00000003) -- Start: Demand
+
+ -- [in] uint32 error_control,
+ .. msrpctypes.marshall_int32(0x00000000) -- Error: Ignore
+
+ -- [in] [string,charset(UTF16)] uint16 binary_path[],
+ .. msrpctypes.marshall_unicode(path, true)
+
+ -- [in] [string,charset(UTF16)] uint16 *LoadOrderGroupKey,
+ .. msrpctypes.marshall_unicode_ptr(nil)
+
+ -- [in,out] uint32 *TagId,
+ .. msrpctypes.marshall_int32_ptr(nil)
+
+ -- [in,size_is(dependencies_size)] uint8 *dependencies,
+ .. msrpctypes.marshall_int8_ptr(nil)
+
+ -- [in] uint32 dependencies_size,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [in] [string,charset(UTF16)] uint16 *service_start_name,
+ .. msrpctypes.marshall_unicode_ptr(nil)
+
+ -- [in,size_is(password_size)] uint8 *password,
+ .. msrpctypes.marshall_int8_ptr(nil)
+
+ -- [in] uint32 password_size,
+ .. msrpctypes.marshall_int32(0)
+
+ -- [out,ref] policy_handle *handle
+
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x0c, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: CreateServiceW() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *scmanager_handle,
+ -- [in] [string,charset(UTF16)] uint16 ServiceName[],
+ -- [in] [string,charset(UTF16)] uint16 *DisplayName,
+ -- [in] uint32 desired_access,
+ -- [in] uint32 type,
+ -- [in] uint32 start_type,
+ -- [in] uint32 error_control,
+ -- [in] [string,charset(UTF16)] uint16 binary_path[],
+ -- [in] [string,charset(UTF16)] uint16 *LoadOrderGroupKey,
+ -- [in,out] uint32 *TagId,
+ pos, result['TagId'] = msrpctypes.unmarshall_int32_ptr(arguments, pos)
+
+ -- [in,size_is(dependencies_size)] uint8 *dependencies,
+ -- [in] uint32 dependencies_size,
+ -- [in] [string,charset(UTF16)] uint16 *service_start_name,
+ -- [in,size_is(password_size)] uint8 *password,
+ -- [in] uint32 password_size,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.createservicew)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.createservicew)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>DeleteService</code>, which deletes a service on the remote machine. This service
+-- has to opened with <code>OpenServiceW</code> or similar functions.
+--
+--@param smbstate The SMB state table.
+--@param handle The handle to delete, opened with <code>OpenServiceW</code> or similar.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_deleteservice(smbstate, handle)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling DeleteService() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x02, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: DeleteService() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+
+ -- [in,ref] policy_handle *handle
+
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.deleteservice)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.deleteservice)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>OpenServiceW</code>, which gets a handle to the service. Should be closed with
+-- <code>CloseServiceHandle</code> when finished.
+--
+--@param smbstate The SMB state table.
+--@param handle A handle to the policy manager, opened with <code>OpenSCManagerW</code> or similar.
+--@param name The name of the service.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_openservicew(smbstate, handle, name, access_mask)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling OpenServiceW() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *scmanager_handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] [string,charset(UTF16)] uint16 ServiceName[],
+ .. msrpctypes.marshall_unicode(name, true)
+
+ -- [in] uint32 access_mask,
+ .. msrpctypes.marshall_int32(access_mask)
+ -- [out,ref] policy_handle *handle
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x10, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: OpenServiceW() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *scmanager_handle,
+ -- [in] [string,charset(UTF16)] uint16 ServiceName[],
+ -- [in] uint32 access_mask,
+ -- [out,ref] policy_handle *handle
+ pos, result['handle'] = msrpctypes.unmarshall_policy_handle(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.openservicew)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.openservicew)"
+ end
+
+ return true, result
+end
+
+--- Calls the function <code>StartServiceW</code>, which starts a service. Requires a handle
+-- created by <code>OpenServiceW</code>.
+--
+--@param smbstate The SMB state table.
+--@param handle The handle, opened by <code>OpenServiceW</code>.
+--@param args An array of strings representing the arguments.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_startservicew(smbstate, handle, args)
+ local status, result
+ local arguments
+ local pos, align
+ stdnse.debug2("MSRPC: Calling StartServiceW() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] uint32 NumArgs,
+ .. (args and msrpctypes.marshall_int32(#args) or msrpctypes.marshall_int32(0))
+
+ -- [in/*FIXME:,length_is(NumArgs)*/] [string,charset(UTF16)] uint16 *Arguments
+ .. msrpctypes.marshall_unicode_array_ptr(args, true)
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x13, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: StartServiceW() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *handle,
+ -- [in] uint32 NumArgs,
+ -- [in/*FIXME:,length_is(NumArgs)*/] [string,charset(UTF16)] uint16 *Arguments
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.startservicew)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.startservicew)"
+ end
+
+ return true, result
+
+end
+
+--- Calls the function <code>ControlService</code>, which can send various commands to the service.
+--
+--@param smbstate The SMB state table.
+--@param handle The handle, opened by <code>OpenServiceW</code>.
+--@param control The command to send. See <code>svcctl_ControlCode</code> in <code>msrpctypes.lua</code>.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_controlservice(smbstate, handle, control)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling ControlService() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] uint32 control,
+ .. msrpctypes.marshall_svcctl_ControlCode(control)
+
+ -- [out,ref] SERVICE_STATUS *service_status
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x01, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: ControlService() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *handle,
+ -- [in] uint32 control,
+ -- [out,ref] SERVICE_STATUS *service_status
+ pos, result['service_status'] = msrpctypes.unmarshall_SERVICE_STATUS(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.controlservice)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.controlservice)"
+ end
+
+ return true, result
+
+end
+
+
+--- Calls the function <code>QueryServiceStatus</code>, which gets the state information about the service.
+--
+--@param smbstate The SMB state table.
+--@param handle The handle, opened by <code>OpenServiceW</code>.
+--@return (status, result) If status is false, result is an error message. Otherwise, result is a table of values
+-- representing the "out" parameters.
+function svcctl_queryservicestatus(smbstate, handle, control)
+ local status, result
+ local arguments
+ local pos, align
+
+ stdnse.debug2("MSRPC: Calling QueryServiceStatus() [%s]", smbstate['ip'])
+
+ -- [in,ref] policy_handle *handle,
+ arguments = msrpctypes.marshall_policy_handle(handle)
+
+ -- [out,ref] SERVICE_STATUS *service_status
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x06, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: QueryServiceStatus() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,ref] policy_handle *handle,
+ -- [out,ref] SERVICE_STATUS *service_status
+ pos, result['service_status'] = msrpctypes.unmarshall_SERVICE_STATUS(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (svcctl.queryservicestatus)"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (svcctl.queryservicestatus)"
+ end
+
+ return true, result
+end
+
+-- Crafts a marshalled request for sending it to the enumservicestatusw function
+--
+--@param handle The handle, opened by <code>OpenServiceW</code>.
+--@param typeofservice The type of services to be enumerated.
+--@param servicestate The state of the services to be enumerated.
+--@param cbbufsize The size of the buffer pointed to by the lpServices
+-- parameter, in bytes.
+--@param lpresumehandle A pointer to a variable that, on input, specifies the
+-- starting point of enumeration.
+--@return string Returns marshalled string with given arguments.
+local function enumservicestatusparams(handle, tyepofservice, servicestate, cbbufsize, lpresumehandle)
+
+ -- [in,ref] policy_handle *handle
+ return msrpctypes.marshall_policy_handle(handle)
+
+ -- [in] uint32 type
+ .. msrpctypes.marshall_int32(tyepofservice, true)
+
+ -- [in] svcctl_ServiceState
+ .. msrpctypes.marshall_int32(servicestate, true)
+
+ -- [in] [range(0,0x40000)] uint32 cbufsize
+ .. msrpctypes.marshall_int32(cbbufsize, true)
+
+ -- [in,out,unique] uint32 *resume_handle
+ .. msrpctypes.marshall_int32_ptr(lpresumehandle, true)
+
+end
+
+-- Unmarshalls the string based on offset.
+--
+--@param arguments The marshalled arguments to extract the data.
+--@param startpos The start position of the string.
+--@return startpos Returns the strating position of the string.
+--@return string Returns the unmarshalled string.
+
+-- Unmarshalls ENUM_SERVICE_STATUS structure.
+--
+-- The structure of ENUM_SERVICE_STATUS is as follows:
+--
+-- <code>
+-- typedef struct {
+-- LPTSTR lpServiceName
+-- LPTSTR lpDisplayName
+-- SERVICE_STATUS ServiceStatus
+-- }
+-- </code>
+--
+-- References:
+-- https://msdn.microsoft.com/en-us/library/windows/desktop/ms682651(v=vs.85).aspx
+--
+-- I created this function as a support for svcctl_enumservicesstatusw function.
+-- svcctl_enumservicesstatusw function returns multiple services in the buffer.
+-- In order to remember the starting and ending positions of different unmarshalled
+-- strings and SERVICE_STATUS structs I had to store the previous offset of the
+-- unmarshalled string. This previous offset will be helpful while retrieving the
+-- continuous strings from the buffer.
+--
+--@param arguments The marshalled arguments to extract the data.
+--@param pos The position within <code>arguments</code>.
+--@return pos Returns new position in the arguments.
+--@return serviceName Returns an unmarshalled string.
+--@return displayName Returns an unmarshalled string.
+--@return serviceStatus Returns table of values
+local function unmarshall_enum_service_status(arguments, pos)
+
+ local _
+ local serviceNameOffset
+ local displayNameOffset
+ local serviceStatus
+ local serviceName
+ local displayName
+
+ pos, serviceNameOffset = msrpctypes.unmarshall_int32(arguments, pos)
+ pos, displayNameOffset = msrpctypes.unmarshall_int32(arguments, pos)
+ pos, serviceStatus = msrpctypes.unmarshall_SERVICE_STATUS(arguments, pos)
+
+ _, serviceName = msrpctypes.unmarshall_lptstr(arguments, serviceNameOffset + 5)
+ _, displayName = msrpctypes.unmarshall_lptstr(arguments, displayNameOffset + 5)
+
+ -- ServiceName and displayName are converted into UTF-8.
+ serviceName = unicode.utf16to8(serviceName)
+ displayName = unicode.utf16to8(displayName)
+
+ -- Since we are converting the string from utf16to8, an extra NULL byte is
+ -- present at the end of the string. These two lines, strip the last character
+ -- or NULL byte from the end of the string.
+ serviceName = string.sub(serviceName, 1, serviceName:len()-1)
+ displayName = string.sub(displayName, 1, displayName:len()-1)
+
+ stdnse.debug2("ServiceName = %s", serviceName)
+ stdnse.debug2("DisplayName = %s", displayName)
+
+ return pos, serviceName, displayName, serviceStatus
+
+end
+
+-- Attempts to retrieve list of services from a remote system.
+--
+-- The structure of EnumServicesStatus is as follows:
+--
+-- <code>
+-- typedef struct {
+-- policy_handle *handle,
+-- uint32 type,
+-- svcctl_ServiceState state,
+-- uint8 *service,
+-- uint32 offered,
+-- uint32 *needed,
+-- uint32 *services_returned,
+-- uint32 *resume_handle
+-- }
+-- </code>
+--
+-- References:
+-- https://github.com/samba-team/samba/blob/d8a5565ae647352d11d622bd4e73ff4568678a7c/librpc/idl/svcctl.idl
+-- https://msdn.microsoft.com/en-us/library/windows/desktop/ms682637(v=vs.85).aspx
+--
+--@param smbstate The SMB state table.
+--@param handle The handle, opened by <code>OpenServiceW</code>.
+--@param dwservicetype The type of services to be enumerated.
+-- Lookup table for dwservicetype is as follows:
+-- SERVICE_DRIVER - 0x0000000B
+-- SERVICE_FILE_SYSTEM_DRIVER - 0x00000002
+-- SERVICE_KERNEL_DRIVER - 0x00000001
+-- SERVICE_WIN32 - 0x00000030
+-- SERVICE_WIN32_OWN_PROCESS - 0x00000010 (default)
+-- SERVICE_WIN32_SHARE_PROCESS - 0x00000020
+--@param dwservicestate The state of the services to be enumerated.
+-- Lookup table for dwservicetype is as follows:
+-- SERVICE_ACTIVE - 0x00000001
+-- SERVICE_INACTIVE - 0x00000002
+-- SERVICE_STATE_ALL - 0x00000003 (default)
+--@return pos Returns success or failure.
+--@return output Returns the list of services running on a remote windows system
+-- with serviceName, displayName and service status structure.
+function svcctl_enumservicesstatusw(smbstate, handle, dwservicetype, dwservicestate)
+ local status
+ local result
+ local arguments
+ local pos
+ local _
+ local serviceName
+ local displayName
+ local serviceStatus
+ local lpservices
+
+ local output = stdnse.output_table()
+
+ local DW_SERVICE_TYPE = dwservicetype or 0x00000010
+ local DW_SERVICE_STATE = dwservicestate or 0x00000003
+
+ arguments = enumservicestatusparams(handle, DW_SERVICE_TYPE, DW_SERVICE_STATE, 0x00, nil)
+
+ -- This call is made only to retrieve the pcbBytesNeeded value.
+ status, result = call_function(smbstate, 0x0e, arguments)
+
+ if status ~= true then
+ return false, result
+ end
+
+ arguments = result["arguments"]
+
+ pos = 1
+
+ -- Since the first call is made to retrieve pcbBytesNeeded, the server returns
+ -- an empty array in the response. The following line of code unpacks an
+ -- empty array.
+ lpservices, pos = string.unpack("<s4", arguments, pos)
+
+ -- [out,ref] [range(0,0x40000)] uint32 *pcbBytesNeeded,
+ pos, result["pcbBytesNeeded"] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ -- Unmarshalls return value.
+ _, result["ReturnValue"] = msrpctypes.unmarshall_int32(arguments, arguments:len()-3)
+
+ -- 0x00 stands for No Error. This message at this stage indicates there are no services.
+ if result["ReturnValue"] == 0x00 then
+ return true, {}
+
+ -- 0x05 stands for Access Denied.
+ elseif result["ReturnValue"] == 0x05 then
+ return false, "Access is denied."
+
+ -- Checks for other error codes expect 0x7a and 0xea.
+ elseif not (result["ReturnValue"] == 0x7A or result["ReturnValue"] == 0xEA) then
+ return false, "Error occurred. Error code = " .. tostring(result["ReturnValue"])
+ end
+
+ ------- Functional calls here are made to retrieve the data -------------------------
+
+ local MAX_BUFFER_SIZE = 0xfa00
+ stdnse.debug3("MAX_BUFFER_SIZE = %d", MAX_BUFFER_SIZE)
+
+ -- Initalizes the lpResumeHandle parameter for the first call.
+ result["lpResumeHandle"] = 0x00
+
+ -- Loop runs until we retrieve all the data into our buffer.
+ repeat
+
+ -- cbbufsize parameter in enumservicestatusparams function *must* have a value
+ -- strictly less than result["pcbBytesNeeded"] retrieved from the above call.
+ --
+ -- If larger value is assigned to result["pcbBytesNeeded"], errored response
+ -- will be returned.
+ arguments = enumservicestatusparams(handle, DW_SERVICE_TYPE, DW_SERVICE_STATE, math.min(result["pcbBytesNeeded"], MAX_BUFFER_SIZE), result["lpResumeHandle"])
+
+ status, result = call_function(smbstate, 0x0e, arguments)
+
+ if status ~= true then
+ return false, result
+ end
+
+ arguments = result["arguments"]
+
+ -- Caches length for future use.
+ local length = arguments:len()
+
+ -- Last 4 bytes returns the return value.
+ _, result["ReturnValue"] = msrpctypes.unmarshall_int32(arguments, length - 3)
+ stdnse.debug("ReturnValue = %d", result["ReturnValue"])
+
+ -- Next last 8 bytes returns the lpResumeHandle.
+ _, result["lpResumeHandle"] = msrpctypes.unmarshall_int32_ptr(arguments, length - 11)
+ stdnse.debug("lpResumeHandle = %d", result["lpResumeHandle"])
+
+ -- Next last 4 bytes returns the number of services returned.
+ _, result["lpServicesReturned"] = msrpctypes.unmarshall_int32(arguments, length - 15)
+ stdnse.debug("lpServicesReturned = %d", result["lpServicesReturned"])
+
+ -- Next last 4 bytes returns the pcbBytesNeeded or pcbBytes left for next iteration.
+ _, result["pcbBytesNeeded"] = msrpctypes.unmarshall_int32(arguments, length - 19)
+ stdnse.debug("pcbBytesNeeded = %d", result["pcbBytesNeeded"])
+
+ -- Since we are receiving the length of arguments in the beginning of the buffer,
+ -- we have to exclude those bytes from our decoding functions.
+ -- The size of the buffer will be uint32 which is of 4 bytes and hence we
+ -- take the starting position as 5 for unmarshalling purposes.
+ pos = 5
+
+ -- Initializes local variables for future use.
+ local count = result["lpServicesReturned"]
+
+ -- Executes the loop until all the services are unmarshalled.
+ repeat
+
+ pos, serviceName, displayName, serviceStatus = unmarshall_enum_service_status(arguments, pos)
+
+ local t = stdnse.output_table()
+ t["display_name"] = displayName
+ t["state"] = serviceStatus["state"]
+ t["type"] = serviceStatus["type"]
+ t["controls_accepted"] = serviceStatus["controls_accepted"]
+
+ -- Stores the result in a table.
+ output[serviceName] = t
+
+ count = count - 1
+
+ until count < 1
+
+ until result["pcbBytesNeeded"] == 0
+
+ stdnse.debug3("MSRPC: EnumServiceStatus() returned successfully")
+
+ return true, output
+
+end
+
+---Calls the function <code>JobAdd</code>, which schedules a process to be run
+-- on the remote machine.
+--
+-- This requires administrator privileges to run, and the command itself runs
+-- as SYSTEM.
+--@param smbstate The SMB state table.
+--@param server The IP or Hostname of the server (seems to be ignored but it's
+-- a good idea to have it)
+--@param command The command to run on the remote machine. The appropriate
+-- file(s) already have to be there, and this should be a full
+-- path.
+--@param time [optional] The time at which to run the command. Default: 5
+-- seconds from when the user logged in.
+function atsvc_jobadd(smbstate, server, command, time)
+ local status, result
+ local arguments
+ local pos, align
+
+ -- Set up the time
+ if(time == nil) then
+ -- TODO
+ end
+
+ stdnse.debug2("MSRPC: Calling AddJob(%s) [%s]", command, smbstate['ip'])
+
+ -- [in,unique,string,charset(UTF16)] uint16 *servername,
+ arguments = msrpctypes.marshall_unicode_ptr(server, true)
+
+ -- [in] atsvc_JobInfo *job_info,
+ .. msrpctypes.marshall_atsvc_JobInfo(command, time)
+ -- [out,ref] uint32 *job_id
+
+
+ -- Do the call
+ status, result = call_function(smbstate, 0x00, arguments)
+ if(status ~= true) then
+ return false, result
+ end
+
+ stdnse.debug3("MSRPC: AddJob() returned successfully")
+
+ -- Make arguments easier to use
+ arguments = result['arguments']
+ pos = 1
+
+ -- [in,unique,string,charset(UTF16)] uint16 *servername,
+ -- [in] atsvc_JobInfo *job_info,
+ -- [out,ref] uint32 *job_id
+ pos, result['job_id'] = msrpctypes.unmarshall_int32(arguments, pos)
+
+ pos, result['return'] = msrpctypes.unmarshall_int32(arguments, pos)
+ if(result['return'] == nil) then
+ return false, "Read off the end of the packet (atsvc.addjob())"
+ end
+ if(result['return'] ~= 0) then
+ return false, smb.get_status_name(result['return']) .. " (atsvc.addjob())"
+ end
+
+ return true, result
+end
+
+---Attempt to enumerate users using SAMR functions.
+--
+--@param host The host object.
+--@return (status, result) If status is false, result is an error message. Otherwise, result
+-- is an array of tables, each of which contain the following fields:
+-- * name
+-- * fullname
+-- * description
+-- * rid
+-- * domain
+-- * typestr
+-- * source
+-- * flags[]
+function samr_enum_users(host)
+
+ local smbstate
+ local bind_result, connect4_result, enumdomains_result
+ local connect_handle
+ local status, smbstate
+ local response = {}
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SAMR_PATH, true)
+
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SAMR service
+ status, bind_result = bind(smbstate, SAMR_UUID, SAMR_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Call connect4()
+ status, connect4_result = samr_connect4(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, connect4_result
+ end
+
+ -- Save the connect_handle
+ connect_handle = connect4_result['connect_handle']
+
+ -- Call EnumDomains()
+ status, enumdomains_result = samr_enumdomains(smbstate, connect_handle)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, enumdomains_result
+ end
+
+ -- If no domains were returned, go back with an error
+ if(#enumdomains_result['sam']['entries'] == 0) then
+ stop_smb(smbstate)
+ return false, "Couldn't find any domains"
+ end
+
+ -- Now, loop through the domains and find the users
+ for i = 1, #enumdomains_result['sam']['entries'], 1 do
+
+ local domain = enumdomains_result['sam']['entries'][i]['name']
+ -- We don't care about the 'builtin' domain, in all my tests it's empty
+ if(domain ~= 'Builtin') then
+ -- Call LookupDomain()
+ local status, lookupdomain_result = samr_lookupdomain(smbstate, connect_handle, domain)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, lookupdomain_result
+ end
+
+ -- Save the sid
+ local sid = lookupdomain_result['sid']
+
+ -- Call OpenDomain()
+ local status, opendomain_result = samr_opendomain(smbstate, connect_handle, sid)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, opendomain_result
+ end
+
+ -- Save the domain handle
+ local domain_handle = opendomain_result['domain_handle']
+
+ -- Loop as long as we're getting valid results
+ local j = 0
+ repeat
+ -- Call QueryDisplayInfo()
+ local status, querydisplayinfo_result = samr_querydisplayinfo(smbstate, domain_handle, j, SAMR_GROUPSIZE)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, querydisplayinfo_result
+ end
+
+ -- Save the response
+ if(querydisplayinfo_result['info'] ~= nil and querydisplayinfo_result['info']['entries'] ~= nil) then
+ local k
+ for k = 1, #querydisplayinfo_result['info']['entries'], 1 do
+ local array = {}
+ local l
+
+ -- The reason these are all indexed from '1' is because we request names one at a time.
+ array['name'] = querydisplayinfo_result['info']['entries'][k]['account_name']
+ array['fullname'] = querydisplayinfo_result['info']['entries'][k]['full_name']
+ array['description'] = querydisplayinfo_result['info']['entries'][k]['description']
+ array['rid'] = querydisplayinfo_result['info']['entries'][k]['rid']
+ array['domain'] = domain
+ array['type'] = 'SID_NAME_USER'
+ array['typestr'] = 'User'
+ array['source'] = 'SAMR Enumeration'
+ array['flags'] = querydisplayinfo_result['info']['entries'][k]['acct_flags']
+
+ -- Convert each element in the 'flags' array into the equivalent string
+ for l = 1, #array['flags'], 1 do
+ array['flags'][l] = samr_AcctFlags_tostr(array['flags'][l])
+ end
+
+ -- Add it to the array
+ response[#response + 1] = array
+ end
+ end
+ j = j + SAMR_GROUPSIZE
+ until querydisplayinfo_result['return'] == 0
+
+ -- Close the domain handle
+ samr_close(smbstate, domain_handle)
+ end -- Checking for 'builtin'
+ end -- Domain loop
+
+ -- Close the connect handle
+ samr_close(smbstate, connect_handle)
+
+ -- Stop the SAMR SMB
+ stop_smb(smbstate)
+
+ return true, response
+end
+
+function samr_enum_groups(host)
+ stdnse.debug1("MSRPC: Attempting to enumerate groups on %s", host.ip)
+ -- Create the SMB session
+ local status, smbstate = start_smb(host, SAMR_PATH, true)
+
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SAMR service
+ local status, bind_result = bind(smbstate, SAMR_UUID, SAMR_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Call connect4()
+ local status, connect4_result = samr_connect4(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, connect4_result
+ end
+
+ -- Save the connect_handle
+ local connect_handle = connect4_result['connect_handle']
+
+ -- Call EnumDomains()
+ local status, enumdomains_result = samr_enumdomains(smbstate, connect_handle)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, enumdomains_result
+ end
+
+ -- If no domains were returned, go back with an error
+ if(#enumdomains_result['sam']['entries'] == 0) then
+ stop_smb(smbstate)
+ return false, "Couldn't find any domains"
+ end
+
+ -- Now, loop through the domains and find the groups
+ local domains = {}
+ for _, domain in ipairs(enumdomains_result['sam']['entries']) do
+ -- Get a handy domain name
+ domain = domain['name']
+ domains[domain] = {}
+
+ -- Call LookupDomain()
+ local status, lookupdomain_result = samr_lookupdomain(smbstate, connect_handle, domain)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, lookupdomain_result
+ end
+
+ -- Save the sid
+ local domain_sid = lookupdomain_result['sid']
+
+ -- Call OpenDomain()
+ local status, opendomain_result = samr_opendomain(smbstate, connect_handle, domain_sid)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, opendomain_result
+ end
+
+ -- Save the domain handle
+ local domain_handle = opendomain_result['domain_handle']
+
+ -- Get a list of groups
+ local status, enumaliases_result = samr_enumdomainaliases(smbstate, domain_handle)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, "Couldn't enumerate groups: " .. enumaliases_result
+ end
+
+ -- If it returned a nil array
+ if(enumaliases_result['sam'] == nil or enumaliases_result['sam']['entries'] == nil) then
+ return false, "ERROR: No groups returned by samr_EnumDomainAliases()"
+ end
+
+ -- Print some output
+ stdnse.debug1("MSRPC: Found %d groups in %s", #enumaliases_result['sam']['entries'], domain)
+
+ -- Record the results
+ local group_rids = {}
+ for _, group in ipairs(enumaliases_result['sam']['entries']) do
+ -- The RID
+ local group_rid = group['idx']
+
+ -- Keep a list of just RIDs, for easier lookup after
+ table.insert(group_rids, group_rid)
+
+ -- Save the output, this is what will be returned
+ domains[domain][group_rid] = {}
+ domains[domain][group_rid]['name'] = group['name']
+ end -- Loop over group entries
+
+ for _, group_rid in ipairs(group_rids) do
+ -- Get a handle to the alias
+ local status, openalias_result = samr_openalias(smbstate, domain_handle, group_rid)
+ if(not(status)) then
+ stop_smb(smbstate)
+ return false, "Couldn't open handle to group: " .. openalias_result
+ end
+ local group_handle = openalias_result['alias_handle']
+
+ -- Get the members of the group
+ local status, getmembers_result = samr_getmembersinalias(smbstate, group_handle)
+ if(not(status)) then
+ stop_smb(smbstate)
+ return false, "Couldn't get members in group: " .. getmembers_result
+ end
+
+ -- Save the SIDs
+ local member_sids = {}
+ if(getmembers_result and getmembers_result.sids and getmembers_result.sids.sids) then
+ -- Set the list of member_sids
+ member_sids = getmembers_result.sids.sids
+ end
+
+ -- Print some output
+ stdnse.debug1("MSRPC: Adding group '%s' (RID: %d) with %d members", domains[domain][group_rid]['name'], group_rid, #member_sids)
+
+ -- Save the output
+ domains[domain][group_rid]['member_sids'] = member_sids
+
+ -- Close the group
+ samr_close(smbstate, group_handle)
+ end -- Loop over group RIDs
+
+ -- Close the domain handle
+ samr_close(smbstate, domain_handle)
+
+ end -- Domain loop
+
+ -- Close the connect handle
+ samr_close(smbstate, connect_handle)
+
+ -- Stop the SAMR SMB
+ stop_smb(smbstate)
+
+
+ -- Now, we need a handle to LSA (in order to convert the RIDs to users
+ -- Create the SMB session
+ local status, smbstate = start_smb(host, LSA_PATH, true)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to LSA service
+ local status, bind_result = bind(smbstate, LSA_UUID, LSA_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the LSA policy
+ local status, openpolicy2_result = lsa_openpolicy2(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, openpolicy2_result
+ end
+
+ -- Loop through the domains
+ for domain, domain_data in pairs(domains) do
+ for group_rid, group in pairs(domain_data) do
+ -- Look up the SIDs
+ local status, lookupsids2_result = lsa_lookupsids2(smbstate, openpolicy2_result['policy_handle'], group['member_sids'])
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, "Error looking up RIDs: " .. lookupsids2_result
+ end
+
+ if(lookupsids2_result and lookupsids2_result.names and lookupsids2_result.names.names and (#lookupsids2_result.names.names > 0)) then
+ local members = {}
+ for _, resolved_name in ipairs(lookupsids2_result.names.names) do
+ if(resolved_name.sid_type == "SID_NAME_USER") then
+ table.insert(members, resolved_name.name)
+ end
+ end
+ domains[domain][group_rid]['members'] = members
+ else
+ domains[domain][group_rid]['members'] = {}
+ end
+ end
+ end
+
+ -- Close the handle
+ lsa_close(smbstate, openpolicy2_result['policy_handle'])
+
+ stop_smb(smbstate)
+
+ return true, domains
+end
+
+---Attempt to enumerate users using LSA functions.
+--
+--@param host The host object.
+--@return status, result -- if status is false, result is an error message; otherwise, result is
+-- an array of tables, each containing the following elements:
+-- * name
+-- * rid
+-- * domain
+-- * typestr
+-- * source
+function lsa_enum_users(host)
+
+ local smbstate
+ local response = {}
+ local status, smbstate, bind_result, openpolicy2_result, lookupnames2_result, lookupsids2_result
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, LSA_PATH, true)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to LSA service
+ status, bind_result = bind(smbstate, LSA_UUID, LSA_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the LSA policy
+ status, openpolicy2_result = lsa_openpolicy2(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, openpolicy2_result
+ end
+
+ -- Start with some common names, as well as the name returned by the negotiate call
+ -- Vista doesn't like a 'null' after the server name, so fix that (TODO: the way I strip the null here feels hackish, is there a better way?)
+ local names = {"administrator", "guest", "test"}
+ -- These aren't always sent back (especially with 'extended security')
+ if(smbstate['domain'] ~= nil) then
+ names[#names + 1] = smbstate['domain']
+ end
+ if(smbstate['server'] ~= nil) then
+ names[#names + 1] = string.sub(smbstate['server'], 1, #smbstate['server'] - 1)
+ end
+
+ -- Get the server's name from nbstat
+ local result, server_name = netbios.get_server_name(host.ip)
+ if(result == true) then
+ names[#names + 1] = server_name
+ end
+
+ -- Get the logged in user from nbstat
+ local result, user_name = netbios.get_user_name(host.ip)
+ if(result == true) then
+ names[#names + 1] = user_name
+ end
+
+ -- Look up the names, if any are valid than the server's SID will be returned
+ status, lookupnames2_result = lsa_lookupnames2(smbstate, openpolicy2_result['policy_handle'], names)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, lookupnames2_result
+ end
+ -- Loop through the domains returned and find the users in each
+ for i = 1, #lookupnames2_result['domains']['domains'], 1 do
+ local domain = lookupnames2_result['domains']['domains'][i]['name']
+ local sid = lookupnames2_result['domains']['domains'][i]['sid']
+ local sids = { }
+
+ -- Start by looking up 500 and up
+ for j = 500, 500 + LSA_GROUPSIZE, 1 do
+ sids[#sids + 1] = sid .. "-" .. j
+ end
+
+ status, lookupsids2_result = lsa_lookupsids2(smbstate, openpolicy2_result['policy_handle'], sids)
+ if(status == false) then
+ stdnse.debug1("Error looking up RIDs: %s", lookupsids2_result)
+ else
+ -- Put the details for each name into an array
+ -- NOTE: Be sure to mirror any changes here in the next bit!
+ for j = 1, #lookupsids2_result['names']['names'], 1 do
+ if(lookupsids2_result['names']['names'][j]['sid_type'] == "SID_NAME_USER") then
+ local result = {}
+ result['name'] = lookupsids2_result['names']['names'][j]['name']
+ result['rid'] = 500 + j - 1
+ result['domain'] = domain
+ result['type'] = lookupsids2_result['names']['names'][j]['sid_type']
+ result['typestr'] = lsa_SidType_tostr(result['type'])
+ result['source'] = "LSA Bruteforce"
+ table.insert(response, result)
+ end
+ end
+ end
+
+ -- Start at RID 1000
+ local start = 1000
+ -- Keep track of the number of consecutive empty groups
+ local empty = 0
+ repeat
+ -- Keep track of the number of names we found in this group
+ local used_names = 0
+
+ local sids = {}
+ for j = start, start + LSA_GROUPSIZE, 1 do
+ sids[#sids + 1] = sid .. "-" .. j
+ end
+
+ -- Try converting this group of RIDs into names
+ status, lookupsids2_result = lsa_lookupsids2(smbstate, openpolicy2_result['policy_handle'], sids)
+ if(status == false) then
+ stdnse.debug1("Error looking up RIDs: %s", lookupsids2_result)
+ else
+ -- Put the details for each name into an array
+ for j = 1, #lookupsids2_result['names']['names'], 1 do
+ -- Determine the RID
+ local name = lookupsids2_result['names']['names'][j]['name']
+ local rid = start + j - 1
+ local typenum = lookupsids2_result['names']['names'][j]['sid_type']
+ local typestr = lsa_SidType_tostr(typenum)
+
+ -- Check if the username matches the rid (one server we discovered returned every user as valid,
+ -- this is to prevent that infinite loop)
+ if(tonumber(name) ~= rid) then
+ if(lookupsids2_result['names']['names'][j]['sid_type'] == "SID_NAME_USER") then
+ local result = {}
+ result['name'] = name
+ result['rid'] = rid
+ result['domain'] = domain
+ result['type'] = typenum
+ result['typestr'] = typestr
+ result['source'] = "LSA Bruteforce"
+ table.insert(response, result)
+
+ -- Increment the number of names we've found
+ used_names = used_names + 1
+ end
+ end
+ end
+ end
+
+
+ -- Either increment or reset the number of empty groups
+ if(used_names == 0) then
+ empty = empty + 1
+ else
+ empty = 0
+ end
+
+ -- Go to the next set of RIDs
+ start = start + LSA_GROUPSIZE
+ until (status == false or (empty == LSA_MINEMPTY))
+ end
+
+ -- Close the handle
+ lsa_close(smbstate, openpolicy2_result['policy_handle'])
+
+ stop_smb(smbstate)
+
+ return true, response
+end
+
+---Gets the best possible list of user accounts on the remote system using every available method.
+--
+-- TODO: Caching, store this in the registry
+--
+--@param host The host object.
+--@return (status, result, names) If status is false, result is an error message; otherwise, result
+-- is an array of users indexed by username and names is a sorted array of names.
+function get_user_list(host)
+ local status_samr, result_samr
+ local status_lsa, result_lsa
+ local response = {}
+ local names = {}
+
+ status_lsa, result_lsa = lsa_enum_users(host)
+ if(status_lsa == false) then
+ stdnse.debug1("MSRPC: Failed to enumerate users through LSA: %s", result_lsa)
+ else
+ for i = 1, #result_lsa, 1 do
+ if(result_lsa[i]['name'] ~= nil and result_lsa[i]['type'] == "SID_NAME_USER") then
+ response[result_lsa[i]['domain'] .. '\\' .. result_lsa[i]['name']] = result_lsa[i]
+ end
+ end
+ end
+
+ status_samr, result_samr = samr_enum_users(host)
+ if(status_samr == false) then
+ stdnse.debug1("MSRPC: Failed to enumerate users through SAMR: %s", result_samr)
+ else
+ for i = 1, #result_samr, 1 do
+ if(result_samr[i]['name'] ~= nil and result_samr[i]['type'] == "SID_NAME_USER") then
+ response[result_samr[i]['domain'] .. '\\' .. result_samr[i]['name']] = result_samr[i]
+ end
+ end
+ end
+
+ if(status_samr == false and status_lsa == false) then
+ return false, "MSRPC: Couldn't enumerate users; see debug output for more information"
+ end
+
+ for i, v in pairs(response) do
+ table.insert(names, i)
+ end
+ table.sort(names, function(a,b) return a:lower() < b:lower() end )
+
+ return true, response, names
+end
+
+---Retrieve information about a domain. This is done by three separate calls to samr_querydomaininfo2() to get all
+-- possible information. smbstate has to be in the proper state for this to work.
+local function get_domain_info(host, domain)
+ local result = {}
+ local status, smbstate, bind_result, connect4_result, lookupdomain_result, opendomain_result, enumdomainusers_result
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SAMR_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SAMR service
+ status, bind_result = bind(smbstate, SAMR_UUID, SAMR_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Call connect4()
+ status, connect4_result = samr_connect4(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, connect4_result
+ end
+
+ -- Call LookupDomain()
+ status, lookupdomain_result = samr_lookupdomain(smbstate, connect4_result['connect_handle'], domain)
+ if(status == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, "Couldn't look up the domain: " .. lookupdomain_result
+ end
+
+ -- Call OpenDomain()
+ status, opendomain_result = samr_opendomain(smbstate, connect4_result['connect_handle'], lookupdomain_result['sid'])
+ if(status == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, opendomain_result
+ end
+
+ -- Call QueryDomainInfo2() to get domain properties. We call these for three types -- 1, 8, and 12, since those return
+ -- the most useful information.
+ local status_1, querydomaininfo2_result_1 = samr_querydomaininfo2(smbstate, opendomain_result['domain_handle'], 1)
+ local status_8, querydomaininfo2_result_8 = samr_querydomaininfo2(smbstate, opendomain_result['domain_handle'], 8)
+ local status_12, querydomaininfo2_result_12 = samr_querydomaininfo2(smbstate, opendomain_result['domain_handle'], 12)
+
+ if(status_1 == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, querydomaininfo2_result_1
+ end
+
+ if(status_8 == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, querydomaininfo2_result_8
+ end
+
+ if(status_12 == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, querydomaininfo2_result_12
+ end
+
+ -- Call EnumDomainUsers() to get users
+ status, enumdomainusers_result = samr_enumdomainusers(smbstate, opendomain_result['domain_handle'])
+ if(status == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, enumdomainusers_result
+ end
+
+ -- Call EnumDomainAliases() to get groups
+ local status, enumdomaingroups_result = samr_enumdomainaliases(smbstate, opendomain_result['domain_handle'])
+ if(status == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+ return false, enumdomaingroups_result
+ end
+
+ -- Close the domain handle
+ samr_close(smbstate, opendomain_result['domain_handle'])
+ -- Close the smb session
+ stop_smb(smbstate)
+
+ -- Create a list of groups
+ local groups = {}
+ if(enumdomaingroups_result['sam'] ~= nil and enumdomaingroups_result['sam']['entries'] ~= nil) then
+ for _, group in ipairs(enumdomaingroups_result['sam']['entries']) do
+ table.insert(groups, group.name)
+ end
+ end
+
+ -- Create the list of users
+ local names = {}
+ if(enumdomainusers_result['sam'] ~= nil and enumdomainusers_result['sam']['entries'] ~= nil) then
+ for _, name in ipairs(enumdomainusers_result['sam']['entries']) do
+ table.insert(names, name.name)
+ end
+ end
+
+ -- Our output table
+ local response = {}
+
+ -- Finally, start filling in the response!
+ response['name'] = domain
+ response['sid'] = lookupdomain_result['sid']
+ response['groups'] = groups
+ response['users'] = names
+ if(querydomaininfo2_result_8['info']['domain_create_time'] ~= 0) then
+ response['created'] = datetime.format_timestamp(querydomaininfo2_result_8['info']['domain_create_time'])
+ else
+ response['created'] = "unknown"
+ end
+
+ -- Password characteristics
+ response['min_password_length'] = querydomaininfo2_result_1['info']['min_password_length']
+ response['max_password_age'] = querydomaininfo2_result_1['info']['max_password_age'] / 60 / 60 / 24
+ response['min_password_age'] = querydomaininfo2_result_1['info']['min_password_age'] / 60 / 60 / 24
+ response['password_history'] = querydomaininfo2_result_1['info']['password_history_length']
+ response['lockout_duration'] = querydomaininfo2_result_12['info']['lockout_duration'] / 60
+ response['lockout_threshold'] = querydomaininfo2_result_12['info']['lockout_threshold']
+ response['lockout_window'] = querydomaininfo2_result_12['info']['lockout_window'] / 60
+
+ -- Sanity check the different values, and remove them if they don't appear to be set
+ if(response['min_password_length'] <= 0) then
+ response['min_password_length'] = nil
+ end
+
+ if(response['max_password_age'] < 0 or response['max_password_age'] > 5000) then
+ response['max_password_age'] = nil
+ end
+
+ if(response['min_password_age'] <= 0) then
+ response['min_password_age'] = nil
+ end
+
+ if(response['password_history'] <= 0) then
+ response['password_history'] = nil
+ end
+
+ if(response['lockout_duration'] <= 0) then
+ response['lockout_duration'] = nil
+ end
+
+ if(response['lockout_threshold'] <= 0) then
+ response['lockout_threshold'] = nil
+ end
+
+ if(response['lockout_window'] <= 0) then
+ response['lockout_window'] = nil
+ end
+
+ local password_properties = querydomaininfo2_result_1['info']['password_properties']
+
+ if(#password_properties > 0) then
+ local password_properties_response = {}
+ password_properties_response['name'] = "Password properties:"
+ for j = 1, #password_properties, 1 do
+ table.insert(password_properties_response, samr_PasswordProperties_tostr(password_properties[j]))
+ end
+
+ response['password_properties'] = password_properties_response
+ end
+
+ return true, response
+end
+
+function get_domains(host)
+ local result = {}
+ local status, smbstate, bind_result, connect4_result, enumdomains_result
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SAMR_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SAMR service
+ status, bind_result = bind(smbstate, SAMR_UUID, SAMR_VERSION, nil)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, bind_result
+ end
+
+ -- Call connect4()
+ status, connect4_result = samr_connect4(smbstate, host.ip)
+ if(status == false) then
+ stop_smb(smbstate)
+ return false, connect4_result
+ end
+
+ -- Call EnumDomains()
+ status, enumdomains_result = samr_enumdomains(smbstate, connect4_result['connect_handle'])
+ if(status == false) then
+ samr_close(smbstate, connect4_result['connect_handle'])
+ stop_smb(smbstate)
+
+ return false, enumdomains_result
+ end
+
+ -- Close the connect handle
+ samr_close(smbstate, connect4_result['connect_handle'])
+
+ -- Close the SMB session
+ stop_smb(smbstate)
+
+ -- If no domains were returned, return an error (not sure that this can ever happen, but who knows?)
+ if(#enumdomains_result['sam']['entries'] == 0) then
+ return false, "No domains could be found"
+ end
+
+ local response = {}
+ for i = 1, #enumdomains_result['sam']['entries'], 1 do
+ local domain = enumdomains_result['sam']['entries'][i]['name']
+ local status, domain_info = get_domain_info(host, domain)
+
+ if(not(status)) then
+ return false, "Couldn't get info for the domain: " .. domain_info
+ else
+ response[domain] = domain_info
+ end
+
+ end
+
+ return true, response
+end
+
+---Create a "service" on a remote machine.
+--
+-- This service is linked to an executable that is already on the system. The
+-- name of the service can be whatever you want it to be. The service is
+-- created in the "stopped" state with "manual" startup, and it ignores errors.
+-- The 'servicename' is what people will see on the system while the service is
+-- running, and what'll stay there is something happens that the service can't
+-- be deleted properly.
+--
+-- Note that this (and the other "service" functions) are highly invasive. They
+-- make configuration changes to the machine that can potentially affect
+-- stability.
+--
+-- The reason that this and the other "service" functions don't require a
+-- <code>smbstate</code> object is that I wanted them to be independent. If a
+-- service fails to start, I don't want it to affect the program's ability to
+-- stop and delete the service. Every service function is independent.
+--
+--@param host The host object.
+--@param servicename The name of the service to create.
+--@param path The path and filename on the remote system.
+--@return status true or false
+--@return error message if status is false
+function service_create(host, servicename, path)
+ local status, smbstate, bind_result, open_result, create_result, close_result
+
+ stdnse.debug1("Creating service: %s (%s)", servicename, path)
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SVCCTL_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SVCCTL service
+ status, bind_result = bind(smbstate, SVCCTL_UUID, SVCCTL_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the service manager
+ stdnse.debug2("Opening the remote service manager")
+ status, open_result = svcctl_openscmanagerw(smbstate, host.ip, 0x02000000)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_result
+ end
+
+ -- Create the service
+ stdnse.debug2("Creating the service")
+ status, create_result = svcctl_createservicew(smbstate, open_result['handle'], servicename, servicename, path)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, create_result
+ end
+ -- Close the handle to the service
+ status, close_result = svcctl_closeservicehandle(smbstate, create_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ -- Close the service manager
+ status, close_result = svcctl_closeservicehandle(smbstate, open_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ smb.stop(smbstate)
+
+ return true
+end
+
+---Start a service on the remote machine based on its name. For example, to start the registry
+-- service, this can be called on "RemoteRegistry".
+--
+-- If you start a service on a machine, you should also stop it when you're finished. Every service
+-- running is extra attack surface for a potential attacker
+--
+--@param host The host object.
+--@param servicename The name of the service to start.
+--@param args [optional] The arguments to pass to the service. Most built-in services don't
+-- require arguments.
+--@return (status, err) If status is <code>false</code>, <code>err</code> is an error message;
+-- otherwise, err is undefined.
+function service_start(host, servicename, args)
+ local status, smbstate, bind_result, open_result, open_service_result, start_result, close_result, query_result
+
+ stdnse.debug1("Starting service: %s", servicename)
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SVCCTL_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SVCCTL service
+ status, bind_result = bind(smbstate, SVCCTL_UUID, SVCCTL_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the service manager
+ stdnse.debug1("Opening the remote service manager")
+ status, open_result = svcctl_openscmanagerw(smbstate, host.ip, 0x02000000)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_result
+ end
+
+ -- Get a handle to the service
+ stdnse.debug2("Getting a handle to the service")
+ status, open_service_result = svcctl_openservicew(smbstate, open_result['handle'], servicename, 0x000f01ff)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_service_result
+ end
+
+ -- Start it
+ stdnse.debug2("Starting the service")
+ status, start_result = svcctl_startservicew(smbstate, open_service_result['handle'], args)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, start_result
+ end
+
+ -- Wait for it to start (TODO: Check the query result better)
+ stdnse.debug1("Waiting for the service to start")
+ repeat
+ status, query_result = svcctl_queryservicestatus(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, query_result
+ end
+ stdnse.sleep(.5)
+ until query_result['service_status']['controls_accepted'][1] == "SERVICE_CONTROL_STOP" or query_result['service_status']['state'][1] == "SERVICE_STATE_ACTIVE"
+
+ -- Close the handle to the service
+ status, close_result = svcctl_closeservicehandle(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ -- Close the service manager
+ status, close_result = svcctl_closeservicehandle(smbstate, open_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ smb.stop(smbstate)
+
+ return true
+end
+
+---Stop a service on the remote machine based on its name. For example, to stop the registry
+-- service, this can be called on "RemoteRegistry".
+--
+-- This can be called on a service that's already stopped without hurting anything (just keep in mind
+-- that an error will be returned).
+--
+--@param host The host object.
+--@param servicename The name of the service to stop.
+--@return (status, err) If status is <code>false</code>, <code>err</code> is an error message;
+-- otherwise, err is undefined.
+function service_stop(host, servicename)
+ local status, smbstate, bind_result, open_result, open_service_result, control_result, close_result, query_result
+
+ stdnse.debug1("Stopping service: %s", servicename)
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SVCCTL_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SVCCTL service
+ status, bind_result = bind(smbstate, SVCCTL_UUID, SVCCTL_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the service manager
+ stdnse.debug2("Opening the remote service manager")
+ status, open_result = svcctl_openscmanagerw(smbstate, host.ip, 0x02000000)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_result
+ end
+
+ -- Get a handle to the service
+ stdnse.debug2("Getting a handle to the service")
+ status, open_service_result = svcctl_openservicew(smbstate, open_result['handle'], servicename, 0x000f01ff)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_service_result
+ end
+
+ -- Stop it
+ stdnse.debug2("Stopping the service")
+ status, control_result = svcctl_controlservice(smbstate, open_service_result['handle'], "SERVICE_CONTROL_STOP")
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, control_result
+ end
+
+ -- Wait for it to stop (TODO: Check the query result better)
+ stdnse.debug2("Waiting for the service to stop")
+ repeat
+ status, query_result = svcctl_queryservicestatus(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, query_result
+ end
+ stdnse.sleep(.5)
+ until query_result['service_status']['controls_accepted'][1] == nil
+
+ -- Close the handle to the service
+ status, close_result = svcctl_closeservicehandle(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ -- Close the service manager
+ status, close_result = svcctl_closeservicehandle(smbstate, open_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ smb.stop(smbstate)
+
+ return true
+end
+
+---Delete a service on the remote machine based on its name. I don't recommend deleting any services that
+-- you didn't create.
+--
+--@param host The host object.
+--@param servicename The name of the service to delete.
+--@return (status, err) If status is <code>false</code>, <code>err</code> is an error message;
+-- otherwise, err is undefined.
+function service_delete(host, servicename)
+ local status, smbstate, bind_result, open_result, open_service_result, delete_result, close_result
+
+ stdnse.debug1("Deleting service: %s", servicename)
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SVCCTL_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SVCCTL service
+ status, bind_result = bind(smbstate, SVCCTL_UUID, SVCCTL_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Open the service manager
+ stdnse.debug2("Opening the remote service manager")
+ status, open_result = svcctl_openscmanagerw(smbstate, host.ip, 0x02000000)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_result
+ end
+
+ -- Get a handle to the service
+ stdnse.debug2("Getting a handle to the service: %s", servicename)
+ status, open_service_result = svcctl_openservicew(smbstate, open_result['handle'], servicename, 0x000f01ff)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, open_service_result
+ end
+
+ -- Delete the service
+ stdnse.debug2("Deleting the service")
+ status, delete_result = svcctl_deleteservice(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, delete_result
+ end
+
+ -- Close the handle to the service
+ status, close_result = svcctl_closeservicehandle(smbstate, open_service_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ -- Close the service manager
+ status, close_result = svcctl_closeservicehandle(smbstate, open_result['handle'])
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, close_result
+ end
+
+ smb.stop(smbstate)
+
+ return true
+end
+
+---Retrieves statistical information about the given server.
+--
+-- This function requires administrator privileges to run, and is present on
+-- all Windows versions, so it's a useful way to check whether or not an
+-- account is administrative.
+--@param host The host object
+--@return status true or false
+--@return If status is false, data is an error message; otherwise, data is a
+-- table of information about the server.
+function get_server_stats(host)
+ local stats
+ local status
+ local smbstate
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SRVSVC_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SRVSVC service
+ local status, bind_result = bind(smbstate, SRVSVC_UUID, SRVSVC_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Call netservergetstatistics for 'server'
+ local status, netservergetstatistics_result = srvsvc_netservergetstatistics(smbstate, host.ip)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, netservergetstatistics_result
+ end
+
+ -- Stop the session
+ smb.stop(smbstate)
+
+ -- Build the response
+ local stats = netservergetstatistics_result['stat']
+
+ -- Convert the date to a string
+ stats['start_str'] = datetime.format_timestamp(stats['start'])
+
+ -- Get the period and convert it to a proper time offset
+ stats['period'] = os.time() - stats['start']
+ stats.period_str = datetime.format_time(stats.period)
+
+ -- Combine the 64-bit values
+ stats['bytessent'] = ((stats['bytessent_high'] << 32) | stats['bytessent_low'])
+ stats['bytesrcvd'] = ((stats['bytesrcvd_high'] << 32) | stats['bytesrcvd_low'])
+
+ -- Sidestep divide-by-zero errors (probably won't come up, but I'd rather be safe)
+ if(stats['period'] == 0) then
+ stats['period'] = 1
+ end
+
+ -- Get the bytes/second values
+ stats['bytessentpersecond'] = stats['bytessent'] / stats['period']
+ stats['bytesrcvdpersecond'] = stats['bytesrcvd'] / stats['period']
+
+ return true, stats
+end
+
+---Attempts to enumerate the shares on a remote system using MSRPC calls. Without a user account,
+-- this will likely fail against a modern system, but will succeed against Windows 2000.
+--
+--@param host The host object.
+--@return Status (true or false).
+--@return List of shares (if status is true) or an an error string (if status is false).
+function enum_shares(host)
+
+ local status, smbstate
+ local bind_result, netshareenumall_result
+ local shares
+
+ -- Create the SMB session
+ status, smbstate = start_smb(host, SRVSVC_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SRVSVC service
+ status, bind_result = bind(smbstate, SRVSVC_UUID, SRVSVC_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Call netshareenumall
+ status, netshareenumall_result = srvsvc_netshareenumall(smbstate, host.ip)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, netshareenumall_result
+ end
+
+ -- Stop the SMB session
+ smb.stop(smbstate)
+
+ -- Convert the share list to an array
+ shares = {}
+ for i, v in pairs(netshareenumall_result['ctr']['array']) do
+ shares[#shares + 1] = v['name']
+ end
+
+ return true, shares
+end
+
+
+---Attempts to retrieve additional information about a share. Will fail unless we have
+-- administrative access.
+--
+--@param host The host object.
+--@return Status (true or false).
+--@return A table of information about the share (if status is true) or an an error string (if
+-- status is false).
+function get_share_info(host, name)
+ local response = {}
+
+ -- Create the SMB session
+ local status, smbstate = start_smb(host, SRVSVC_PATH)
+ if(status == false) then
+ return false, smbstate
+ end
+
+ -- Bind to SRVSVC service
+ local status, bind_result = bind(smbstate, SRVSVC_UUID, SRVSVC_VERSION, nil)
+ if(status == false) then
+ smb.stop(smbstate)
+ return false, bind_result
+ end
+
+ -- Call NetShareGetInfo
+
+ local status, netsharegetinfo_result = srvsvc_netsharegetinfo(smbstate, host.ip, name, 2)
+ stdnse.debug2("NetShareGetInfo status:%s result:%s", status, netsharegetinfo_result)
+ if(status == false) then
+ if(string.find(netsharegetinfo_result, "NT_STATUS_WERR_ACCESS_DENIED")) then
+ stdnse.debug2("Calling NetShareGetInfo with information level 1")
+ status, netsharegetinfo_result = srvsvc_netsharegetinfo(smbstate, host.ip, name, 1)
+ if status then
+ smb.stop(smbstate)
+ return true, netsharegetinfo_result
+ end
+ end
+ smb.stop(smbstate)
+ return false, netsharegetinfo_result
+ end
+
+ smb.stop(smbstate)
+
+ return true, netsharegetinfo_result
+end
+
+--####################################################################--
+--# 1) RRAS RASRPC INTERFACE
+--####################################################################--
+ROUTER_PATH = "\\router" --also can be reached across "\\srvsvc" pipe in WinXP
+RASRPC_UUID = "\x36\x00\x61\x20\x22\xfa\xcf\x11\x98\x23\x00\xa0\xc9\x11\xe5\xdf"
+RASRPC_VERSION = 1
+
+--####################################################################--
+--# 2) RRAS RASRPC TYPES
+--####################################################################--
+
+--####################################################################--
+--typedef enum _ReqTypes{
+-- REQTYPE_PORTENUM = 21,//Request to enumerate all the port information on the RRAS.
+-- REQTYPE_GETINFO = 22,//Request to get information about a specific port on the RRAS.
+-- REQTYPE_GETDEVCONFIG = 73,//Request to get device information on the RRAS.
+-- REQTYPE_SETDEVICECONFIGINFO = 94,//Request to set device configuration information on RRAS.
+-- REQTYPE_GETDEVICECONFIGINFO = 95,//Request to get device configuration information on RRAS.
+-- REQTYPE_GETCALLEDID = 105,//Request to get CalledId information for a specific device on RRAS.
+-- REQTYPE_SETCALLEDID = 106,//Request to set CalledId information for a specific device on RRAS.
+-- REQTYPE_GETNDISWANDRIVERCAPS = 111//Request to get the encryption capabilities of the RRAS.
+--} ReqTypes;
+--- The <code>ReqTypes</code> enumerations indicate the different types of message requests that can be passed in
+--the <code>RB_ReqType</code> field of <code>RequestBuffer</code> structure.
+-- * [MS-RRASM] <code>2.2.1.1.18 ReqTypes</code>
+--####################################################################--
+RRAS_RegTypes = {}
+RRAS_RegTypes['PORTENUM'] = 21
+RRAS_RegTypes['GETINFO'] = 22
+RRAS_RegTypes['GETDEVCONFIG'] = 73 --this method is vulnerable to ms06-025
+RRAS_RegTypes['SETDEVICECONFIGINFO'] = 94
+RRAS_RegTypes['GETDEVICECONFIGINFO'] = 95
+RRAS_RegTypes['GETCALLEDID'] = 105
+RRAS_RegTypes['SETCALLEDID'] = 106
+RRAS_RegTypes['GETNDISWANDRIVERCAPS'] = 111
+
+--####################################################################--
+--typedef struct _RequestBuffer {
+-- DWORD RB_PCBIndex;//A unique identifier for the port.
+-- ReqTypes RB_Reqtype;//A ReqTypes enumeration value indicating the request type sent to the server.
+-- DWORD RB_Dummy;//MUST be set to the size of the ULONG_PTR on the client.
+-- DWORD RB_Done;//MBZ
+-- LONGLONG Alignment;//MBZ
+-- BYTE RB_Buffer[1];//variable size
+--} RequestBuffer;
+--- The <code>RequestBuffer</code> is a generic information container used by the <code>RasRpcSubmitRequest</code>
+--method to set or retrieve information on RRAS server. This method performs
+--serialization of <code>RequestBuffer</code> structure.
+-- Note: This structure is not an IDL specification and as such is not translated into NDR.
+-- @return Returns a blob of <code>RequestBuffer</code> structure.
+-- * [MS-RRASM] <code>2.2.1.2.218 RequestBuffer</code>
+--####################################################################--
+function RRAS_marshall_RequestBuffer(RB_PCBIndex, RB_ReqType, RB_Buffer)
+ local rb_blob, RB_Dummy, RB_Done, Alignment
+ RB_Dummy = 4
+ RB_Done = 0
+ Alignment = 0
+ rb_blob = string.pack("<I4I4I4I4I8",
+ RB_PCBIndex,
+ RB_ReqType,
+ RB_Dummy,
+ RB_Done,
+ Alignment)
+ .. RB_Buffer
+ return rb_blob
+end
+
+--####################################################################--
+--# 3) RRAS RASRPC OPERATIONS
+--####################################################################--
+local RRAS_DEBUG_LVL = 2 --debug level for rras operations when calling stdnse.debug
+
+--####################################################################--
+--- RRAS operation numbers.
+-- * [MS-RRASM] <code>3.3.4 Message Processing Events and Sequencing Rules</code>
+--####################################################################--
+RRAS_Opnums = {}
+RRAS_Opnums["RasRpcDeleteEntry"] = 5
+RRAS_Opnums["RasRpcGetUserPreferences"] = 9
+RRAS_Opnums["RasRpcSetUserPreferences"] = 10
+RRAS_Opnums["RasRpcGetSystemDirectory"] = 11
+RRAS_Opnums["RasRpcSubmitRequest"] = 12
+RRAS_Opnums["RasRpcGetInstalledProtocolsEx"] = 14
+RRAS_Opnums["RasRpcGetVersion"] = 15
+
+--####################################################################--
+--DWORD RasRpcSubmitRequest(
+-- [in] handle_t hServer,//An RPC binding handle. (not send)
+-- [in, out, unique, size_is(dwcbBufSize)] PBYTE pReqBuffer,//A pointer to a buffer of size dwcbBufSize.
+-- [in] DWORD dwcbBufSize//Size in byte of pReqBuffer.
+--);
+---The RasRpcSubmitRequest method retrieves or sets the configuration data on RRAS server.
+-- @param smbstate The smb object.
+-- @param pReqBuffer The buffer MUST be large enough to hold the <code>RequestBuffer</code>
+--structure and <code>RequestBuffer.RB_Buffer</code> data. <code>RequestBuffer.RB_Reqtype</code>
+--specifies the request type which will be processed by the server and
+--<code>RequestBuffer.RB_Buffer</code> specifies the structure specific to <code>RB_Reqtype</code>
+--to be processed. <code>RequestBuffer.RB_PCBIndex<code> MUST be set to the unique port identifier
+--whose information is sought for <code>ReqTypes REQTYPE_GETINFO</code> and <code>REQTYPE_GETDEVCONFIG</code>.
+--For other valid <code>ReqTypes</code>, <code>RequestBuffer.RB_PCBIndex</code> MUST be set to zero.
+-- @param dwcbBufSize Integer representing the size of <code>pRegBuffer</code> in bytes.
+-- @return (status, result)
+--* <code>status == true</code> -> <code>result</code> is a blob that represent a <code>pRegBuffer</code> .
+--* <code>status == false</code> -> <code>result</code> is a error message that caused the fuzz.
+-- * [MS-RRASM] <code>3.3.4.5 RasRpcSubmitRequest (Opnum 12)</code>
+--####################################################################--
+function RRAS_SubmitRequest(smbstate, pReqBuffer, dwcbBufSize)
+ --sanity check
+ if(dwcbBufSize == nil) then
+ dwcbBufSize = #pReqBuffer
+ end
+ --pack the request
+ local req_blob
+ --[in, out, unique, size_is(dwcbBufSize) PBYTE pReqBuffer,
+ req_blob = string.pack("<I4I4", 0x20000, dwcbBufSize) .. pReqBuffer .. get_pad(pReqBuffer,4) --unique pointer see samba:ndr_push_unique_ptr
+ --[in] DWORD dwcbBufSize
+ .. msrpctypes.marshall_int32(dwcbBufSize)
+ --call the function
+ local status, result
+ stdnse.debug(
+ RRAS_DEBUG_LVL,
+ "RRAS_SubmitRequest: Calling...")
+ status, result = call_function(
+ smbstate,
+ RRAS_Opnums["RasRpcSubmitRequest"],
+ req_blob)
+ --sanity check
+ if(status == false) then
+ stdnse.debug(
+ RRAS_DEBUG_LVL,
+ "RRAS_SubmitRequest: Call function failed: %s",
+ result)
+ return false, result
+ end
+ stdnse.debug(
+ RRAS_DEBUG_LVL,
+ "RRAS_SubmitRequest: Returned successfully")
+ --dissect the reply
+ local rep_blob
+ rep_blob = result
+ return true, rep_blob
+end
+
+--####################################################################--
+--# 1) DNS SERVER MANAGEMENT SERVICE INTERFACE
+--####################################################################--
+DNSSERVER_UUID_STR = "50abc2a4-574d-40b3-9d66-ee4fd5fba076"
+DNSSERVER_UUID = "\xa4\xc2\xab\x50\x4d\x57\xb3\x40\x9d\x66\xee\x4f\xd5\xfb\xa0\x76"
+DNSSERVER_PATH = "\\DNSSERVER"
+DNSSERVER_VERSION = 5
+
+--####################################################################--
+--# 2) DNS SERVER MANAGEMENT SERVICE TYPES
+--####################################################################--
+---The list of names that are used in (name, value) pairs in DNS Server
+--Configuration information is given below.
+-- * [MS-DNSP] <code>3.1.1.1 DNS Server Configuration Information</code>
+DNSSERVER_ConfInfo =
+{
+ DNSSERVER_IntProp = {},
+ DNSSERVER_AddrArrProp = {},
+ DNSSERVER_StrProp = {},
+ DNSSERVER_StrLstProp = {}
+}
+
+--####################################################################--
+--# 3) DNS SERVER MANAGEMENT SERVICE OPERATIONS
+--####################################################################--
+local DNSSERVER_DEBUG_LVL = 2 --debug level for dnsserver operations when calling stdnse.debug
+
+--####################################################################--
+--- DNSSERVER operation numbers.
+-- * [MS-DNSP] <code>3.1.4 Message Processing Events and Sequencing Rules</code>
+--####################################################################--
+DNSSERVER_Opnums = {}
+DNSSERVER_Opnums['R_DnssrvOperation'] = 0
+DNSSERVER_Opnums['R_DnssrvQuery'] = 1
+DNSSERVER_Opnums['R_DnssrvComplexOperation'] = 2
+DNSSERVER_Opnums['R_DnssrvEnumRecords'] = 3
+DNSSERVER_Opnums['R_DnssrvUpdateRecord'] = 4
+DNSSERVER_Opnums['R_DnssrvOperation2'] = 5
+DNSSERVER_Opnums['R_DnssrvQuery2'] = 6
+DNSSERVER_Opnums['R_DnssrvComplexOperation2'] = 7
+DNSSERVER_Opnums['R_DnssrvEnumRecords2'] = 8
+DNSSERVER_Opnums['R_DnssrvUpdateRecord2'] = 9
+
+--####################################################################--
+--[[
+LONG R_DnssrvQuery(
+ [in, unique, string] LPCWSTR pwszServerName,
+ [in, unique, string] LPCSTR pszZone,
+ [in, unique, string] LPCSTR pszOperation,
+ [out] PDWORD pdwTypeId,
+ [out, switch_is(*pdwTypeId)] DNSSRV_RPC_UNION* ppData);
+--]]
+---Issues type specific information queries to server. This method is
+--obsoleted by R_DnssrvQuery2.
+-- @param smbstate The smb object.
+-- @param server_name String that designates a fully qualified domain
+--name of the target server. The server MUST ignore this value.
+-- @param zone String that designates the name of the zone to be queried.
+--For operations specific to a particular zone, this field MUST contain
+--the name of the zone. For all other operations, this field MUST be nil.
+-- @param operation String that designates the name of the operation to
+--be performed on the server. These are two sets of allowed values for
+--pszOperation:
+--* <code>zone == nil</code> -> see DNSSERVER_ConfInfo table.
+--* <code>zone == "some_zone"</code> -> see DNSSERVER_ZoneInfo table.
+-- @return (status, result)
+--* <code>status == true</code> ->
+--that indicates the type of <code>result['data']</code>.
+--** <code>result['data']</code> - A DNSSRV_RPC_UNION blob that contains a
+--** <code>result['type_id']</code> - Integer that on success contains a value of type DNS_RPC_TYPEID
+--data-structure as indicated by <code>result['type_id']</code>.
+--* <code>status == false</code> ->
+--** <code>result</code> - Is a error message that caused the fuzz.
+-- * [MS-DNSP] <code>3.1.4.2 R_DnssrvQuery (Opnum 1)</code>
+--####################################################################--
+function DNSSERVER_Query(smbstate, server_name, zone, operation)
+ local status
+ --call
+ local req_blob, srv_name_utf16, zone_ascii, operation_ascii
+ --[in, unique, string] LPCWSTR pwszServerName,
+ local unique_ptr
+ unique_ptr = 0x00020000
+ srv_name_utf16 = msrpctypes.string_to_unicode(server_name, true)
+ req_blob = string.pack("<I4I4I4I4",
+ unique_ptr,
+ #srv_name_utf16/2,
+ 0,
+ #srv_name_utf16/2)
+ .. srv_name_utf16
+ .. get_pad(srv_name_utf16, 4)
+ --[in, unique, string] LPCSTR pszZone,
+ if(zone == nil) then
+ req_blob = string.pack("<I4", 0x00000000)
+ else
+ zone_ascii = zone .. '\0'
+ req_blob = req_blob .. string.pack("<I4I4I4I4",
+ unique_ptr + 1,
+ #zone_ascii,
+ 0,
+ #zone_ascii)
+ .. zone_ascii
+ .. get_pad(zone_ascii, 4)
+ end
+ --[in, unique, string] LPCSTR pszOperation,
+ operation_ascii = operation .. '\0'
+ req_blob = req_blob .. string.pack("<I4I4I4I4",
+ unique_ptr+2,
+ #operation_ascii,
+ 0,
+ #operation_ascii)
+ .. operation_ascii
+ .. get_pad(operation_ascii, 4)
+
+ local call_result
+ stdnse.debug(
+ DNSSERVER_DEBUG_LVL,
+ "DNSSERVER_Query: Calling...")
+ status, call_result = call_function(
+ smbstate,
+ DNSSERVER_Opnums['R_DnssrvQuery'],
+ req_blob)
+ --sanity check
+ if(status == false) then
+ stdnse.debug(
+ DNSSERVER_DEBUG_LVL,
+ "DNSSERVER_Query: Call function failed: %s",
+ call_result)
+ return false, call_result
+ end
+ stdnse.debug(
+ DNSSERVER_DEBUG_LVL,
+ "DNSSERVER_Query: Returned successfully")
+ --dissect the reply
+ local rep_blob, pos, ptr, result
+ rep_blob = call_result['arguments']
+ --[out] PDWORD pdwTypeId,
+ result = {}
+ pos, result['type_id'] = msrpctypes.unmarshall_int32_ptr(rep_blob)
+ --[out, switch_is(*pdwTypeId)] DNSSRV_RPC_UNION* ppData) -- pointer_default(unique)
+ -- TODO: The original used the 'A' format to unpack a single byte, which I
+ -- replaced with the literal equivalent 'B'. Should it have been a substring
+ -- to the end of the blob instead?
+ ptr, result['data'], pos = string.unpack("<I4B", rep_blob, pos)
+ return result
+end
+
+--####################################################################--
+--# UTILITY
+--###################################################################--
+
+--####################################################################--
+---Makes a pad for alignment
+-- @param data Data which needs to be padded for the sake of alignment.
+-- @param align Integer representing the alignment boundary.
+-- @param pad_byte The value for pad byte.
+-- @return Returns the amount of pad calculated by <code>(align-datalen%align)%align</code>.
+--####################################################################--
+function get_pad(data, align, pad_byte)
+ pad_byte = pad_byte or "\00"
+ return string.rep(pad_byte, (align-#data%align)%align)
+end
+
+return _ENV;