summaryrefslogtreecommitdiffstats
path: root/scripts/sip-brute.nse
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--scripts/sip-brute.nse111
1 files changed, 111 insertions, 0 deletions
diff --git a/scripts/sip-brute.nse b/scripts/sip-brute.nse
new file mode 100644
index 0000000..74f934a
--- /dev/null
+++ b/scripts/sip-brute.nse
@@ -0,0 +1,111 @@
+local brute = require "brute"
+local creds = require "creds"
+local math = require "math"
+local shortport = require "shortport"
+local sip = require "sip"
+local stdnse = require "stdnse"
+
+description = [[
+Performs brute force password auditing against Session Initiation Protocol
+(SIP) accounts. This protocol is most commonly associated with VoIP sessions.
+]]
+
+---
+-- @usage
+-- nmap -sU -p 5060 <target> --script=sip-brute
+--
+-- PORT STATE SERVICE
+-- 5060/udp open|filtered sip
+-- | sip-brute:
+-- | Accounts
+-- | 1000:password123 => Valid credentials
+-- | Statistics
+-- |_ Performed 5010 guesses in 3 seconds, average tps: 1670
+
+-- Version 0.1
+-- Created 04/03/2011 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>
+
+author = "Patrik Karlsson"
+license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
+categories = {"intrusive", "brute"}
+
+
+portrule = shortport.port_or_service(5060, "sip", {"tcp", "udp"})
+
+Driver = {
+
+ new = function(self, host, port)
+ local o = {}
+ setmetatable(o, self)
+ self.__index = self
+ o.host = host
+ o.port = port
+ return o
+ end,
+
+ connect = function( self )
+ self.helper = sip.Helper:new(self.host, self.port, { expires = 0 })
+ local status, err = self.helper:connect()
+ if ( not(status) ) then
+ return "ERROR: Failed to connect to SIP server"
+ end
+ return true
+ end,
+
+ login = function( self, username, password )
+ self.helper:setCredentials(username, password)
+ local status, err = self.helper:register()
+ if ( not(status) ) then
+ -- The 3CX System has an anti-hacking option that triggers after
+ -- a certain amount of guesses. This protection basically prevents
+ -- any connection from the offending IP at an application level.
+ if ( err:match("^403 Forbidden") ) then
+ local err = brute.Error:new("The systems seems to have blocked our IP")
+ err:setAbort( true )
+ return false, err
+ end
+ return false, brute.Error:new( "Incorrect password" )
+ end
+ return true, creds.Account:new(username, password, creds.State.VALID)
+ end,
+
+ disconnect = function(self) return self.helper:close() end,
+}
+
+-- Function used to check if we can distinguish existing from non-existing
+-- accounts. In order to do so we send a semi-random username and password
+-- and interpret the response. Some servers will respond as if the login
+-- was successful which makes it impossible to tell successful logins
+-- from non-existing accounts apart.
+local function checkBadUser(host, port)
+ local user = "baduser-" .. math.random(10000)
+ local pass = "badpass-" .. math.random(10000)
+ local helper = sip.Helper:new(host, port, { expires = 0 })
+
+ stdnse.debug2("Checking bad user: %s/%s", user, pass)
+ local status, err = helper:connect()
+ if ( not(status) ) then return false, "ERROR: Failed to connect" end
+
+ helper:setCredentials(user, pass)
+ local status, err = helper:register()
+ helper:close()
+ return status, err
+end
+
+action = function(host, port)
+ local force = stdnse.get_script_args("sip-brute.force")
+
+ if ( not(force) ) then
+ local status = checkBadUser(host, port)
+ if ( status ) then
+ return "\nERROR: Cannot detect non-existing user accounts, this will result in:\n" ..
+ " * Non-existing accounts being detected as found\n" ..
+ " * Passwords for existing accounts being correctly detected\n\n" ..
+ "Supply the sip-brute.force argument to override"
+ end
+ end
+ local engine = brute.Engine:new(Driver, host, port)
+ engine.options.script_name = SCRIPT_NAME
+ local status, result = engine:start()
+ return result
+end