byt3bl33d3r/MITMf

View on GitHub
core/responder/fingerprint.py

Summary

Maintainability
A
0 mins
Test Coverage
#!/usr/bin/env python
# This file is part of Responder
# Original work by Laurent Gaffie - Trustwave Holdings
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
import re
import sys
import socket
import struct
import string
import logging

from utils import *
from odict import OrderedDict
from packets import SMBHeader, SMBNego, SMBNegoFingerData, SMBSessionFingerData

def OsNameClientVersion(data):
    try:
        length = struct.unpack('<H',data[43:45])[0]
        pack = tuple(data[47+length:].split('\x00\x00\x00'))[:2]
        OsVersion, ClientVersion = tuple([e.replace('\x00','') for e in data[47+length:].split('\x00\x00\x00')[:2]])
        return OsVersion, ClientVersion

    except:
         return "Could not fingerprint Os version.", "Could not fingerprint LanManager Client version"

def RunSmbFinger(host):
    try:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect(host)
        s.settimeout(0.7)

        h = SMBHeader(cmd="\x72",flag1="\x18",flag2="\x53\xc8")
        n = SMBNego(data = SMBNegoFingerData())
        n.calculate()
        
        Packet = str(h)+str(n)
        Buffer = struct.pack(">i", len(''.join(Packet)))+Packet
        s.send(Buffer)
        data = s.recv(2048)
        
        if data[8:10] == "\x72\x00":
            Header = SMBHeader(cmd="\x73",flag1="\x18",flag2="\x17\xc8",uid="\x00\x00")
            Body = SMBSessionFingerData()
            Body.calculate()

            Packet = str(Header)+str(Body)
            Buffer = struct.pack(">i", len(''.join(Packet)))+Packet  

            s.send(Buffer) 
            data = s.recv(2048)

        if data[8:10] == "\x73\x16":
            return OsNameClientVersion(data)
    except:
        settings.Config.AnalyzeLogger.warning("Fingerprint failed for host: {}".format(host))
        return None