rapid7/metasploit-framework

View on GitHub
lib/rex/proto/rfb/client.rb

Summary

Maintainability
C
1 day
Test Coverage
# -*- coding: binary -*-

##
#
# RFB protocol support
#
# by Joshua J. Drake <jduck>
#
# Based on:
# vnc_auth_none contributed by Matteo Cantoni <goony[at]nothink.org>
# vnc_auth_login contributed by carstein <carstein.sec[at]gmail.com>
#
# TODO: determine how to detect a view-only session.
##

module Rex
  module Proto
    module RFB
      class Client
        include Rex::Proto::RFB::Constants
        def initialize(sock, opts = {})
          @sock = sock
          @opts = opts

          @banner = nil
          @majver = -1
          @minver = -1
          @auth_types = []
        end

        def read_error_message
          len = @sock.get_once(4)
          return 'Unknown error' if !len or len.length != 4

          len = len.unpack('N').first
          @sock.get_once(len)
        end

        def handshake
          @banner = @sock.get_once(12)
          if !@banner
            @error = 'Unable to obtain banner from server'
            return false
          end

          # RFB Protocol Version 3.3 (1998-01)
          # RFB Protocol Version 3.7 (2003-08)
          # RFB Protocol Version 3.8 (2007-06)

          if @banner =~ /RFB ([0-9]{3})\.([0-9]{3})/
            @majver = Regexp.last_match(1).to_i
            unless Constants::MajorVersions.include?(@majver)
              @error = "Invalid major version number: #{@majver}"
              return false
            end
          else
            @error = "Invalid RFB banner: #{@banner}"
            return false
          end

          @minver = Regexp.last_match(2).to_i

          # Forces version 3 to be used. This adds support for version 4 servers.
          # Minor version is at least 3, to work with Apple devices. Attempting to be purely dynamic
          # based on the received server version can result in a 5.0 server version response
          # setting the client version to 3.0 when it should be at least 3.3, so code checks for this.
          # TODO: Add support for Version 4.
          # Version 4 adds additional information to the packet regarding supported
          # authentication types.
          our_ver = format("RFB %03d.%03d\n", 3, @minver < 3 ? 8 : @minver)
          @sock.put(our_ver)

          true
        end

        def connect(password = nil)
          return false if !handshake
          return false if !authenticate(password)
          return false if !send_client_init

          true
        end

        def send_client_init
          if @opts[:exclusive]
            @sock.put("\x00") # do share.
          else
            @sock.put("\x01") # do share.
          end
        end

        def authenticate(password = nil)
          authenticate_with_user(nil, password)
        end

        def authenticate_with_user(username = nil, password = nil)
          type = negotiate_authentication
          authenticate_with_type(type, username, password)
        end

        def authenticate_with_type(type, username = nil, password = nil)
          return false if !type

          # Authenticate.
          case type
          when AuthType::None
            # Nothing here.

          when AuthType::VNC
            return false if !negotiate_vnc_auth(password)

          when AuthType::ARD
            return false if !negotiate_ard_auth(username, password)

          end

          # Handle reading the security result message
          result = @sock.get_once(4)
          if !result
            @error = 'Unable to read auth result'
            return false
          end

          result = result.unpack('N').first
          case result
          when 0
            return true

          when 1
            if @minver >= 8
              msg = read_error_message
              @error = "Authentication failed: #{msg}"
            else
              @error = 'Authentication failed'
            end
          when 2
            @error = 'Too many authentication attempts'
          else
            @error = "Unknown authentication result: #{result}"
          end

          false
        end

        def negotiate_authentication
          # Authentication type negotiation is protocol version specific.
          if @minver < 7
            buf = @sock.get_once(4)
            if !buf
              @error = 'Unable to obtain requested authentication method'
              return nil
            end
            @auth_types = buf.unpack('N')
            if !@auth_types or @auth_types.first == 0
              msg = read_error_message
              @error = "No authentication types available: #{msg}"
              return nil
            end
          else
            buf = @sock.get_once(1)
            if !buf
              @error = 'Unable to obtain supported authentication method count'
              return nil
            end

            # first byte is number of security types
            num_types = buf.unpack('C').first
            if (num_types == 0)
              msg = read_error_message
              @error = "No authentication types available: #{msg}"
              return nil
            end

            buf = @sock.get_once(num_types)
            if !buf or buf.length != num_types
              @error = 'Unable to read authentication types'
              return nil
            end

            @auth_types = buf.unpack('C*')
          end

          if !@auth_types or @auth_types.length < 1
            @error = 'No authentication types found'
            return nil
          end

          # Select the one we prefer
          selected = nil
          selected ||= AuthType::None if @opts[:allow_none] and @auth_types.include? AuthType::None
          selected ||= AuthType::VNC if @auth_types.include? AuthType::VNC
          selected ||= AuthType::ARD if @auth_types.include? AuthType::ARD

          if !selected
            auth_strings = @auth_types.map { |i| Rex::Proto::RFB::AuthType.to_s(i) }
            @error = "No supported authentication method found. All available options: #{auth_strings.join(', ')}"
            return nil
          end

          # For 3.7 and later, clients must state which security-type to use
          @sock.put([selected].pack('C')) if @minver >= 7

          selected
        end

        def negotiate_vnc_auth(password = nil)
          challenge = @sock.get_once(16)
          if !challenge or challenge.length != 16
            @error = 'Unable to obtain VNC challenge'
            return false
          end

          response = Cipher.encrypt(challenge, password)
          @sock.put(response)

          true
        end

        def negotiate_ard_auth(username = nil, password = nil)
          generator = @sock.get_once(2)
          if !generator or generator.length != 2
            @error = 'Unable to obtain ARD challenge: invalid generator value'
            return false
          end
          generator = generator.unpack('n').first

          key_length = @sock.get_once(2)
          if !key_length or key_length.length != 2
            @error = 'Unable to obtain ARD challenge: invalid key length'
            return false
          end
          key_length = key_length.unpack('n').first

          prime_modulus = @sock.get_once(key_length)
          if !prime_modulus or prime_modulus.length != key_length
            @error = 'Unable to obtain ARD challenge: invalid prime modulus'
            return false
          end

          peer_public_key = @sock.get_once(key_length)
          if !peer_public_key or peer_public_key.length != key_length
            @error = 'Unable to obtain ARD challenge: invalid public key'
            return false
          end

          response = Cipher.encrypt_ard(username, password, generator, key_length, prime_modulus, peer_public_key)
          @sock.put(response)

          true
        end

        attr_reader :error, :majver, :minver, :auth_types, :view_only
      end
    end
  end
end