mirror of
https://github.com/lgandx/Responder.git
synced 2025-07-05 12:35:52 -07:00
388 lines
17 KiB
Python
388 lines
17 KiB
Python
#!/usr/bin/env python
|
|
# This file is part of Responder, a network take-over set of tools
|
|
# created and maintained by Laurent Gaffie.
|
|
# email: laurent.gaffie@gmail.com
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
import utils, sys, random
|
|
if (sys.version_info > (3, 0)):
|
|
import configparser as ConfigParser
|
|
else:
|
|
import ConfigParser
|
|
import subprocess
|
|
|
|
from utils import *
|
|
|
|
__version__ = 'Responder 3.1.6.0'
|
|
|
|
class Settings:
|
|
|
|
def __init__(self):
|
|
self.ResponderPATH = os.path.dirname(__file__)
|
|
self.Bind_To = '0.0.0.0'
|
|
|
|
def __str__(self):
|
|
ret = 'Settings class:\n'
|
|
for attr in dir(self):
|
|
value = str(getattr(self, attr)).strip()
|
|
ret += " Settings.%s = %s\n" % (attr, value)
|
|
return ret
|
|
|
|
def toBool(self, str):
|
|
return str.upper() == 'ON'
|
|
|
|
def ExpandIPRanges(self):
|
|
def expand_ranges(lst):
|
|
ret = []
|
|
for l in lst:
|
|
if ':' in l: #For IPv6 addresses, similar to the IPv4 version below but hex and pads :'s to expand shortend addresses
|
|
while l.count(':') < 7:
|
|
pos = l.find('::')
|
|
l = l[:pos] + ':' + l[pos:]
|
|
tab = l.split(':')
|
|
x = {}
|
|
i = 0
|
|
xaddr = ''
|
|
for byte in tab:
|
|
if byte == '':
|
|
byte = '0'
|
|
if '-' not in byte:
|
|
x[i] = x[i+1] = int(byte, base=16)
|
|
else:
|
|
b = byte.split('-')
|
|
x[i] = int(b[0], base=16)
|
|
x[i+1] = int(b[1], base=16)
|
|
i += 2
|
|
for a in range(x[0], x[1]+1):
|
|
for b in range(x[2], x[3]+1):
|
|
for c in range(x[4], x[5]+1):
|
|
for d in range(x[6], x[7]+1):
|
|
for e in range(x[8], x[9]+1):
|
|
for f in range(x[10], x[11]+1):
|
|
for g in range(x[12], x[13]+1):
|
|
for h in range(x[14], x[15]+1):
|
|
xaddr = ('%x:%x:%x:%x:%x:%x:%x:%x' % (a, b, c, d, e, f, g, h))
|
|
xaddr = re.sub('(^|:)0{1,4}', ':', xaddr, count = 7)#Compresses expanded IPv6 address
|
|
xaddr = re.sub(':{3,7}', '::', xaddr, count = 7)
|
|
ret.append(xaddr)
|
|
else:
|
|
tab = l.split('.')
|
|
x = {}
|
|
i = 0
|
|
for byte in tab:
|
|
if '-' not in byte:
|
|
x[i] = x[i+1] = int(byte)
|
|
else:
|
|
b = byte.split('-')
|
|
x[i] = int(b[0])
|
|
x[i+1] = int(b[1])
|
|
i += 2
|
|
for a in range(x[0], x[1]+1):
|
|
for b in range(x[2], x[3]+1):
|
|
for c in range(x[4], x[5]+1):
|
|
for d in range(x[6], x[7]+1):
|
|
ret.append('%d.%d.%d.%d' % (a, b, c, d))
|
|
return ret
|
|
|
|
self.RespondTo = expand_ranges(self.RespondTo)
|
|
self.DontRespondTo = expand_ranges(self.DontRespondTo)
|
|
|
|
def populate(self, options):
|
|
|
|
if options.Interface == None and utils.IsOsX() == False:
|
|
print(utils.color("Error: -I <if> mandatory option is missing", 1))
|
|
sys.exit(-1)
|
|
|
|
if options.Interface == "ALL" and options.OURIP == None:
|
|
print(utils.color("Error: -i is missing.\nWhen using -I ALL you need to provide your current ip address", 1))
|
|
sys.exit(-1)
|
|
#Python version
|
|
if (sys.version_info > (3, 0)):
|
|
self.PY2OR3 = "PY3"
|
|
else:
|
|
self.PY2OR3 = "PY2"
|
|
# Config parsing
|
|
config = ConfigParser.ConfigParser()
|
|
config.read(os.path.join(self.ResponderPATH, 'Responder.conf'))
|
|
|
|
# Poisoners
|
|
self.LLMNR_On_Off = self.toBool(config.get('Responder Core', 'LLMNR'))
|
|
self.NBTNS_On_Off = self.toBool(config.get('Responder Core', 'NBTNS'))
|
|
self.MDNS_On_Off = self.toBool(config.get('Responder Core', 'MDNS'))
|
|
|
|
# Servers
|
|
self.HTTP_On_Off = self.toBool(config.get('Responder Core', 'HTTP'))
|
|
self.SSL_On_Off = self.toBool(config.get('Responder Core', 'HTTPS'))
|
|
self.SMB_On_Off = self.toBool(config.get('Responder Core', 'SMB'))
|
|
self.QUIC_On_Off = self.toBool(config.get('Responder Core', 'QUIC'))
|
|
self.SQL_On_Off = self.toBool(config.get('Responder Core', 'SQL'))
|
|
self.FTP_On_Off = self.toBool(config.get('Responder Core', 'FTP'))
|
|
self.POP_On_Off = self.toBool(config.get('Responder Core', 'POP'))
|
|
self.IMAP_On_Off = self.toBool(config.get('Responder Core', 'IMAP'))
|
|
self.SMTP_On_Off = self.toBool(config.get('Responder Core', 'SMTP'))
|
|
self.LDAP_On_Off = self.toBool(config.get('Responder Core', 'LDAP'))
|
|
self.MQTT_On_Off = self.toBool(config.get('Responder Core', 'MQTT'))
|
|
self.DNS_On_Off = self.toBool(config.get('Responder Core', 'DNS'))
|
|
self.RDP_On_Off = self.toBool(config.get('Responder Core', 'RDP'))
|
|
self.DCERPC_On_Off = self.toBool(config.get('Responder Core', 'DCERPC'))
|
|
self.WinRM_On_Off = self.toBool(config.get('Responder Core', 'WINRM'))
|
|
self.Krb_On_Off = self.toBool(config.get('Responder Core', 'Kerberos'))
|
|
self.SNMP_On_Off = self.toBool(config.get('Responder Core', 'SNMP'))
|
|
|
|
# Db File
|
|
self.DatabaseFile = os.path.join(self.ResponderPATH, config.get('Responder Core', 'Database'))
|
|
|
|
# Log Files
|
|
self.LogDir = os.path.join(self.ResponderPATH, 'logs')
|
|
|
|
if not os.path.exists(self.LogDir):
|
|
os.mkdir(self.LogDir)
|
|
|
|
self.SessionLogFile = os.path.join(self.LogDir, config.get('Responder Core', 'SessionLog'))
|
|
self.PoisonersLogFile = os.path.join(self.LogDir, config.get('Responder Core', 'PoisonersLog'))
|
|
self.AnalyzeLogFile = os.path.join(self.LogDir, config.get('Responder Core', 'AnalyzeLog'))
|
|
self.ResponderConfigDump = os.path.join(self.LogDir, config.get('Responder Core', 'ResponderConfigDump'))
|
|
|
|
# CLI options
|
|
self.ExternalIP = options.ExternalIP
|
|
self.LM_On_Off = options.LM_On_Off
|
|
self.NOESS_On_Off = options.NOESS_On_Off
|
|
self.WPAD_On_Off = options.WPAD_On_Off
|
|
self.DHCP_On_Off = options.DHCP_On_Off
|
|
self.Basic = options.Basic
|
|
self.Interface = options.Interface
|
|
self.OURIP = options.OURIP
|
|
self.Force_WPAD_Auth = options.Force_WPAD_Auth
|
|
self.Upstream_Proxy = options.Upstream_Proxy
|
|
self.AnalyzeMode = options.Analyze
|
|
self.Verbose = options.Verbose
|
|
self.ProxyAuth_On_Off = options.ProxyAuth_On_Off
|
|
self.CommandLine = str(sys.argv)
|
|
self.Bind_To = utils.FindLocalIP(self.Interface, self.OURIP)
|
|
self.Bind_To6 = utils.FindLocalIP6(self.Interface, self.OURIP)
|
|
self.DHCP_DNS = options.DHCP_DNS
|
|
self.ExternalIP6 = options.ExternalIP6
|
|
self.Quiet_Mode = options.Quiet
|
|
self.AnswerName = options.AnswerName
|
|
self.ErrorCode = options.ErrorCode
|
|
|
|
# TTL blacklist. Known to be detected by SOC / XDR
|
|
TTL_blacklist = [b"\x00\x00\x00\x1e", b"\x00\x00\x00\x78", b"\x00\x00\x00\xa5"]
|
|
# Lets add a default mode, which uses Windows default TTL for each protocols (set respectively in packets.py)
|
|
if options.TTL is None:
|
|
self.TTL = None
|
|
|
|
# Random TTL
|
|
elif options.TTL.upper() == "RANDOM":
|
|
TTL = bytes.fromhex("000000"+format(random.randint(10,90),'x'))
|
|
if TTL in TTL_blacklist:
|
|
TTL = int.from_bytes(TTL, "big")+1
|
|
TTL = int.to_bytes(TTL, 4)
|
|
self.TTL = TTL.decode('utf-8')
|
|
else:
|
|
self.TTL = bytes.fromhex("000000"+options.TTL).decode('utf-8')
|
|
|
|
#Do we have IPv6 for real?
|
|
self.IPv6 = utils.Probe_IPv6_socket()
|
|
|
|
if self.Interface == "ALL":
|
|
self.Bind_To_ALL = True
|
|
else:
|
|
self.Bind_To_ALL = False
|
|
#IPV4
|
|
if self.Interface == "ALL":
|
|
self.IP_aton = socket.inet_aton(self.OURIP)
|
|
else:
|
|
self.IP_aton = socket.inet_aton(self.Bind_To)
|
|
#IPV6
|
|
if self.Interface == "ALL":
|
|
if self.OURIP != None and utils.IsIPv6IP(self.OURIP):
|
|
self.IP_Pton6 = socket.inet_pton(socket.AF_INET6, self.OURIP)
|
|
else:
|
|
self.IP_Pton6 = socket.inet_pton(socket.AF_INET6, self.Bind_To6)
|
|
|
|
#External IP
|
|
if self.ExternalIP:
|
|
if utils.IsIPv6IP(self.ExternalIP):
|
|
sys.exit(utils.color('[!] IPv6 address provided with -e parameter. Use -6 IPv6_address instead.', 1))
|
|
|
|
self.ExternalIPAton = socket.inet_aton(self.ExternalIP)
|
|
self.ExternalResponderIP = utils.RespondWithIP()
|
|
else:
|
|
self.ExternalResponderIP = self.Bind_To
|
|
|
|
#External IPv6
|
|
if self.ExternalIP6:
|
|
self.ExternalIP6Pton = socket.inet_pton(socket.AF_INET6, self.ExternalIP6)
|
|
self.ExternalResponderIP6 = utils.RespondWithIP6()
|
|
else:
|
|
self.ExternalResponderIP6 = self.Bind_To6
|
|
|
|
self.Os_version = sys.platform
|
|
|
|
self.FTPLog = os.path.join(self.LogDir, 'FTP-Clear-Text-Password-%s.txt')
|
|
self.IMAPLog = os.path.join(self.LogDir, 'IMAP-Clear-Text-Password-%s.txt')
|
|
self.POP3Log = os.path.join(self.LogDir, 'POP3-Clear-Text-Password-%s.txt')
|
|
self.HTTPBasicLog = os.path.join(self.LogDir, 'HTTP-Clear-Text-Password-%s.txt')
|
|
self.LDAPClearLog = os.path.join(self.LogDir, 'LDAP-Clear-Text-Password-%s.txt')
|
|
self.MQTTLog = os.path.join(self.LogDir, 'MQTT-Clear-Text-Password-%s.txt')
|
|
self.SMBClearLog = os.path.join(self.LogDir, 'SMB-Clear-Text-Password-%s.txt')
|
|
self.SMTPClearLog = os.path.join(self.LogDir, 'SMTP-Clear-Text-Password-%s.txt')
|
|
self.MSSQLClearLog = os.path.join(self.LogDir, 'MSSQL-Clear-Text-Password-%s.txt')
|
|
self.SNMPLog = os.path.join(self.LogDir, 'SNMP-Clear-Text-Password-%s.txt')
|
|
|
|
self.LDAPNTLMv1Log = os.path.join(self.LogDir, 'LDAP-NTLMv1-Client-%s.txt')
|
|
self.HTTPNTLMv1Log = os.path.join(self.LogDir, 'HTTP-NTLMv1-Client-%s.txt')
|
|
self.HTTPNTLMv2Log = os.path.join(self.LogDir, 'HTTP-NTLMv2-Client-%s.txt')
|
|
self.KerberosLog = os.path.join(self.LogDir, 'MSKerberos-Client-%s.txt')
|
|
self.MSSQLNTLMv1Log = os.path.join(self.LogDir, 'MSSQL-NTLMv1-Client-%s.txt')
|
|
self.MSSQLNTLMv2Log = os.path.join(self.LogDir, 'MSSQL-NTLMv2-Client-%s.txt')
|
|
self.SMBNTLMv1Log = os.path.join(self.LogDir, 'SMB-NTLMv1-Client-%s.txt')
|
|
self.SMBNTLMv2Log = os.path.join(self.LogDir, 'SMB-NTLMv2-Client-%s.txt')
|
|
self.SMBNTLMSSPv1Log = os.path.join(self.LogDir, 'SMB-NTLMSSPv1-Client-%s.txt')
|
|
self.SMBNTLMSSPv2Log = os.path.join(self.LogDir, 'SMB-NTLMSSPv2-Client-%s.txt')
|
|
|
|
# HTTP Options
|
|
self.Serve_Exe = self.toBool(config.get('HTTP Server', 'Serve-Exe'))
|
|
self.Serve_Always = self.toBool(config.get('HTTP Server', 'Serve-Always'))
|
|
self.Serve_Html = self.toBool(config.get('HTTP Server', 'Serve-Html'))
|
|
self.Html_Filename = config.get('HTTP Server', 'HtmlFilename')
|
|
self.Exe_Filename = config.get('HTTP Server', 'ExeFilename')
|
|
self.Exe_DlName = config.get('HTTP Server', 'ExeDownloadName')
|
|
self.WPAD_Script = config.get('HTTP Server', 'WPADScript')
|
|
self.HtmlToInject = config.get('HTTP Server', 'HtmlToInject')
|
|
|
|
if len(self.HtmlToInject) == 0:
|
|
self.HtmlToInject = ""# Let users set it up themself in Responder.conf. "<img src='file://///"+self.Bind_To+"/pictures/logo.jpg' alt='Loading' height='1' width='1'>"
|
|
|
|
if len(self.WPAD_Script) == 0:
|
|
if self.WPAD_On_Off:
|
|
self.WPAD_Script = 'function FindProxyForURL(url, host){if ((host == "localhost") || shExpMatch(host, "localhost.*") ||(host == "127.0.0.1") || isPlainHostName(host)) return "DIRECT"; return "PROXY '+self.Bind_To+':3128; DIRECT";}'
|
|
|
|
if self.ProxyAuth_On_Off:
|
|
self.WPAD_Script = 'function FindProxyForURL(url, host){if ((host == "localhost") || shExpMatch(host, "localhost.*") ||(host == "127.0.0.1") || isPlainHostName(host)) return "DIRECT"; return "PROXY '+self.Bind_To+':3128; DIRECT";}'
|
|
|
|
if self.Serve_Exe == True:
|
|
if not os.path.exists(self.Html_Filename):
|
|
print(utils.color("/!\\ Warning: %s: file not found" % self.Html_Filename, 3, 1))
|
|
|
|
if not os.path.exists(self.Exe_Filename):
|
|
print(utils.color("/!\\ Warning: %s: file not found" % self.Exe_Filename, 3, 1))
|
|
|
|
# SSL Options
|
|
self.SSLKey = config.get('HTTPS Server', 'SSLKey')
|
|
self.SSLCert = config.get('HTTPS Server', 'SSLCert')
|
|
|
|
# Respond to hosts
|
|
self.RespondTo = list(filter(None, [x.upper().strip() for x in config.get('Responder Core', 'RespondTo').strip().split(',')]))
|
|
self.RespondToName = list(filter(None, [x.upper().strip() for x in config.get('Responder Core', 'RespondToName').strip().split(',')]))
|
|
self.DontRespondTo = list(filter(None, [x.upper().strip() for x in config.get('Responder Core', 'DontRespondTo').strip().split(',')]))
|
|
self.DontRespondToTLD = list(filter(None, [x.upper().strip() for x in config.get('Responder Core', 'DontRespondToTLD').strip().split(',')]))
|
|
self.DontRespondToName_= list(filter(None, [x.upper().strip() for x in config.get('Responder Core', 'DontRespondToName').strip().split(',')]))
|
|
#add a .local to all provided DontRespondToName
|
|
self.MDNSTLD = ['.LOCAL']
|
|
self.DontRespondToName = [x+y for x in self.DontRespondToName_ for y in ['']+self.MDNSTLD]
|
|
#Generate Random stuff for one Responder session
|
|
self.MachineName = 'WIN-'+''.join([random.choice('ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789') for i in range(11)])
|
|
self.Username = ''.join([random.choice('ABCDEFGHIJKLMNOPQRSTUVWXYZ') for i in range(6)])
|
|
self.Domain = ''.join([random.choice('ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789') for i in range(4)])
|
|
self.DHCPHostname = ''.join([random.choice('ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789') for i in range(9)])
|
|
self.DomainName = self.Domain + '.LOCAL'
|
|
self.MachineNego = ''.join([random.choice('ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789') for i in range(9)]) +'$@'+self.DomainName
|
|
self.RPCPort = random.randrange(45000, 49999)
|
|
# Auto Ignore List
|
|
self.AutoIgnore = self.toBool(config.get('Responder Core', 'AutoIgnoreAfterSuccess'))
|
|
self.CaptureMultipleCredentials = self.toBool(config.get('Responder Core', 'CaptureMultipleCredentials'))
|
|
self.CaptureMultipleHashFromSameHost = self.toBool(config.get('Responder Core', 'CaptureMultipleHashFromSameHost'))
|
|
self.AutoIgnoreList = []
|
|
|
|
# Set up Challenge
|
|
self.NumChal = config.get('Responder Core', 'Challenge')
|
|
if self.NumChal.lower() == 'random':
|
|
self.NumChal = "random"
|
|
|
|
if len(self.NumChal) != 16 and self.NumChal != "random":
|
|
print(utils.color("[!] The challenge must be exactly 16 chars long.\nExample: 1122334455667788", 1))
|
|
sys.exit(-1)
|
|
|
|
self.Challenge = b''
|
|
if self.NumChal.lower() == 'random':
|
|
pass
|
|
else:
|
|
if self.PY2OR3 == 'PY2':
|
|
for i in range(0, len(self.NumChal),2):
|
|
self.Challenge += self.NumChal[i:i+2].decode("hex")
|
|
else:
|
|
self.Challenge = bytes.fromhex(self.NumChal)
|
|
|
|
|
|
# Set up logging
|
|
logging.basicConfig(filename=self.SessionLogFile, level=logging.INFO, format='%(asctime)s - %(message)s', datefmt='%m/%d/%Y %I:%M:%S %p')
|
|
logging.warning('Responder Started: %s' % self.CommandLine)
|
|
|
|
Formatter = logging.Formatter('%(asctime)s - %(message)s')
|
|
PLog_Handler = logging.FileHandler(self.PoisonersLogFile, 'w')
|
|
ALog_Handler = logging.FileHandler(self.AnalyzeLogFile, 'a')
|
|
PLog_Handler.setLevel(logging.INFO)
|
|
ALog_Handler.setLevel(logging.INFO)
|
|
PLog_Handler.setFormatter(Formatter)
|
|
ALog_Handler.setFormatter(Formatter)
|
|
|
|
self.PoisonersLogger = logging.getLogger('Poisoners Log')
|
|
self.PoisonersLogger.addHandler(PLog_Handler)
|
|
|
|
self.AnalyzeLogger = logging.getLogger('Analyze Log')
|
|
self.AnalyzeLogger.addHandler(ALog_Handler)
|
|
|
|
# First time Responder run?
|
|
if os.path.isfile(self.ResponderPATH+'/Responder.db'):
|
|
pass
|
|
else:
|
|
#If it's the first time, generate SSL certs for this Responder session and send openssl output to /dev/null
|
|
Certs = os.system(self.ResponderPATH+"/certs/gen-self-signed-cert.sh >/dev/null 2>&1")
|
|
|
|
try:
|
|
NetworkCard = subprocess.check_output(["ifconfig", "-a"])
|
|
except:
|
|
try:
|
|
NetworkCard = subprocess.check_output(["ip", "address", "show"])
|
|
except subprocess.CalledProcessError as ex:
|
|
NetworkCard = "Error fetching Network Interfaces:", ex
|
|
pass
|
|
try:
|
|
p = subprocess.Popen('resolvectl', stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
|
DNS = p.stdout.read()
|
|
except:
|
|
p = subprocess.Popen(['cat', '/etc/resolv.conf'], stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
|
DNS = p.stdout.read()
|
|
|
|
try:
|
|
RoutingInfo = subprocess.check_output(["netstat", "-rn"])
|
|
except:
|
|
try:
|
|
RoutingInfo = subprocess.check_output(["ip", "route", "show"])
|
|
except subprocess.CalledProcessError as ex:
|
|
RoutingInfo = "Error fetching Routing information:", ex
|
|
pass
|
|
|
|
Message = "%s\nCurrent environment is:\nNetwork Config:\n%s\nDNS Settings:\n%s\nRouting info:\n%s\n\n"%(utils.HTTPCurrentDate(), NetworkCard.decode('latin-1'),DNS.decode('latin-1'),RoutingInfo.decode('latin-1'))
|
|
try:
|
|
utils.DumpConfig(self.ResponderConfigDump, Message)
|
|
#utils.DumpConfig(self.ResponderConfigDump,str(self))
|
|
except AttributeError as ex:
|
|
print("Missing Module:", ex)
|
|
pass
|
|
|
|
def init():
|
|
global Config
|
|
Config = Settings()
|