2020-12-30 09:24:20 +00:00
|
|
|
package network
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-12-30 11:17:22 +00:00
|
|
|
"encoding/hex"
|
2021-02-24 06:37:16 +00:00
|
|
|
"io"
|
2020-12-30 15:44:04 +00:00
|
|
|
"net"
|
2020-12-30 09:24:20 +00:00
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/projectdiscovery/gologger"
|
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/output"
|
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/protocols"
|
2021-07-06 12:57:30 +00:00
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/expressions"
|
2021-04-18 10:40:10 +00:00
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/interactsh"
|
2020-12-30 15:44:04 +00:00
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/replacer"
|
2020-12-30 09:24:20 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ protocols.Request = &Request{}
|
|
|
|
|
|
|
|
// ExecuteWithResults executes the protocol requests and returns results instead of writing them.
|
2021-01-16 08:40:24 +00:00
|
|
|
func (r *Request) ExecuteWithResults(input string, metadata, previous output.InternalEvent, callback protocols.OutputEventCallback) error {
|
2020-12-30 09:24:20 +00:00
|
|
|
address, err := getAddress(input)
|
|
|
|
if err != nil {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, input, "network", err)
|
2021-03-02 01:22:15 +00:00
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
2021-01-01 14:06:21 +00:00
|
|
|
return errors.Wrap(err, "could not get address from url")
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
|
|
|
|
2020-12-30 15:44:04 +00:00
|
|
|
for _, kv := range r.addresses {
|
2021-02-18 23:10:06 +00:00
|
|
|
actualAddress := replacer.Replace(kv.ip, map[string]interface{}{"Hostname": address})
|
|
|
|
if kv.port != "" {
|
2020-12-30 15:44:04 +00:00
|
|
|
if strings.Contains(address, ":") {
|
|
|
|
actualAddress, _, _ = net.SplitHostPort(actualAddress)
|
|
|
|
}
|
2021-02-18 23:10:06 +00:00
|
|
|
actualAddress = net.JoinHostPort(actualAddress, kv.port)
|
2020-12-30 15:44:04 +00:00
|
|
|
}
|
|
|
|
|
2021-02-18 23:10:06 +00:00
|
|
|
err = r.executeAddress(actualAddress, address, input, kv.tls, previous, callback)
|
2020-12-30 15:44:04 +00:00
|
|
|
if err != nil {
|
2021-02-27 07:38:10 +00:00
|
|
|
gologger.Verbose().Label("ERR").Msgf("Could not make network request for %s: %s\n", actualAddress, err)
|
2020-12-30 15:44:04 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2021-01-01 14:06:21 +00:00
|
|
|
return nil
|
2020-12-30 15:44:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// executeAddress executes the request for an address
|
2021-02-18 23:10:06 +00:00
|
|
|
func (r *Request) executeAddress(actualAddress, address, input string, shouldUseTLS bool, previous output.InternalEvent, callback protocols.OutputEventCallback) error {
|
2020-12-30 15:44:04 +00:00
|
|
|
if !strings.Contains(actualAddress, ":") {
|
|
|
|
err := errors.New("no port provided in network protocol request")
|
2020-12-30 09:24:20 +00:00
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
2021-03-02 01:22:15 +00:00
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
2021-01-01 14:06:21 +00:00
|
|
|
return err
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
|
|
|
|
2021-07-06 12:57:30 +00:00
|
|
|
if r.generator != nil {
|
|
|
|
iterator := r.generator.NewIterator()
|
|
|
|
|
|
|
|
for {
|
|
|
|
value, ok := iterator.Value()
|
|
|
|
if !ok {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if err := r.executeRequestWithPayloads(actualAddress, address, input, shouldUseTLS, value, previous, callback); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
value := make(map[string]interface{})
|
|
|
|
if err := r.executeRequestWithPayloads(actualAddress, address, input, shouldUseTLS, value, previous, callback); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Request) executeRequestWithPayloads(actualAddress, address, input string, shouldUseTLS bool, payloads map[string]interface{}, previous output.InternalEvent, callback protocols.OutputEventCallback) error {
|
2021-02-18 00:37:48 +00:00
|
|
|
var (
|
|
|
|
hostname string
|
|
|
|
conn net.Conn
|
|
|
|
err error
|
|
|
|
)
|
2021-02-18 23:10:06 +00:00
|
|
|
|
2021-02-26 07:43:11 +00:00
|
|
|
if host, _, splitErr := net.SplitHostPort(actualAddress); splitErr == nil {
|
2021-01-16 06:36:27 +00:00
|
|
|
hostname = host
|
|
|
|
}
|
|
|
|
|
2021-02-18 23:10:06 +00:00
|
|
|
if shouldUseTLS {
|
2021-02-18 00:37:48 +00:00
|
|
|
conn, err = r.dialer.DialTLS(context.Background(), "tcp", actualAddress)
|
|
|
|
} else {
|
|
|
|
conn, err = r.dialer.Dial(context.Background(), "tcp", actualAddress)
|
|
|
|
}
|
2020-12-30 09:24:20 +00:00
|
|
|
if err != nil {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
2021-03-02 01:22:15 +00:00
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
2021-01-01 14:06:21 +00:00
|
|
|
return errors.Wrap(err, "could not connect to server request")
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
|
|
|
defer conn.Close()
|
2021-02-26 07:43:11 +00:00
|
|
|
_ = conn.SetReadDeadline(time.Now().Add(time.Duration(r.options.Options.Timeout) * time.Second))
|
2020-12-30 09:24:20 +00:00
|
|
|
|
2021-04-18 12:23:59 +00:00
|
|
|
hasInteractMarkers := interactsh.HasMatchers(r.CompiledOperators)
|
2021-04-18 10:40:10 +00:00
|
|
|
var interactURL string
|
2021-04-18 12:23:59 +00:00
|
|
|
if r.options.Interactsh != nil && hasInteractMarkers {
|
2021-04-18 10:40:10 +00:00
|
|
|
interactURL = r.options.Interactsh.URL()
|
|
|
|
}
|
|
|
|
|
2021-02-16 09:43:01 +00:00
|
|
|
responseBuilder := &strings.Builder{}
|
2020-12-30 11:17:22 +00:00
|
|
|
reqBuilder := &strings.Builder{}
|
2021-02-16 09:43:01 +00:00
|
|
|
|
2021-02-24 14:41:21 +00:00
|
|
|
inputEvents := make(map[string]interface{})
|
2020-12-30 11:17:22 +00:00
|
|
|
for _, input := range r.Inputs {
|
|
|
|
var data []byte
|
|
|
|
|
|
|
|
switch input.Type {
|
|
|
|
case "hex":
|
|
|
|
data, err = hex.DecodeString(input.Data)
|
|
|
|
default:
|
2021-04-18 12:23:59 +00:00
|
|
|
if interactURL != "" {
|
2021-04-18 10:40:10 +00:00
|
|
|
input.Data = r.options.Interactsh.ReplaceMarkers(input.Data, interactURL)
|
|
|
|
}
|
2020-12-30 11:17:22 +00:00
|
|
|
data = []byte(input.Data)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
2021-03-02 01:22:15 +00:00
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
2021-01-01 14:06:21 +00:00
|
|
|
return errors.Wrap(err, "could not write request to server")
|
2020-12-30 11:17:22 +00:00
|
|
|
}
|
|
|
|
reqBuilder.Grow(len(input.Data))
|
|
|
|
|
2021-07-06 12:57:30 +00:00
|
|
|
finalData, err := expressions.EvaluateByte(data, payloads)
|
|
|
|
if err != nil {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
|
|
|
return errors.Wrap(err, "could not evaluate template expressions")
|
|
|
|
}
|
|
|
|
reqBuilder.Write(finalData)
|
|
|
|
|
|
|
|
_, err = conn.Write(finalData)
|
2020-12-30 11:17:22 +00:00
|
|
|
if err != nil {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
2021-03-02 01:22:15 +00:00
|
|
|
r.options.Progress.IncrementFailedRequestsBy(1)
|
2021-01-01 14:06:21 +00:00
|
|
|
return errors.Wrap(err, "could not write request to server")
|
2020-12-30 11:17:22 +00:00
|
|
|
}
|
2021-02-16 09:16:23 +00:00
|
|
|
|
2021-02-16 09:48:57 +00:00
|
|
|
if input.Read > 0 {
|
2021-02-26 20:53:06 +00:00
|
|
|
buffer := make([]byte, input.Read)
|
2021-02-16 09:43:01 +00:00
|
|
|
n, _ := conn.Read(buffer)
|
|
|
|
responseBuilder.Write(buffer[:n])
|
2021-07-06 13:04:25 +00:00
|
|
|
|
|
|
|
bufferStr := string(buffer[:n])
|
2021-02-24 14:41:21 +00:00
|
|
|
if input.Name != "" {
|
2021-07-06 13:04:25 +00:00
|
|
|
inputEvents[input.Name] = bufferStr
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run any internal extractors for the request here and add found values to map.
|
|
|
|
if r.CompiledOperators != nil {
|
|
|
|
values := r.CompiledOperators.ExecuteInternalExtractors(map[string]interface{}{input.Name: bufferStr}, r.Extract)
|
|
|
|
for k, v := range values {
|
|
|
|
payloads[k] = v
|
|
|
|
}
|
2021-02-24 14:41:21 +00:00
|
|
|
}
|
2021-02-16 09:16:23 +00:00
|
|
|
}
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
2021-03-19 16:43:41 +00:00
|
|
|
r.options.Progress.IncrementRequests()
|
2020-12-30 09:24:20 +00:00
|
|
|
|
2021-01-12 11:48:08 +00:00
|
|
|
if r.options.Options.Debug || r.options.Options.DebugRequests {
|
2021-06-21 06:52:14 +00:00
|
|
|
requestOutput := reqBuilder.String()
|
2020-12-30 09:24:20 +00:00
|
|
|
gologger.Info().Str("address", actualAddress).Msgf("[%s] Dumped Network request for %s", r.options.TemplateID, actualAddress)
|
2021-06-21 06:52:14 +00:00
|
|
|
gologger.Print().Msgf("%s\nHex: %s", requestOutput, hex.EncodeToString([]byte(requestOutput)))
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
|
|
|
|
2020-12-30 11:17:22 +00:00
|
|
|
r.options.Output.Request(r.options.TemplateID, actualAddress, "network", err)
|
2021-01-11 14:29:12 +00:00
|
|
|
gologger.Verbose().Msgf("Sent TCP request to %s", actualAddress)
|
2020-12-30 11:17:22 +00:00
|
|
|
|
2020-12-30 09:24:20 +00:00
|
|
|
bufferSize := 1024
|
|
|
|
if r.ReadSize != 0 {
|
|
|
|
bufferSize = r.ReadSize
|
|
|
|
}
|
2021-02-16 09:48:57 +00:00
|
|
|
final := make([]byte, bufferSize)
|
2021-02-24 06:37:16 +00:00
|
|
|
n, err := conn.Read(final)
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
r.options.Output.Request(r.options.TemplateID, address, "network", err)
|
|
|
|
return errors.Wrap(err, "could not read from server")
|
|
|
|
}
|
2021-02-16 09:48:57 +00:00
|
|
|
responseBuilder.Write(final[:n])
|
2020-12-30 09:24:20 +00:00
|
|
|
|
2021-01-12 11:48:08 +00:00
|
|
|
if r.options.Options.Debug || r.options.Options.DebugResponse {
|
2021-06-21 06:52:14 +00:00
|
|
|
responseOutput := responseBuilder.String()
|
2020-12-30 09:24:20 +00:00
|
|
|
gologger.Debug().Msgf("[%s] Dumped Network response for %s", r.options.TemplateID, actualAddress)
|
2021-06-21 06:52:14 +00:00
|
|
|
gologger.Print().Msgf("%s\nHex: %s", responseOutput, hex.EncodeToString([]byte(responseOutput)))
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
2021-02-16 09:48:57 +00:00
|
|
|
outputEvent := r.responseToDSLMap(reqBuilder.String(), string(final[:n]), responseBuilder.String(), input, actualAddress)
|
2021-01-16 06:36:27 +00:00
|
|
|
outputEvent["ip"] = r.dialer.GetDialedIP(hostname)
|
2021-01-16 08:40:24 +00:00
|
|
|
for k, v := range previous {
|
|
|
|
outputEvent[k] = v
|
|
|
|
}
|
2021-02-24 14:41:21 +00:00
|
|
|
for k, v := range inputEvents {
|
|
|
|
outputEvent[k] = v
|
|
|
|
}
|
2020-12-30 09:24:20 +00:00
|
|
|
|
2021-01-16 06:36:27 +00:00
|
|
|
event := &output.InternalWrappedEvent{InternalEvent: outputEvent}
|
2021-07-06 12:57:30 +00:00
|
|
|
if interactURL == "" {
|
2021-04-18 10:40:10 +00:00
|
|
|
if r.CompiledOperators != nil {
|
|
|
|
result, ok := r.CompiledOperators.Execute(outputEvent, r.Match, r.Extract)
|
|
|
|
if ok && result != nil {
|
|
|
|
event.OperatorsResult = result
|
|
|
|
event.Results = r.MakeResultEvent(event)
|
|
|
|
}
|
|
|
|
}
|
2021-05-08 20:07:22 +00:00
|
|
|
callback(event)
|
2021-05-08 20:49:23 +00:00
|
|
|
} else if r.options.Interactsh != nil {
|
|
|
|
r.options.Interactsh.RequestEvent(interactURL, &interactsh.RequestData{
|
|
|
|
MakeResultFunc: r.MakeResultEvent,
|
|
|
|
Event: event,
|
|
|
|
Operators: r.CompiledOperators,
|
|
|
|
MatchFunc: r.Match,
|
|
|
|
ExtractFunc: r.Extract,
|
|
|
|
})
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
2021-01-01 14:06:21 +00:00
|
|
|
return nil
|
2020-12-30 09:24:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// getAddress returns the address of the host to make request to
|
|
|
|
func getAddress(toTest string) (string, error) {
|
|
|
|
if strings.Contains(toTest, "://") {
|
|
|
|
parsed, err := url.Parse(toTest)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
toTest = parsed.Host
|
|
|
|
}
|
|
|
|
return toTest, nil
|
|
|
|
}
|