2014-05-20 20:56:35 +00:00
|
|
|
# -*- coding: binary -*-
|
|
|
|
#
|
|
|
|
|
|
|
|
module Rex
|
|
|
|
module Parser
|
|
|
|
|
|
|
|
# This is a parser for the Windows Group Policy Preferences file
|
|
|
|
# format. It's used by modules/post/windows/gather/credentials/gpp.rb
|
|
|
|
# and uses REXML (as opposed to Nokogiri) for its XML parsing.
|
|
|
|
# See: http://msdn.microsoft.com/en-gb/library/cc232587.aspx
|
|
|
|
class GPP
|
|
|
|
require 'rex'
|
|
|
|
require 'rexml/document'
|
|
|
|
|
|
|
|
def self.parse(data)
|
|
|
|
if data.nil?
|
|
|
|
return []
|
|
|
|
end
|
|
|
|
|
|
|
|
xml = REXML::Document.new(data).root
|
|
|
|
results = []
|
|
|
|
|
|
|
|
unless xml and xml.elements and xml.elements.to_a("//Properties")
|
|
|
|
return []
|
|
|
|
end
|
|
|
|
|
|
|
|
xml.elements.to_a("//Properties").each do |node|
|
|
|
|
epassword = node.attributes['cpassword']
|
|
|
|
next if epassword.to_s.empty?
|
2014-05-20 21:04:59 +00:00
|
|
|
password = self.decrypt(epassword)
|
2014-05-20 20:56:35 +00:00
|
|
|
|
|
|
|
user = node.attributes['runAs'] if node.attributes['runAs']
|
|
|
|
user = node.attributes['accountName'] if node.attributes['accountName']
|
|
|
|
user = node.attributes['username'] if node.attributes['username']
|
|
|
|
user = node.attributes['userName'] if node.attributes['userName']
|
2014-05-20 21:04:59 +00:00
|
|
|
user = node.attributes['newName'] unless node.attributes['newName'].nil? || node.attributes['newName'].empty?
|
2014-05-20 20:56:35 +00:00
|
|
|
changed = node.parent.attributes['changed']
|
|
|
|
|
|
|
|
# Printers and Shares
|
|
|
|
path = node.attributes['path']
|
|
|
|
|
|
|
|
# Datasources
|
|
|
|
dsn = node.attributes['dsn']
|
|
|
|
driver = node.attributes['driver']
|
|
|
|
|
|
|
|
# Tasks
|
|
|
|
app_name = node.attributes['appName']
|
|
|
|
|
|
|
|
# Services
|
|
|
|
service = node.attributes['serviceName']
|
|
|
|
|
|
|
|
# Groups
|
|
|
|
expires = node.attributes['expires']
|
|
|
|
never_expires = node.attributes['neverExpires']
|
|
|
|
disabled = node.attributes['acctDisabled']
|
|
|
|
|
|
|
|
result = {
|
|
|
|
:USER => user,
|
2014-05-20 21:04:59 +00:00
|
|
|
:PASS => password,
|
2014-05-20 20:56:35 +00:00
|
|
|
:CHANGED => changed
|
|
|
|
}
|
|
|
|
|
2014-05-20 21:04:59 +00:00
|
|
|
result.merge!({ :EXPIRES => expires }) unless expires.nil? || expires.empty?
|
2014-05-20 21:25:30 +00:00
|
|
|
result.merge!({ :NEVER_EXPIRES => never_expires.to_i }) unless never_expires.nil? || never_expires.empty?
|
|
|
|
result.merge!({ :DISABLED => disabled.to_i }) unless disabled.nil? || disabled.empty?
|
2014-05-20 21:04:59 +00:00
|
|
|
result.merge!({ :PATH => path }) unless path.nil? || path.empty?
|
|
|
|
result.merge!({ :DATASOURCE => dsn }) unless dsn.nil? || dsn.empty?
|
|
|
|
result.merge!({ :DRIVER => driver }) unless driver.nil? || driver.empty?
|
|
|
|
result.merge!({ :TASK => app_name }) unless app_name.nil? || app_name.empty?
|
|
|
|
result.merge!({ :SERVICE => service }) unless service.nil? || service.empty?
|
2014-05-20 20:56:35 +00:00
|
|
|
|
|
|
|
attributes = []
|
|
|
|
node.elements.each('//Attributes//Attribute') do |dsn_attribute|
|
|
|
|
attributes << {
|
|
|
|
:A_NAME => dsn_attribute.attributes['name'],
|
|
|
|
:A_VALUE => dsn_attribute.attributes['value']
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
result.merge!({ :ATTRIBUTES => attributes }) unless attributes.empty?
|
|
|
|
|
|
|
|
results << result
|
|
|
|
end
|
|
|
|
|
2014-05-20 21:04:59 +00:00
|
|
|
results
|
2014-05-20 20:56:35 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.create_tables(results, filetype, domain=nil, dc=nil)
|
|
|
|
tables = []
|
|
|
|
results.each do |result|
|
|
|
|
table = Rex::Ui::Text::Table.new(
|
|
|
|
'Header' => 'Group Policy Credential Info',
|
|
|
|
'Indent' => 1,
|
|
|
|
'SortIndex' => -1,
|
|
|
|
'Columns' =>
|
|
|
|
[
|
|
|
|
'Name',
|
|
|
|
'Value',
|
|
|
|
]
|
|
|
|
)
|
|
|
|
|
|
|
|
table << ["TYPE", filetype]
|
|
|
|
table << ["USERNAME", result[:USER]]
|
|
|
|
table << ["PASSWORD", result[:PASS]]
|
2014-05-20 21:04:59 +00:00
|
|
|
table << ["DOMAIN CONTROLLER", dc] unless dc.nil? || dc.empty?
|
|
|
|
table << ["DOMAIN", domain] unless domain.nil? || domain.empty?
|
2014-05-20 20:56:35 +00:00
|
|
|
table << ["CHANGED", result[:CHANGED]]
|
2014-05-20 21:04:59 +00:00
|
|
|
table << ["EXPIRES", result[:EXPIRES]] unless result[:EXPIRES].nil? || result[:EXPIRES].empty?
|
2014-05-20 21:25:30 +00:00
|
|
|
table << ["NEVER_EXPIRES?", result[:NEVER_EXPIRES]] unless result[:NEVER_EXPIRES].nil?
|
|
|
|
table << ["DISABLED", result[:DISABLED]] unless result[:DISABLED].nil?
|
2014-05-20 21:04:59 +00:00
|
|
|
table << ["PATH", result[:PATH]] unless result[:PATH].nil? || result[:PATH].empty?
|
|
|
|
table << ["DATASOURCE", result[:DSN]] unless result[:DSN].nil? || result[:DSN].empty?
|
|
|
|
table << ["DRIVER", result[:DRIVER]] unless result[:DRIVER].nil? || result[:DRIVER].empty?
|
|
|
|
table << ["TASK", result[:TASK]] unless result[:TASK].nil? || result[:TASK].empty?
|
|
|
|
table << ["SERVICE", result[:SERVICE]] unless result[:SERVICE].nil? || result[:SERVICE].empty?
|
|
|
|
|
|
|
|
unless result[:ATTRIBUTES].nil? || result[:ATTRIBUTES].empty?
|
2014-05-20 20:56:35 +00:00
|
|
|
result[:ATTRIBUTES].each do |dsn_attribute|
|
|
|
|
table << ["ATTRIBUTE", "#{dsn_attribute[:A_NAME]} - #{dsn_attribute[:A_VALUE]}"]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
tables << table
|
|
|
|
end
|
|
|
|
|
2014-05-20 21:04:59 +00:00
|
|
|
tables
|
2014-05-20 20:56:35 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Decrypts passwords using Microsoft's published key:
|
|
|
|
# http://msdn.microsoft.com/en-us/library/cc422924.aspx
|
|
|
|
def self.decrypt(encrypted_data)
|
|
|
|
unless encrypted_data
|
|
|
|
return ""
|
|
|
|
end
|
2014-05-20 21:04:59 +00:00
|
|
|
|
|
|
|
password = ""
|
2014-05-20 20:56:35 +00:00
|
|
|
padding = "=" * (4 - (encrypted_data.length % 4))
|
|
|
|
epassword = "#{encrypted_data}#{padding}"
|
|
|
|
decoded = Rex::Text.decode_base64(epassword)
|
|
|
|
|
|
|
|
key = "\x4e\x99\x06\xe8\xfc\xb6\x6c\xc9\xfa\xf4\x93\x10\x62\x0f\xfe\xe8\xf4\x96\xe8\x06\xcc\x05\x79\x90\x20\x9b\x09\xa4\x33\xb6\x6c\x1b"
|
|
|
|
aes = OpenSSL::Cipher::Cipher.new("AES-256-CBC")
|
|
|
|
begin
|
|
|
|
aes.decrypt
|
|
|
|
aes.key = key
|
|
|
|
plaintext = aes.update(decoded)
|
|
|
|
plaintext << aes.final
|
2014-05-20 21:04:59 +00:00
|
|
|
password = plaintext.unpack('v*').pack('C*') # UNICODE conversion
|
2014-05-20 20:56:35 +00:00
|
|
|
rescue OpenSSL::Cipher::CipherError => e
|
|
|
|
puts "Unable to decode: \"#{encrypted_data}\" Exception: #{e}"
|
|
|
|
end
|
|
|
|
|
2014-05-20 21:04:59 +00:00
|
|
|
password
|
2014-05-20 20:56:35 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|