2014-06-11 20:46:08 +00:00
|
|
|
##
|
|
|
|
# This module requires Metasploit: http//metasploit.com/download
|
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
require 'bit-struct'
|
|
|
|
require 'securerandom'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
|
|
|
|
include Msf::Auxiliary::Fuzzer
|
|
|
|
include Msf::Exploit::Remote::Udp
|
2014-06-16 17:02:27 +00:00
|
|
|
include Msf::Auxiliary::Scanner
|
2014-06-11 20:46:08 +00:00
|
|
|
|
2014-06-16 18:56:27 +00:00
|
|
|
NTP_SUPPORTED_VERSIONS = (0..7).to_a
|
|
|
|
NTP_SUPPORTED_MODES = (0..7).to_a
|
2014-06-19 18:10:11 +00:00
|
|
|
NTP_SUPPORTED_MODE_6_OPERATIONS = (0..31).to_a
|
2014-06-16 18:56:27 +00:00
|
|
|
NTP_SUPPORTED_MODE_7_IMPLEMENTATIONS = (0..255).to_a
|
|
|
|
NTP_SUPPORTED_MODE_7_REQUEST_CODES = (0..255).to_a
|
2014-06-11 20:46:08 +00:00
|
|
|
|
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'NTP Protocol Fuzzer',
|
|
|
|
'Description' => %q(
|
|
|
|
A simplistic fuzzer for the Network Time Protocol that sends the
|
|
|
|
following probes to understand NTP and look for anomalous NTP behavior:
|
|
|
|
|
|
|
|
* All possible combinations of NTP versions and modes, even if not
|
|
|
|
allowed or specified in the RFCs
|
|
|
|
* Short versions of the above
|
|
|
|
* Short, invalid datagrams
|
|
|
|
* Full-size, random datagrams
|
|
|
|
* All possible NTP control messages
|
2014-06-16 03:23:33 +00:00
|
|
|
* All possible NTP private messages
|
2014-06-11 20:46:08 +00:00
|
|
|
|
|
|
|
This findings of this fuzzer are not necessarily indicative of bugs,
|
|
|
|
let alone vulnerabilities, rather they point out interesting things
|
|
|
|
that might deserve more attention. Furthermore, this module is not
|
|
|
|
particularly intelligent and there are many more areas of NTP that
|
|
|
|
could be explored, including:
|
|
|
|
|
|
|
|
* Warn if the response is 100% identical to the request
|
|
|
|
* Warn if the "mode" (if applicable) doesn't align with what we expect,
|
|
|
|
* Filter out the 12-byte mode 6 unsupported opcode errors.
|
|
|
|
* Fuzz the control message payload offset/size/etc. There be bugs
|
|
|
|
),
|
|
|
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
Opt::RPORT(123),
|
2014-06-16 18:56:27 +00:00
|
|
|
OptString.new('VERSIONS', [true, 'Versions to fuzz', [3,2,4]]),
|
|
|
|
OptString.new('MODES', [true, 'Modes to fuzz', NTP_SUPPORTED_MODES]),
|
2014-06-19 18:10:11 +00:00
|
|
|
OptString.new('MODE_6_OPERATIONS', [true, 'Mode 6 operations to fuzz', NTP_SUPPORTED_MODE_6_OPERATIONS]),
|
2014-06-16 18:56:27 +00:00
|
|
|
OptString.new('MODE_7_IMPLEMENTATIONS', [true, 'Mode 7 implementations to fuzz', [3,2,0]]),
|
2014-06-24 01:38:47 +00:00
|
|
|
OptString.new('MODE_7_REQUEST_CODES', [true, 'Mode 7 request codes to fuzz', NTP_SUPPORTED_MODE_7_REQUEST_CODES]),
|
2014-06-11 20:46:08 +00:00
|
|
|
OptInt.new('SLEEP', [true, 'Sleep for this many ms between requests', 0]),
|
|
|
|
OptInt.new('WAIT', [true, 'Wait this many ms for responses', 500])
|
|
|
|
], self.class)
|
|
|
|
end
|
|
|
|
|
|
|
|
# A very generic NTP message
|
|
|
|
#
|
|
|
|
# Uses the common/similar parts from versions 1-4 and considers everything
|
|
|
|
# after to be just one big field. For the particulars on the different versions,
|
|
|
|
# see:
|
|
|
|
# http://tools.ietf.org/html/rfc958#appendix-B
|
|
|
|
# http://tools.ietf.org/html/rfc1059#appendix-B
|
|
|
|
# pages 45/48 of http://tools.ietf.org/pdf/rfc1119.pdf
|
|
|
|
# http://tools.ietf.org/html/rfc1305#appendix-D
|
|
|
|
# http://tools.ietf.org/html/rfc5905#page-19
|
|
|
|
class NTPGeneric < BitStruct
|
|
|
|
# 0 1 2 3
|
|
|
|
# 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# |LI | VN | mode| Stratum | Poll | Precision |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
unsigned :li, 2, default: 0
|
|
|
|
unsigned :version, 3, default: 0
|
|
|
|
unsigned :mode, 3, default: 0
|
|
|
|
unsigned :stratum, 8, default: 0
|
|
|
|
unsigned :poll, 8, default: 0
|
|
|
|
unsigned :precision, 8, default: 0
|
|
|
|
char :payload, 352
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
# An NTP control message. Control messages are only specified for NTP
|
2014-06-11 20:46:08 +00:00
|
|
|
# versions 2-4, but this is a fuzzer so why not try them all...
|
|
|
|
class NTPControl < BitStruct
|
|
|
|
# 0 1 2 3
|
|
|
|
# 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# |00 | VN | 6 |R E M| op | Sequence |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# | status | association id |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# | offset | count |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
unsigned :reserved, 2, default: 0
|
|
|
|
unsigned :version, 3, default: 0
|
|
|
|
unsigned :mode, 3, default: 6
|
|
|
|
unsigned :response, 1, default: 0
|
|
|
|
unsigned :error, 1, default: 0
|
|
|
|
unsigned :more, 1, default: 0
|
|
|
|
unsigned :operation, 5, default: 0
|
|
|
|
unsigned :sequence, 16, default: 0
|
|
|
|
unsigned :status, 16, default: 0
|
|
|
|
unsigned :association_id, 16, default: 0
|
|
|
|
# TODO: there *must* be bugs in the handling of these next two fields!
|
|
|
|
unsigned :payload_offset, 16, default: 0
|
|
|
|
unsigned :payload_size, 16, default: 0
|
|
|
|
rest :payload
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
# An NTP "private" message. Private messages are only specified for NTP
|
|
|
|
# versions 2-4, but this is a fuzzer so why not try them all...
|
|
|
|
class NTPPrivate < BitStruct
|
|
|
|
# 0 1 2 3
|
|
|
|
# 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# |00 | VN | 7 |A| Sequence |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
# | Implementation| request code |
|
|
|
|
# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
unsigned :reserved, 2, default: 0
|
|
|
|
unsigned :version, 3, default: 0
|
|
|
|
unsigned :mode, 3, default: 7
|
|
|
|
unsigned :auth, 1, default: 0
|
|
|
|
unsigned :sequence, 7, default: 0
|
|
|
|
unsigned :implementation, 8, default: 0
|
|
|
|
unsigned :request_code, 8, default: 0
|
|
|
|
rest :payload
|
|
|
|
end
|
|
|
|
|
2014-06-11 20:46:08 +00:00
|
|
|
def build_ntp_control(version, operation, payload = nil)
|
|
|
|
n = NTPControl.new
|
|
|
|
n.version = version
|
|
|
|
n.operation = operation
|
|
|
|
if payload
|
|
|
|
n.payload_offset = 0
|
|
|
|
n.payload_size = payload.size
|
|
|
|
n.payload = payload
|
|
|
|
end
|
|
|
|
n.to_s
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
def build_ntp_private(version, implementation, request_code, payload = nil)
|
|
|
|
n = NTPPrivate.new
|
|
|
|
n.version = version
|
|
|
|
n.implementation = implementation
|
|
|
|
n.request_code = request_code
|
|
|
|
n.payload = payload if payload
|
|
|
|
n.to_s
|
|
|
|
end
|
|
|
|
|
2014-06-11 20:46:08 +00:00
|
|
|
def build_ntp_generic(version, mode)
|
|
|
|
n = NTPGeneric.new
|
|
|
|
n.version = version
|
|
|
|
n.mode = mode
|
|
|
|
n.to_s
|
|
|
|
end
|
|
|
|
|
|
|
|
def sleep_time
|
|
|
|
datastore['SLEEP'] / 1000.0
|
|
|
|
end
|
|
|
|
|
2014-06-16 16:58:20 +00:00
|
|
|
def run_host(ip)
|
2014-06-11 20:46:08 +00:00
|
|
|
# parse and sanity check versions
|
|
|
|
@versions = datastore['VERSIONS'].split(/[^\d]/).select { |v| !v.empty? }.map { |v| v.to_i }
|
2014-06-16 18:56:27 +00:00
|
|
|
unsupported_versions = @versions - NTP_SUPPORTED_VERSIONS
|
2014-06-11 20:46:08 +00:00
|
|
|
fail "Unsupported NTP versions: #{unsupported_versions}" unless unsupported_versions.empty?
|
|
|
|
# parse and sanity check modes
|
|
|
|
@modes = datastore['MODES'].split(/[^\d]/).select { |m| !m.empty? }.map { |v| v.to_i }
|
2014-06-16 18:56:27 +00:00
|
|
|
unsupported_modes = @modes - NTP_SUPPORTED_MODES
|
2014-06-11 20:46:08 +00:00
|
|
|
fail "Unsupported NTP modes: #{unsupported_modes}" unless unsupported_modes.empty?
|
2014-06-19 18:10:11 +00:00
|
|
|
# parse and sanity check mode 6 operations
|
|
|
|
@mode_6_operations = datastore['MODE_6_OPERATIONS'].split(/[^\d]/).select { |m| !m.empty? }.map { |v| v.to_i }
|
|
|
|
unsupported_ops = @mode_6_operations - NTP_SUPPORTED_MODE_6_OPERATIONS
|
|
|
|
fail "Unsupported NTP mode 6 operations: #{unsupported_ops}" unless unsupported_ops.empty?
|
2014-06-16 18:56:27 +00:00
|
|
|
# parse and sanity check mode 7 implementations
|
2014-06-19 18:10:11 +00:00
|
|
|
@mode_7_implementations = datastore['MODE_7_IMPLEMENTATIONS'].split(/[^\d]/).select { |m| !m.empty? }.map { |v| v.to_i }
|
|
|
|
unsupported_implementations = @mode_7_implementations - NTP_SUPPORTED_MODE_7_IMPLEMENTATIONS
|
|
|
|
fail "Unsupported NTP mode 7 implementations: #{unsupported_implementations}" unless unsupported_implementations.empty?
|
|
|
|
# parse and sanity check mode 7 request codes
|
|
|
|
@mode_7_request_codes = datastore['MODE_7_REQUEST_CODES'].split(/[^\d]/).select { |m| !m.empty? }.map { |v| v.to_i }
|
|
|
|
unsupported_request_codes = @mode_7_request_codes - NTP_SUPPORTED_MODE_7_REQUEST_CODES
|
2014-06-16 18:56:27 +00:00
|
|
|
fail "Unsupported NTP mode 7 request codes: #{unsupported_request_codes}" unless unsupported_request_codes.empty?
|
2014-06-11 20:46:08 +00:00
|
|
|
|
|
|
|
connect_udp
|
2014-06-16 16:58:20 +00:00
|
|
|
fuzz_version_mode(ip)
|
|
|
|
fuzz_version_mode(ip, true)
|
|
|
|
fuzz_short(ip)
|
|
|
|
fuzz_random(ip)
|
|
|
|
fuzz_control(ip) if @modes.include?(6)
|
|
|
|
fuzz_private(ip) if @modes.include?(7)
|
2014-06-11 20:46:08 +00:00
|
|
|
disconnect_udp
|
|
|
|
end
|
|
|
|
|
|
|
|
# Sends a series of NTP control messages
|
|
|
|
def fuzz_control(host)
|
2014-06-16 18:56:27 +00:00
|
|
|
@versions.each do |version|
|
2014-06-16 17:31:08 +00:00
|
|
|
print_status("#{host}:#{rport} fuzzing version #{version} control messages (mode 6)")
|
2014-06-19 18:10:11 +00:00
|
|
|
@mode_6_operations.each do |op|
|
2014-06-11 20:46:08 +00:00
|
|
|
request = build_ntp_control(version, op)
|
2014-06-16 03:23:33 +00:00
|
|
|
what = "#{request.size}-byte version #{version} mode 6 op #{op} message"
|
2014-06-11 20:46:08 +00:00
|
|
|
vprint_status("#{host}:#{rport} probing with #{request.size}-byte #{what}")
|
2014-06-16 18:56:27 +00:00
|
|
|
responses = probe(host, datastore['RPORT'].to_i, request)
|
|
|
|
handle_responses(host, request, responses, what)
|
2014-06-11 20:46:08 +00:00
|
|
|
Rex.sleep(sleep_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
# Sends a series of NTP private messages
|
|
|
|
def fuzz_private(host)
|
2014-06-16 18:56:27 +00:00
|
|
|
@versions.each do |version|
|
2014-06-16 17:31:08 +00:00
|
|
|
print_status("#{host}:#{rport} fuzzing version #{version} private messages (mode 7)")
|
2014-06-19 18:10:11 +00:00
|
|
|
@mode_7_implementations.each do |implementation|
|
|
|
|
@mode_7_request_codes.each do |request_code|
|
2014-06-16 18:56:27 +00:00
|
|
|
request = build_ntp_private(version, implementation, request_code, "\x00"*188)
|
2014-06-16 03:23:33 +00:00
|
|
|
what = "#{request.size}-byte version #{version} mode 7 imp #{implementation} req #{request_code} message"
|
|
|
|
vprint_status("#{host}:#{rport} probing with #{request.size}-byte #{what}")
|
2014-06-16 18:56:27 +00:00
|
|
|
responses = probe(host, datastore['RPORT'].to_i, request)
|
|
|
|
handle_responses(host, request, responses, what)
|
2014-06-16 03:23:33 +00:00
|
|
|
Rex.sleep(sleep_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-11 20:46:08 +00:00
|
|
|
# Sends a series of small, short datagrams, looking for a reply
|
|
|
|
def fuzz_short(host)
|
|
|
|
print_status("#{host}:#{rport} fuzzing short messages")
|
|
|
|
0.upto(4) do |size|
|
|
|
|
request = SecureRandom.random_bytes(size)
|
2014-06-16 18:56:27 +00:00
|
|
|
what = "short #{request.size}-byte random message"
|
2014-06-11 20:46:08 +00:00
|
|
|
vprint_status("#{host}:#{rport} probing with #{what}")
|
2014-06-16 18:56:27 +00:00
|
|
|
responses = probe(host, datastore['RPORT'].to_i, request)
|
|
|
|
handle_responses(host, request, responses, what)
|
2014-06-11 20:46:08 +00:00
|
|
|
Rex.sleep(sleep_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Sends a series of random, full-sized datagrams, looking for a reply
|
|
|
|
def fuzz_random(host)
|
|
|
|
print_status("#{host}:#{rport} fuzzing random messages")
|
|
|
|
0.upto(5) do
|
|
|
|
request = SecureRandom.random_bytes(48)
|
2014-06-16 03:23:33 +00:00
|
|
|
what = "random #{request.size}-byte message"
|
2014-06-11 20:46:08 +00:00
|
|
|
vprint_status("#{host}:#{rport} probing with #{what}")
|
2014-06-16 18:56:27 +00:00
|
|
|
responses = probe(host, datastore['RPORT'].to_i, request)
|
|
|
|
handle_responses(host, request, responses, what)
|
2014-06-11 20:46:08 +00:00
|
|
|
Rex.sleep(sleep_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Sends a series of different version + mode combinations
|
|
|
|
def fuzz_version_mode(host, short=false)
|
|
|
|
print_status("#{host}:#{rport} fuzzing #{short ? 'short ' : nil}version and mode combinations")
|
2014-06-16 18:56:27 +00:00
|
|
|
@versions.each do |version|
|
|
|
|
@modes.each do |mode|
|
2014-06-11 20:46:08 +00:00
|
|
|
request = build_ntp_generic(version, mode)
|
|
|
|
request = request[0, 4] if short
|
2014-06-16 03:23:33 +00:00
|
|
|
what = "#{request.size}-byte #{short ? 'short ' : nil}version #{version} mode #{mode} message"
|
2014-06-11 20:46:08 +00:00
|
|
|
vprint_status("#{host}:#{rport} probing with #{what}")
|
2014-06-16 18:56:27 +00:00
|
|
|
responses = probe(host, datastore['RPORT'].to_i, request)
|
|
|
|
handle_responses(host, request, responses, what)
|
2014-06-11 20:46:08 +00:00
|
|
|
Rex.sleep(sleep_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
# Sends +message+ to +host+ on UDP port +port+, returning all replies
|
|
|
|
def probe(host, port, message)
|
2014-06-11 20:46:08 +00:00
|
|
|
replies = []
|
2014-06-16 03:23:33 +00:00
|
|
|
udp_sock.sendto(message, host, port, 0)
|
2014-06-11 20:46:08 +00:00
|
|
|
while (r = udp_sock.recvfrom(65535, datastore['WAIT'] / 1000.0) and r[1])
|
|
|
|
replies << r
|
|
|
|
end
|
|
|
|
replies
|
|
|
|
end
|
|
|
|
|
2014-06-16 03:23:33 +00:00
|
|
|
# Parses the given message and provides a description about the NTP message inside
|
|
|
|
def describe(message)
|
|
|
|
ntp = NTPGeneric.new(message)
|
|
|
|
"#{message.size}-byte version #{ntp.version} mode #{ntp.mode} reply"
|
2014-06-11 20:46:08 +00:00
|
|
|
end
|
|
|
|
|
2014-06-16 18:56:27 +00:00
|
|
|
def handle_responses(host, request, responses, what)
|
2014-06-11 20:46:08 +00:00
|
|
|
problems = []
|
2014-06-16 18:56:27 +00:00
|
|
|
descriptions = []
|
|
|
|
responses.select! { |r| r[1] }
|
|
|
|
return if responses.empty?
|
|
|
|
responses.each do |response|
|
|
|
|
data = response[0]
|
|
|
|
descriptions << describe(data)
|
|
|
|
problems << 'large response' if request.size < data.size
|
|
|
|
ntp_req = NTPGeneric.new(request)
|
|
|
|
ntp_resp = NTPGeneric.new(data)
|
|
|
|
problems << 'version mismatch' if ntp_req.version != ntp_resp.version
|
|
|
|
end
|
|
|
|
|
|
|
|
problems << 'multiple responses' if responses.size > 1
|
|
|
|
problems.sort!
|
|
|
|
problems.uniq!
|
2014-06-11 20:46:08 +00:00
|
|
|
|
2014-06-16 18:56:27 +00:00
|
|
|
description = descriptions.join(',')
|
2014-06-11 20:46:08 +00:00
|
|
|
if problems.empty?
|
2014-06-16 18:56:27 +00:00
|
|
|
vprint_status("#{host}:#{rport} -- Received '#{description}' to #{what}")
|
2014-06-11 20:46:08 +00:00
|
|
|
else
|
2014-06-16 18:56:27 +00:00
|
|
|
print_good("#{host}:#{rport} -- Received '#{description}' to #{what}: #{problems.join(',')}")
|
2014-06-11 20:46:08 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|