287 lines
11 KiB
Python
Executable File
287 lines
11 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# -*- coding: utf-8 -*-
|
|
from cme.helpers.logger import highlight
|
|
from cme.helpers.misc import identify_target_file
|
|
from cme.parsers.ip import parse_targets
|
|
from cme.parsers.nmap import parse_nmap_xml
|
|
from cme.parsers.nessus import parse_nessus_file
|
|
from cme.cli import gen_cli_args
|
|
from cme.loaders.protocolloader import ProtocolLoader
|
|
from cme.loaders.moduleloader import ModuleLoader
|
|
from cme.servers.http import CMEServer
|
|
from cme.first_run import first_run_setup
|
|
from cme.context import Context
|
|
from cme.paths import CME_PATH, DATA_PATH
|
|
from cme.console import cme_console
|
|
from cme.logger import cme_logger
|
|
from cme.config import cme_config, cme_workspace, config_log, ignore_opsec
|
|
from concurrent.futures import ThreadPoolExecutor, as_completed
|
|
import asyncio
|
|
import cme.helpers.powershell as powershell
|
|
import shutil
|
|
import webbrowser
|
|
import random
|
|
import os
|
|
from os.path import exists
|
|
from os.path import join as path_join
|
|
from sys import exit
|
|
import logging
|
|
import sqlalchemy
|
|
from rich.progress import Progress
|
|
|
|
try:
|
|
import librlers
|
|
except:
|
|
print(
|
|
"Incompatible python version, try with another python version or another binary 3.8 / 3.9 / 3.10 / 3.11 that match your python version (python -V)"
|
|
)
|
|
exit(1)
|
|
|
|
|
|
def create_db_engine(db_path):
|
|
db_engine = sqlalchemy.create_engine(
|
|
f"sqlite:///{db_path}", isolation_level="AUTOCOMMIT", future=True
|
|
)
|
|
return db_engine
|
|
|
|
|
|
async def start_run(protocol_obj, args, db, targets):
|
|
cme_logger.debug(f"Creating ThreadPoolExecutor")
|
|
if args.no_progress or len(targets) == 1:
|
|
with ThreadPoolExecutor(max_workers=args.threads + 1) as executor:
|
|
cme_logger.debug(f"Creating thread for {protocol_obj}")
|
|
_ = [executor.submit(protocol_obj, args, db, target) for target in targets]
|
|
else:
|
|
with Progress(console=cme_console) as progress:
|
|
with ThreadPoolExecutor(max_workers=args.threads + 1) as executor:
|
|
current = 0
|
|
total = len(targets)
|
|
tasks = progress.add_task(
|
|
f"[green]Running CME against {total} {'target' if total == 1 else 'targets'}",
|
|
total=total,
|
|
)
|
|
cme_logger.debug(f"Creating thread for {protocol_obj}")
|
|
futures = [
|
|
executor.submit(protocol_obj, args, db, target)
|
|
for target in targets
|
|
]
|
|
for future in as_completed(futures):
|
|
current += 1
|
|
progress.update(tasks, completed=current)
|
|
|
|
|
|
def main():
|
|
first_run_setup(cme_logger)
|
|
root_logger = logging.getLogger("root")
|
|
args = gen_cli_args()
|
|
|
|
if args.verbose:
|
|
cme_logger.logger.setLevel(logging.INFO)
|
|
root_logger.setLevel(logging.INFO)
|
|
elif args.debug:
|
|
cme_logger.logger.setLevel(logging.DEBUG)
|
|
root_logger.setLevel(logging.DEBUG)
|
|
else:
|
|
cme_logger.logger.setLevel(logging.ERROR)
|
|
root_logger.setLevel(logging.ERROR)
|
|
|
|
# if these are the same, it might double log to file (two FileHandlers will be added)
|
|
# but this should never happen by accident
|
|
if config_log:
|
|
cme_logger.add_file_log()
|
|
if hasattr(args, "log") and args.log:
|
|
cme_logger.add_file_log(args.log)
|
|
|
|
cme_logger.debug(f"Passed args: {args}")
|
|
|
|
if args.darrell:
|
|
links = (
|
|
open(path_join(DATA_PATH, "videos_for_darrell.harambe"))
|
|
.read()
|
|
.splitlines()
|
|
)
|
|
try:
|
|
webbrowser.open(random.choice(links))
|
|
exit(1)
|
|
except Exception as e:
|
|
cme_logger.error(f"Error opening le dank meme: {e}")
|
|
exit(1)
|
|
|
|
if args.protocol == "ssh":
|
|
if args.key_file:
|
|
if not args.password:
|
|
cme_logger.fail(
|
|
f"Password is required, even if a key file is used - if no passphrase for key, use `-p ''`"
|
|
)
|
|
exit(1)
|
|
|
|
if args.use_kcache and not os.environ.get("KRB5CCNAME"):
|
|
cme_logger.error("KRB5CCNAME environment variable is not set")
|
|
exit(1)
|
|
|
|
module_server = None
|
|
targets = []
|
|
server_port_dict = {
|
|
"http": 80,
|
|
"https": 443,
|
|
"smb": 445
|
|
}
|
|
|
|
if hasattr(args, "cred_id") and args.cred_id:
|
|
for cred_id in args.cred_id:
|
|
if "-" in str(cred_id):
|
|
start_id, end_id = cred_id.split("-")
|
|
try:
|
|
for n in range(int(start_id), int(end_id) + 1):
|
|
args.cred_id.append(n)
|
|
args.cred_id.remove(cred_id)
|
|
except Exception as e:
|
|
cme_logger.error(f"Error parsing database credential id: {e}")
|
|
exit(1)
|
|
|
|
if hasattr(args, "target") and args.target:
|
|
for target in args.target:
|
|
if exists(target):
|
|
target_file_type = identify_target_file(target)
|
|
if target_file_type == "nmap":
|
|
targets.extend(parse_nmap_xml(target, args.protocol))
|
|
elif target_file_type == "nessus":
|
|
targets.extend(parse_nessus_file(target, args.protocol))
|
|
else:
|
|
with open(target, "r") as target_file:
|
|
for target_entry in target_file:
|
|
targets.extend(parse_targets(target_entry.strip()))
|
|
else:
|
|
targets.extend(parse_targets(target))
|
|
|
|
# The following is a quick hack for the powershell obfuscation functionality, I know this is yucky
|
|
if hasattr(args, "clear_obfscripts") and args.clear_obfscripts:
|
|
shutil.rmtree(os.path.expanduser("~/.cme/obfuscated_scripts/"))
|
|
os.mkdir(os.path.expanduser("~/.cme/obfuscated_scripts/"))
|
|
cme_logger.success("Cleared cached obfuscated PowerShell scripts")
|
|
|
|
if hasattr(args, "obfs") and args.obfs:
|
|
powershell.obfuscate_ps_scripts = True
|
|
|
|
cme_logger.debug(f"Protocol: {args.protocol}")
|
|
p_loader = ProtocolLoader()
|
|
protocol_path = p_loader.get_protocols()[args.protocol]["path"]
|
|
cme_logger.debug(f"Protocol Path: {protocol_path}")
|
|
protocol_db_path = p_loader.get_protocols()[args.protocol]["dbpath"]
|
|
cme_logger.debug(f"Protocol DB Path: {protocol_db_path}")
|
|
|
|
protocol_object = getattr(p_loader.load_protocol(protocol_path), args.protocol)
|
|
cme_logger.debug(f"Protocol Object: {protocol_object}")
|
|
protocol_db_object = getattr(p_loader.load_protocol(protocol_db_path), "database")
|
|
cme_logger.debug(f"Protocol DB Object: {protocol_db_object}")
|
|
|
|
db_path = path_join(CME_PATH, "workspaces", cme_workspace, f"{args.protocol}.db")
|
|
cme_logger.debug(f"DB Path: {db_path}")
|
|
|
|
db_engine = create_db_engine(db_path)
|
|
|
|
db = protocol_db_object(db_engine)
|
|
|
|
# with the new cme/config.py this can be eventually removed, as it can be imported anywhere
|
|
setattr(protocol_object, "config", cme_config)
|
|
|
|
loader = ModuleLoader(args, db, cme_logger)
|
|
modules = loader.list_modules()
|
|
|
|
if args.list_modules:
|
|
for name, props in sorted(modules.items()):
|
|
if args.protocol in props["supported_protocols"]:
|
|
cme_logger.display(f"{name:<25} {props['description']}")
|
|
exit(0)
|
|
elif args.module and args.show_module_options:
|
|
for module in args.module:
|
|
cme_logger.display(
|
|
f"{module} module options:\n{modules[module]['options']}"
|
|
)
|
|
exit(0)
|
|
elif args.module:
|
|
cme_logger.debug(f"Modules to be Loaded: {args.module}, {type(args.module)}")
|
|
for m in map(str.lower, args.module):
|
|
if m not in modules:
|
|
cme_logger.error(f"Module not found: {m}")
|
|
exit(1)
|
|
|
|
cme_logger.debug(f"Loading module {m} at path {modules[m]['path']}")
|
|
module = loader.init_module(modules[m]["path"])
|
|
|
|
if not module.opsec_safe:
|
|
if ignore_opsec:
|
|
cme_logger.debug(f"ignore_opsec is set in the configuration, skipping prompt")
|
|
cme_logger.display(f"Ignore OPSEC in configuration is set and OPSEC unsafe module loaded")
|
|
else:
|
|
ans = input(highlight(
|
|
"[!] Module is not opsec safe, are you sure you want to run this? [Y/n] ",
|
|
"red",
|
|
))
|
|
if ans.lower() not in ["y", "yes", ""]:
|
|
exit(1)
|
|
|
|
if not module.multiple_hosts and len(targets) > 1:
|
|
ans = input(highlight(
|
|
"[!] Running this module on multiple hosts doesn't really make any sense, are you sure you want to continue? [Y/n] ",
|
|
"red",
|
|
))
|
|
if ans.lower() not in ["y", "yes", ""]:
|
|
exit(1)
|
|
|
|
if hasattr(module, "on_request") or hasattr(module, "has_response"):
|
|
if hasattr(module, "required_server"):
|
|
args.server = module.required_server
|
|
|
|
if not args.server_port:
|
|
args.server_port = server_port_dict[args.server]
|
|
|
|
# loading a module server multiple times will obviously fail
|
|
try:
|
|
context = Context(
|
|
db,
|
|
cme_logger,
|
|
args
|
|
)
|
|
module_server = CMEServer(
|
|
module,
|
|
context,
|
|
cme_logger,
|
|
args.server_host,
|
|
args.server_port,
|
|
args.server,
|
|
)
|
|
module_server.start()
|
|
protocol_object.server = module_server.server
|
|
except Exception as e:
|
|
cme_logger.error(f"Error loading module server for {module}: {e}")
|
|
|
|
cme_logger.debug(f"proto_object: {protocol_object}, type: {type(protocol_object)}")
|
|
cme_logger.debug(f"proto object dir: {dir(protocol_object)}")
|
|
# get currently set modules, otherwise default to empty list
|
|
current_modules = getattr(protocol_object, "module", [])
|
|
current_modules.append(module)
|
|
setattr(protocol_object, "module", current_modules)
|
|
cme_logger.debug(f"proto object module after adding: {protocol_object.module}")
|
|
|
|
if hasattr(args, "ntds") and args.ntds and not args.userntds:
|
|
ans = input(highlight(
|
|
"[!] Dumping the ntds can crash the DC on Windows Server 2019. Use the option --user <user> to dump a specific user safely or the module -M ntdsutil [Y/n] ",
|
|
"red",
|
|
))
|
|
if ans.lower() not in ["y", "yes", ""]:
|
|
exit(1)
|
|
|
|
try:
|
|
asyncio.run(start_run(protocol_object, args, db, targets))
|
|
except KeyboardInterrupt:
|
|
cme_logger.debug("Got keyboard interrupt")
|
|
finally:
|
|
if module_server:
|
|
module_server.shutdown()
|
|
db_engine.dispose()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|