EternalBlueExploit.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. import logging
  2. from random import randint, uniform
  3. from lea import Lea
  4. from scapy.utils import RawPcapReader
  5. from scapy.layers.inet import Ether
  6. from definitions import ROOT_DIR
  7. from Attack import BaseAttack
  8. from Attack.AttackParameters import Parameter as Param
  9. from Attack.AttackParameters import ParameterTypes
  10. from ID2TLib.Utility import update_timestamp, get_interval_pps, handle_most_used_outputs
  11. from ID2TLib.SMBLib import smb_port
  12. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  13. # noinspection PyPep8
  14. class EternalBlueExploit(BaseAttack.BaseAttack):
  15. template_scan_pcap_path = ROOT_DIR + "/../resources/Win7_eternalblue_scan.pcap"
  16. template_attack_pcap_path = ROOT_DIR + "/../resources/Win7_eternalblue_exploit.pcap"
  17. # Empirical values from Metasploit experiments
  18. minDefaultPort = 30000
  19. maxDefaultPort = 50000
  20. last_conn_dst_port = 4444
  21. def __init__(self):
  22. """
  23. Creates a new instance of the EternalBlue Exploit.
  24. """
  25. # Initialize attack
  26. super(EternalBlueExploit, self).__init__("EternalBlue Exploit", "Injects an EternalBlue exploit'",
  27. "Privilege elevation")
  28. # Define allowed parameters and their type
  29. self.supported_params.update({
  30. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  31. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  32. Param.PORT_SOURCE: ParameterTypes.TYPE_PORT,
  33. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  34. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  35. Param.PORT_DESTINATION: ParameterTypes.TYPE_PORT,
  36. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  37. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  38. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT
  39. })
  40. def init_params(self):
  41. """
  42. Initialize the parameters of this attack using the user supplied command line parameters.
  43. Use the provided statistics to calculate default parameters and to process user
  44. supplied queries.
  45. :param statistics: Reference to a statistics object.
  46. """
  47. # PARAMETERS: initialize with default utilsvalues
  48. # (values are overwritten if user specifies them)
  49. # Attacker configuration
  50. most_used_ip_address = self.statistics.get_most_used_ip_address()
  51. random_ip_address = self.statistics.get_random_ip_address()
  52. while random_ip_address == most_used_ip_address:
  53. random_ip_address = self.statistics.get_random_ip_address()
  54. self.add_param_value(Param.IP_SOURCE, random_ip_address)
  55. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(random_ip_address))
  56. self.add_param_value(Param.PORT_SOURCE, randint(self.minDefaultPort, self.maxDefaultPort))
  57. # Victim configuration
  58. self.add_param_value(Param.IP_DESTINATION, most_used_ip_address)
  59. destination_mac = self.statistics.get_mac_address(most_used_ip_address)
  60. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  61. destination_mac = self.generate_random_mac_address()
  62. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  63. self.add_param_value(Param.PORT_DESTINATION, smb_port)
  64. # Attack configuration
  65. self.add_param_value(Param.PACKETS_PER_SECOND,
  66. (self.statistics.get_pps_sent(most_used_ip_address) +
  67. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  68. self.add_param_value(Param.INJECT_AFTER_PACKET, randint(0, self.statistics.get_packet_count()))
  69. def generate_attack_pcap(self):
  70. # Timestamp
  71. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  72. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  73. # calculate complement packet rates of BG traffic per interval
  74. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  75. # Initialize parameters
  76. packets = []
  77. mac_source = self.get_param_value(Param.MAC_SOURCE)
  78. ip_source = self.get_param_value(Param.IP_SOURCE)
  79. port_source = self.get_param_value(Param.PORT_SOURCE)
  80. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  81. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  82. port_destination = self.get_param_value(Param.PORT_DESTINATION)
  83. # Check ip.src == ip.dst
  84. self.ip_src_dst_equal_check(ip_source, ip_destination)
  85. path_attack_pcap = None
  86. # Set TTL based on TTL distribution of IP address
  87. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  88. if len(source_ttl_dist) > 0:
  89. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  90. source_ttl_value = source_ttl_prob_dict.random()
  91. else:
  92. source_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  93. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  94. if len(destination_ttl_dist) > 0:
  95. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  96. destination_ttl_value = destination_ttl_prob_dict.random()
  97. else:
  98. destination_ttl_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(ttlValue)"))
  99. # Set Window Size based on Window Size distribution of IP address
  100. source_win_dist = self.statistics.get_win_distribution(ip_source)
  101. if len(source_win_dist) > 0:
  102. source_win_prob_dict = Lea.fromValFreqsDict(source_win_dist)
  103. else:
  104. source_win_dist = self.statistics.get_win_distribution(self.statistics.get_most_used_ip_address())
  105. source_win_prob_dict = Lea.fromValFreqsDict(source_win_dist)
  106. destination_win_dist = self.statistics.get_win_distribution(ip_destination)
  107. if len(destination_win_dist) > 0:
  108. destination_win_prob_dict = Lea.fromValFreqsDict(destination_win_dist)
  109. else:
  110. destination_win_dist = self.statistics.get_win_distribution(self.statistics.get_most_used_ip_address())
  111. destination_win_prob_dict = Lea.fromValFreqsDict(destination_win_dist)
  112. # Set MSS (Maximum Segment Size) based on MSS distribution of IP address
  113. mss_value = handle_most_used_outputs(self.statistics.process_db_query("most_used(mssValue)"))
  114. if not mss_value:
  115. mss_value = 1465
  116. # Scan (MS17) for EternalBlue
  117. # Read Win7_eternalblue_scan pcap file
  118. orig_ip_dst = None
  119. exploit_raw_packets = RawPcapReader(self.template_scan_pcap_path)
  120. inter_arrival_times = self.get_inter_arrival_time(exploit_raw_packets)
  121. exploit_raw_packets.close()
  122. exploit_raw_packets = RawPcapReader(self.template_scan_pcap_path)
  123. source_origin_wins, destination_origin_wins = {}, {}
  124. for pkt_num, pkt in enumerate(exploit_raw_packets):
  125. eth_frame = Ether(pkt[0])
  126. ip_pkt = eth_frame.payload
  127. tcp_pkt = ip_pkt.payload
  128. if pkt_num == 0:
  129. if tcp_pkt.getfieldval("dport") == smb_port:
  130. orig_ip_dst = ip_pkt.getfieldval("dst") # victim IP
  131. # Request
  132. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  133. # Ether
  134. eth_frame.setfieldval("src", mac_source)
  135. eth_frame.setfieldval("dst", mac_destination)
  136. # IP
  137. ip_pkt.setfieldval("src", ip_source)
  138. ip_pkt.setfieldval("dst", ip_destination)
  139. ip_pkt.setfieldval("ttl", source_ttl_value)
  140. # TCP
  141. tcp_pkt.setfieldval("sport",port_source)
  142. tcp_pkt.setfieldval("dport",port_destination)
  143. ## Window Size (mapping)
  144. source_origin_win = tcp_pkt.getfieldval("window")
  145. if source_origin_win not in source_origin_wins:
  146. source_origin_wins[source_origin_win] = source_win_prob_dict.random()
  147. new_win = source_origin_wins[source_origin_win]
  148. tcp_pkt.setfieldval("window", new_win)
  149. ## MSS
  150. tcp_options = tcp_pkt.getfieldval("options")
  151. if tcp_options:
  152. if tcp_options[0][0] == "MSS":
  153. tcp_options [0] = ("MSS",mss_value)
  154. tcp_pkt.setfieldval("options", tcp_options)
  155. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  156. new_pkt.time = timestamp_next_pkt
  157. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  158. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num]#float(timeSteps.random())
  159. # Reply
  160. else:
  161. # Ether
  162. eth_frame.setfieldval("src", mac_destination)
  163. eth_frame.setfieldval("dst", mac_source)
  164. # IP
  165. ip_pkt.setfieldval("src", ip_destination)
  166. ip_pkt.setfieldval("dst", ip_source)
  167. ip_pkt.setfieldval("ttl", destination_ttl_value)
  168. # TCP
  169. tcp_pkt.setfieldval("dport", port_source)
  170. tcp_pkt.setfieldval("sport",port_destination)
  171. ## Window Size
  172. destination_origin_win = tcp_pkt.getfieldval("window")
  173. if destination_origin_win not in destination_origin_wins:
  174. destination_origin_wins[destination_origin_win] = destination_win_prob_dict.random()
  175. new_win = destination_origin_wins[destination_origin_win]
  176. tcp_pkt.setfieldval("window", new_win)
  177. ## MSS
  178. tcp_options = tcp_pkt.getfieldval("options")
  179. if tcp_options:
  180. if tcp_options[0][0] == "MSS":
  181. tcp_options[0] = ("MSS", mss_value)
  182. tcp_pkt.setfieldval("options", tcp_options)
  183. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  184. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num]#+ float(timeSteps.random())
  185. new_pkt.time = timestamp_next_pkt
  186. packets.append(new_pkt)
  187. # Inject EternalBlue exploit packets
  188. # Read Win7_eternalblue_exploit pcap file
  189. exploit_raw_packets.close()
  190. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  191. port_source = randint(self.minDefaultPort,self.maxDefaultPort) # experiments show this range of ports
  192. # conversations = {(ip.src, ip.dst, port.src, port.dst): packets}
  193. conversations, orderList_conversations = self.packetsToConvs(exploit_raw_packets)
  194. exploit_raw_packets.close()
  195. conv_start_timesamp = timestamp_next_pkt
  196. for conv_index, conv in enumerate(orderList_conversations):
  197. conv_start_timesamp = conv_start_timesamp + uniform(0.001,0.01) # the distance between the starts of the converstaions
  198. timestamp_next_pkt = conv_start_timesamp
  199. conv_pkts = conversations[conv]
  200. inter_arrival_times = self.get_inter_arrival_time(conv_pkts)
  201. if conv_index == len(orderList_conversations) - 2: # Not the last conversation
  202. timestamp_next_pkt = packets[-1].time + uniform(0.001,0.01)
  203. if conv_index != len(orderList_conversations)-1: # Not the last conversation
  204. port_source += 2
  205. for pkt_num, pkt in enumerate(conv_pkts):
  206. eth_frame = Ether(pkt[0])
  207. ip_pkt = eth_frame.payload
  208. tcp_pkt = ip_pkt.payload
  209. if pkt_num == 0:
  210. if tcp_pkt.getfieldval("dport") == smb_port:
  211. orig_ip_dst = ip_pkt.getfieldval("dst")
  212. # Request
  213. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  214. # Ether
  215. eth_frame.setfieldval("src", mac_source)
  216. eth_frame.setfieldval("dst", mac_destination)
  217. # IP
  218. ip_pkt.setfieldval("src", ip_source)
  219. ip_pkt.setfieldval("dst", ip_destination)
  220. ip_pkt.setfieldval("ttl", source_ttl_value)
  221. # TCP
  222. tcp_pkt.setfieldval("sport", port_source)
  223. tcp_pkt.setfieldval("dport", port_destination)
  224. ## Window Size
  225. source_origin_win = tcp_pkt.getfieldval("window")
  226. if source_origin_win not in source_origin_wins:
  227. source_origin_wins[source_origin_win] = source_win_prob_dict.random()
  228. new_win = source_origin_wins[source_origin_win]
  229. tcp_pkt.setfieldval("window", new_win)
  230. ## MSS
  231. tcp_options = tcp_pkt.getfieldval("options")
  232. if tcp_options:
  233. if tcp_options[0][0] == "MSS":
  234. tcp_options[0] = ("MSS", mss_value)
  235. tcp_pkt.setfieldval("options", tcp_options)
  236. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  237. new_pkt.time = timestamp_next_pkt
  238. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  239. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num] #float(timeSteps.random())
  240. # Reply
  241. else:
  242. # Ether
  243. eth_frame.setfieldval("src", mac_destination)
  244. eth_frame.setfieldval("dst", mac_source)
  245. # IP
  246. ip_pkt.setfieldval("src", ip_destination)
  247. ip_pkt.setfieldval("dst", ip_source)
  248. ip_pkt.setfieldval("ttl", destination_ttl_value)
  249. # TCP
  250. tcp_pkt.setfieldval("dport", port_source)
  251. tcp_pkt.setfieldval("sport", port_destination)
  252. ## Window Size
  253. destination_origin_win = tcp_pkt.getfieldval("window")
  254. if destination_origin_win not in destination_origin_wins:
  255. destination_origin_wins[destination_origin_win] = destination_win_prob_dict.random()
  256. new_win = destination_origin_wins[destination_origin_win]
  257. tcp_pkt.setfieldval("window", new_win)
  258. ## MSS
  259. tcp_options = tcp_pkt.getfieldval("options")
  260. if tcp_options:
  261. if tcp_options[0][0] == "MSS":
  262. tcp_options[0] = ("MSS", mss_value)
  263. tcp_pkt.setfieldval("options", tcp_options)
  264. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  265. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  266. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num]#float(timeSteps.random())
  267. new_pkt.time = timestamp_next_pkt
  268. packets.append(new_pkt)
  269. else: # Last conversation where the victim start a connection with the attacker
  270. timestamp_next_pkt = packets[-1].time + uniform(0.001, 0.01)
  271. port_source = randint(self.minDefaultPort,self.maxDefaultPort)
  272. for pkt_num, pkt in enumerate(conv_pkts):
  273. eth_frame = Ether(pkt[0])
  274. ip_pkt = eth_frame.payload
  275. tcp_pkt = ip_pkt.payload
  276. # Request
  277. if tcp_pkt.getfieldval("dport") == self.last_conn_dst_port:
  278. # Ether
  279. eth_frame.setfieldval("src", mac_destination)
  280. eth_frame.setfieldval("dst", mac_source)
  281. # IP
  282. ip_pkt.setfieldval("src", ip_destination)
  283. ip_pkt.setfieldval("dst", ip_source)
  284. ip_pkt.setfieldval("ttl", destination_ttl_value)
  285. # TCP
  286. tcp_pkt.setfieldval("sport", port_source)
  287. # destination port is fixed 4444
  288. ## Window Size
  289. destination_origin_win = tcp_pkt.getfieldval("window")
  290. if destination_origin_win not in destination_origin_wins:
  291. destination_origin_wins[destination_origin_win] = destination_win_prob_dict.random()
  292. new_win = destination_origin_wins[destination_origin_win]
  293. tcp_pkt.setfieldval("window", new_win)
  294. ## MSS
  295. tcp_options = tcp_pkt.getfieldval("options")
  296. if tcp_options:
  297. if tcp_options[0][0] == "MSS":
  298. tcp_options[0] = ("MSS", mss_value)
  299. tcp_pkt.setfieldval("options", tcp_options)
  300. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  301. new_pkt.time = timestamp_next_pkt
  302. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  303. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num]# float(timeSteps.random())
  304. # Reply
  305. else:
  306. # Ether
  307. eth_frame.setfieldval("src", mac_source)
  308. eth_frame.setfieldval("dst", mac_destination)
  309. # IP
  310. ip_pkt.setfieldval("src", ip_source)
  311. ip_pkt.setfieldval("dst", ip_destination)
  312. ip_pkt.setfieldval("ttl", source_ttl_value)
  313. # TCP
  314. tcp_pkt.setfieldval("dport", port_source)
  315. # source port is fixed 4444
  316. ## Window Size
  317. source_origin_win = tcp_pkt.getfieldval("window")
  318. if source_origin_win not in source_origin_wins:
  319. source_origin_wins[source_origin_win] = source_win_prob_dict.random()
  320. new_win = source_origin_wins[source_origin_win]
  321. tcp_pkt.setfieldval("window", new_win)
  322. ## MSS
  323. tcp_options = tcp_pkt.getfieldval("options")
  324. if tcp_options:
  325. if tcp_options[0][0] == "MSS":
  326. tcp_options[0] = ("MSS", mss_value)
  327. tcp_pkt.setfieldval("options", tcp_options)
  328. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  329. pps = max(get_interval_pps(complement_interval_pps, timestamp_next_pkt), 10)
  330. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + inter_arrival_times[pkt_num]# float(timeSteps.random())
  331. new_pkt.time = timestamp_next_pkt
  332. packets.append(new_pkt)
  333. # Store timestamp of first packet (for attack label)
  334. self.attack_start_utime = packets[0].time
  335. self.attack_end_utime = packets[-1].time
  336. if len(packets) > 0:
  337. packets = sorted(packets, key=lambda pkt: pkt.time)
  338. path_attack_pcap = self.write_attack_pcap(packets, True, path_attack_pcap)
  339. # return packets sorted by packet time_sec_start
  340. # pkt_num+1: because pkt_num starts at 0
  341. return pkt_num + 1, path_attack_pcap