EternalBlueExploit.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. import logging
  2. from random import randint, uniform
  3. from lea import Lea
  4. from Attack import BaseAttack
  5. from Attack.AttackParameters import Parameter as Param
  6. from Attack.AttackParameters import ParameterTypes
  7. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  8. # noinspection PyPep8
  9. from scapy.utils import RawPcapReader
  10. from scapy.layers.inet import IP, Ether, TCP, RandShort
  11. class EternalBlueExploit(BaseAttack.BaseAttack):
  12. template_attack_pcap_path = "resources/Win7_eternalblue_scan.pcap"
  13. # SMB port
  14. smb_port = 445
  15. # Empirical values from Metasploit experiments
  16. minDefaultPort = 30000
  17. maxDefaultPort = 50000
  18. last_conn_dst_port = 4444
  19. def __init__(self):
  20. """
  21. Creates a new instance of the EternalBlue Exploit.
  22. """
  23. # Initialize attack
  24. super(EternalBlueExploit, self).__init__("EternalBlue Exploit", "Injects an EternalBlue exploit'",
  25. "Resource Exhaustion")
  26. # Define allowed parameters and their type
  27. self.supported_params = {
  28. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  29. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  30. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  31. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  32. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  33. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  34. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT
  35. }
  36. def init_params(self):
  37. """
  38. Initialize the parameters of this attack using the user supplied command line parameters.
  39. Use the provided statistics to calculate default parameters and to process user
  40. supplied queries.
  41. :param statistics: Reference to a statistics object.
  42. """
  43. # PARAMETERS: initialize with default utilsvalues
  44. # (values are overwritten if user specifies them)
  45. most_used_ip_address = self.statistics.get_most_used_ip_address()
  46. if isinstance(most_used_ip_address, list):
  47. most_used_ip_address = most_used_ip_address[0]
  48. self.add_param_value(Param.IP_SOURCE, most_used_ip_address)
  49. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(most_used_ip_address))
  50. self.add_param_value(Param.INJECT_AFTER_PACKET, randint(0, self.statistics.get_packet_count()))
  51. self.add_param_value(Param.PACKETS_PER_SECOND,
  52. (self.statistics.get_pps_sent(most_used_ip_address) +
  53. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  54. # victim configuration
  55. random_ip_address = self.statistics.get_random_ip_address()
  56. self.add_param_value(Param.IP_DESTINATION, random_ip_address)
  57. destination_mac = self.statistics.get_mac_address(random_ip_address)
  58. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  59. destination_mac = self.generate_random_mac_address()
  60. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  61. def generate_attack_pcap(self):
  62. def update_timestamp(timestamp, pps):
  63. """
  64. Calculates the next timestamp to be used based on the packet per second rate (pps) and the maximum delay.
  65. :return: Timestamp to be used for the next packet.
  66. """
  67. # Calculate the request timestamp
  68. # A distribution to imitate the bursty behavior of traffic
  69. randomdelay = Lea.fromValFreqsDict({1 / pps: 70, 2 / pps: 20, 5 / pps: 7, 10 / pps: 3})
  70. return timestamp + uniform(1 / pps, randomdelay.random())
  71. def getIntervalPPS(complement_interval_pps, timestamp):
  72. """
  73. Gets the packet rate (pps) in specific time interval.
  74. :return: the corresponding packet rate for packet rate (pps) .
  75. """
  76. for row in complement_interval_pps:
  77. if timestamp<=row[0]:
  78. return row[1]
  79. return complement_interval_pps[-1][1] # in case the timstamp > capture max timestamp
  80. # Timestamp
  81. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  82. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  83. # calculate complement packet rates of BG traffic per interval
  84. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  85. # Initialize parameters
  86. packets = []
  87. mac_source = self.get_param_value(Param.MAC_SOURCE)
  88. ip_source = self.get_param_value(Param.IP_SOURCE)
  89. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  90. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  91. # check ip.src == ip.dst
  92. self.ip_src_dst_equal_check(ip_source, ip_destination)
  93. path_attack_pcap = None
  94. minDelay, maxDelay = self.get_reply_delay(ip_destination)
  95. # Set TTL based on TTL distribution of IP address
  96. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  97. if len(source_ttl_dist) > 0:
  98. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  99. source_ttl_value = source_ttl_prob_dict.random()
  100. else:
  101. source_ttl_value = self.statistics.process_db_query("most_used(ttlValue)")
  102. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  103. if len(destination_ttl_dist) > 0:
  104. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  105. destination_ttl_value = destination_ttl_prob_dict.random()
  106. else:
  107. destination_ttl_value = self.statistics.process_db_query("most_used(ttlValue)")
  108. # Scan (MS17) for EternalBlue
  109. # Read Win7_eternalblue_scan_vulnerable pcap file
  110. orig_ip_dst = None
  111. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  112. inter_arrival_time_dist = self.get_inter_arrival_time_dist(exploit_raw_packets)
  113. timeSteps = Lea.fromValFreqsDict(inter_arrival_time_dist)
  114. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  115. port_source = randint(self.minDefaultPort,self.maxDefaultPort) # experiments show this range of ports
  116. for pkt_num, pkt in enumerate(exploit_raw_packets):
  117. eth_frame = Ether(pkt[0])
  118. ip_pkt = eth_frame.payload
  119. tcp_pkt = ip_pkt.payload
  120. if pkt_num == 0:
  121. if tcp_pkt.getfieldval("dport") == self.smb_port:
  122. orig_ip_dst = ip_pkt.getfieldval("dst") # victim IP
  123. # Request
  124. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  125. # Ether
  126. eth_frame.setfieldval("src", mac_source)
  127. eth_frame.setfieldval("dst", mac_destination)
  128. # IP
  129. ip_pkt.setfieldval("src", ip_source)
  130. ip_pkt.setfieldval("dst", ip_destination)
  131. ip_pkt.setfieldval("ttl", source_ttl_value)
  132. # TCP
  133. tcp_pkt.setfieldval("sport",port_source)
  134. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  135. new_pkt.time = timestamp_next_pkt
  136. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  137. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  138. # Reply
  139. else:
  140. # Ether
  141. eth_frame.setfieldval("src", mac_destination)
  142. eth_frame.setfieldval("dst", mac_source)
  143. # IP
  144. ip_pkt.setfieldval("src", ip_destination)
  145. ip_pkt.setfieldval("dst", ip_source)
  146. ip_pkt.setfieldval("ttl", destination_ttl_value)
  147. # TCP
  148. tcp_pkt.setfieldval("dport", port_source)
  149. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  150. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  151. new_pkt.time = timestamp_next_pkt
  152. packets.append(new_pkt)
  153. # Inject EternalBlue exploit packets
  154. # Read Win7_eternalblue_exploit pcap file
  155. exploit_raw_packets = RawPcapReader("resources/Win7_eternalblue_exploit.pcap")
  156. port_source = randint(self.minDefaultPort,self.maxDefaultPort) # experiments show this range of ports
  157. # conversations = {(ip.src, ip.dst, port.src, port.dst): packets}
  158. conversations, orderList_conversations = self.packetsToConvs(exploit_raw_packets)
  159. conv_start_timesamp = timestamp_next_pkt
  160. for conv_index, conv in enumerate(orderList_conversations):
  161. conv_start_timesamp = conv_start_timesamp + uniform(0.001,0.01) # the distance between the starts of the converstaions
  162. timestamp_next_pkt = conv_start_timesamp
  163. conv_pkts = conversations[conv]
  164. inter_arrival_time_dist = self.get_inter_arrival_time_dist(conv_pkts)
  165. timeSteps = Lea.fromValFreqsDict(inter_arrival_time_dist)
  166. if conv_index == len(orderList_conversations) - 2: # Not the last conversation
  167. timestamp_next_pkt = packets[-1].time + uniform(0.001,0.01)
  168. if conv_index != len(orderList_conversations)-1: # Not the last conversation
  169. port_source += 2
  170. for pkt_num, pkt in enumerate(conv_pkts):
  171. eth_frame = Ether(pkt[0])
  172. ip_pkt = eth_frame.payload
  173. tcp_pkt = ip_pkt.payload
  174. if pkt_num == 0:
  175. if tcp_pkt.getfieldval("dport") == self.smb_port:
  176. orig_ip_dst = ip_pkt.getfieldval("dst")
  177. # defining req/rep should be adapted to fit the last converstaion where
  178. # victim starts a connection with the attacker
  179. # Request
  180. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  181. # Ether
  182. eth_frame.setfieldval("src", mac_source)
  183. eth_frame.setfieldval("dst", mac_destination)
  184. # IP
  185. ip_pkt.setfieldval("src", ip_source)
  186. ip_pkt.setfieldval("dst", ip_destination)
  187. ip_pkt.setfieldval("ttl", source_ttl_value)
  188. # TCP
  189. tcp_pkt.setfieldval("sport", port_source)
  190. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  191. new_pkt.time = timestamp_next_pkt
  192. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  193. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  194. # Reply
  195. else:
  196. # Ether
  197. eth_frame.setfieldval("src", mac_destination)
  198. eth_frame.setfieldval("dst", mac_source)
  199. # IP
  200. ip_pkt.setfieldval("src", ip_destination)
  201. ip_pkt.setfieldval("dst", ip_source)
  202. ip_pkt.setfieldval("ttl", destination_ttl_value)
  203. # TCP
  204. tcp_pkt.setfieldval("dport", port_source)
  205. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  206. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  207. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  208. new_pkt.time = timestamp_next_pkt
  209. packets.append(new_pkt)
  210. else: # Last conversation where the victim start a connection with the attacker
  211. timestamp_next_pkt = packets[-1].time + uniform(0.001, 0.01)
  212. port_source = randint(self.minDefaultPort,self.maxDefaultPort)
  213. for pkt_num, pkt in enumerate(conv_pkts):
  214. eth_frame = Ether(pkt[0])
  215. ip_pkt = eth_frame.payload
  216. tcp_pkt = ip_pkt.payload
  217. # defining req/rep should be adapted to fit the last converstaion where
  218. # victim start a connection with the attacker
  219. # Request
  220. if tcp_pkt.getfieldval("dport") == self.last_conn_dst_port:
  221. # Ether
  222. eth_frame.setfieldval("src", mac_destination)
  223. eth_frame.setfieldval("dst", mac_source)
  224. # IP
  225. ip_pkt.setfieldval("src", ip_destination)
  226. ip_pkt.setfieldval("dst", ip_source)
  227. ip_pkt.setfieldval("ttl", destination_ttl_value)
  228. # TCP
  229. tcp_pkt.setfieldval("sport", port_source)
  230. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  231. new_pkt.time = timestamp_next_pkt
  232. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  233. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  234. # Reply
  235. else:
  236. # Ether
  237. eth_frame.setfieldval("src", mac_source)
  238. eth_frame.setfieldval("dst", mac_destination)
  239. # IP
  240. ip_pkt.setfieldval("src", ip_source)
  241. ip_pkt.setfieldval("dst", ip_destination)
  242. ip_pkt.setfieldval("ttl", source_ttl_value)
  243. # TCP
  244. tcp_pkt.setfieldval("dport", port_source)
  245. new_pkt = (eth_frame / ip_pkt / tcp_pkt)
  246. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  247. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  248. new_pkt.time = timestamp_next_pkt
  249. packets.append(new_pkt)
  250. # Store timestamp of first packet (for attack label)
  251. self.attack_start_utime = packets[0].time
  252. self.attack_end_utime = packets[-1].time
  253. if len(packets) > 0:
  254. packets = sorted(packets, key=lambda pkt: pkt.time)
  255. path_attack_pcap = self.write_attack_pcap(packets, True, path_attack_pcap)
  256. # return packets sorted by packet time_sec_start
  257. # pkt_num+1: because pkt_num starts at 0
  258. return pkt_num + 1, path_attack_pcap