JoomlaRegPrivExploit.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. import logging
  2. from random import randint, uniform
  3. from lea import Lea
  4. from Attack import BaseAttack
  5. from Attack.AttackParameters import Parameter as Param
  6. from Attack.AttackParameters import ParameterTypes
  7. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  8. # noinspection PyPep8
  9. from scapy.utils import RawPcapReader
  10. from scapy.layers.inet import IP, Ether, TCP, RandShort
  11. class JoomlaRegPrivExploit(BaseAttack.BaseAttack):
  12. template_attack_pcap_path = "resources/joomla_registration_privesc.pcap"
  13. # HTTP port
  14. http_port = 80
  15. # Metasploit experiments show this range of ports
  16. minDefaultPort = 30000
  17. maxDefaultPort = 50000
  18. def __init__(self):
  19. """
  20. Creates a new instance of the Joomla Registeration Privileges Escalation Exploit.
  21. """
  22. # Initialize attack
  23. super(JoomlaRegPrivExploit, self).__init__("JoomlaRegPrivesc Exploit", "Injects an JoomlaRegPrivesc exploit'",
  24. "Resource Exhaustion")
  25. # Define allowed parameters and their type
  26. self.supported_params = {
  27. Param.MAC_SOURCE: ParameterTypes.TYPE_MAC_ADDRESS,
  28. Param.IP_SOURCE: ParameterTypes.TYPE_IP_ADDRESS,
  29. #Param.PORT_SOURCE: ParameterTypes.TYPE_PORT,
  30. Param.MAC_DESTINATION: ParameterTypes.TYPE_MAC_ADDRESS,
  31. Param.IP_DESTINATION: ParameterTypes.TYPE_IP_ADDRESS,
  32. Param.PORT_DESTINATION: ParameterTypes.TYPE_PORT,
  33. Param.TARGET_HOST: ParameterTypes.TYPE_DOMAIN,
  34. #Param.TARGET_URI: ParameterTypes.TYPE_URI,
  35. Param.INJECT_AT_TIMESTAMP: ParameterTypes.TYPE_FLOAT,
  36. Param.INJECT_AFTER_PACKET: ParameterTypes.TYPE_PACKET_POSITION,
  37. Param.PACKETS_PER_SECOND: ParameterTypes.TYPE_FLOAT
  38. }
  39. def init_params(self):
  40. """
  41. Initialize the parameters of this attack using the user supplied command line parameters.
  42. Use the provided statistics to calculate default parameters and to process user
  43. supplied queries.
  44. :param statistics: Reference to a statistics object.
  45. """
  46. # PARAMETERS: initialize with default utilsvalues
  47. # (values are overwritten if user specifies them)
  48. # Attacker configuration
  49. most_used_ip_address = self.statistics.get_most_used_ip_address()
  50. if isinstance(most_used_ip_address, list):
  51. most_used_ip_address = most_used_ip_address[0]
  52. self.add_param_value(Param.IP_SOURCE, most_used_ip_address)
  53. self.add_param_value(Param.MAC_SOURCE, self.statistics.get_mac_address(most_used_ip_address))
  54. #self.add_param_value(Param.PORT_SOURCE, randint(self.minDefaultPort, self.maxDefaultPort))
  55. # Victim configuration
  56. random_ip_address = self.statistics.get_random_ip_address()
  57. self.add_param_value(Param.IP_DESTINATION, random_ip_address)
  58. destination_mac = self.statistics.get_mac_address(random_ip_address)
  59. if isinstance(destination_mac, list) and len(destination_mac) == 0:
  60. destination_mac = self.generate_random_mac_address()
  61. self.add_param_value(Param.MAC_DESTINATION, destination_mac)
  62. self.add_param_value(Param.PORT_DESTINATION, self.http_port)
  63. # self.add_param_value(Param.TARGET_URI, '/')
  64. self.add_param_value(Param.TARGET_HOST, "www.hackme.com")
  65. # Attack configuration
  66. self.add_param_value(Param.INJECT_AFTER_PACKET, randint(0, self.statistics.get_packet_count()))
  67. self.add_param_value(Param.PACKETS_PER_SECOND,
  68. (self.statistics.get_pps_sent(most_used_ip_address) +
  69. self.statistics.get_pps_received(most_used_ip_address)) / 2)
  70. def generate_attack_pcap(self):
  71. def update_timestamp(timestamp, pps):
  72. """
  73. Calculates the next timestamp to be used based on the packet per second rate (pps) and the maximum delay.
  74. :return: Timestamp to be used for the next packet.
  75. """
  76. # Calculate the request timestamp
  77. # A distribution to imitate the bursty behavior of traffic
  78. randomdelay = Lea.fromValFreqsDict({1 / pps: 70, 2 / pps: 20, 5 / pps: 7, 10 / pps: 3})
  79. return timestamp + uniform(1 / pps, randomdelay.random())
  80. def getIntervalPPS(complement_interval_pps, timestamp):
  81. """
  82. Gets the packet rate (pps) in specific time interval.
  83. :return: the corresponding packet rate for packet rate (pps) .
  84. """
  85. for row in complement_interval_pps:
  86. if timestamp <= row[0]:
  87. return row[1]
  88. return complement_interval_pps[-1][1] # in case the timstamp > capture max timestamp
  89. # Timestamp
  90. timestamp_next_pkt = self.get_param_value(Param.INJECT_AT_TIMESTAMP)
  91. pps = self.get_param_value(Param.PACKETS_PER_SECOND)
  92. # Calculate complement packet rates of BG traffic per interval
  93. complement_interval_pps = self.statistics.calculate_complement_packet_rates(pps)
  94. # Initialize parameters
  95. packets = []
  96. mac_source = self.get_param_value(Param.MAC_SOURCE)
  97. ip_source = self.get_param_value(Param.IP_SOURCE)
  98. port_source = randint(self.minDefaultPort, self.maxDefaultPort) #self.get_param_value(Param.PORT_SOURCE)
  99. mac_destination = self.get_param_value(Param.MAC_DESTINATION)
  100. ip_destination = self.get_param_value(Param.IP_DESTINATION)
  101. port_destination = self.get_param_value(Param.PORT_DESTINATION)
  102. target_host = self.get_param_value(Param.TARGET_HOST)
  103. target_uri = "/" #self.get_param_value(Param.TARGET_URI)
  104. # Check ip.src == ip.dst
  105. self.ip_src_dst_equal_check(ip_source, ip_destination)
  106. path_attack_pcap = None
  107. # Set TTL based on TTL distribution of IP address
  108. source_ttl_dist = self.statistics.get_ttl_distribution(ip_source)
  109. if len(source_ttl_dist) > 0:
  110. source_ttl_prob_dict = Lea.fromValFreqsDict(source_ttl_dist)
  111. source_ttl_value = source_ttl_prob_dict.random()
  112. else:
  113. source_ttl_value = self.statistics.process_db_query("most_used(ttlValue)")
  114. destination_ttl_dist = self.statistics.get_ttl_distribution(ip_destination)
  115. if len(destination_ttl_dist) > 0:
  116. destination_ttl_prob_dict = Lea.fromValFreqsDict(destination_ttl_dist)
  117. destination_ttl_value = destination_ttl_prob_dict.random()
  118. else:
  119. destination_ttl_value = self.statistics.process_db_query("most_used(ttlValue)")
  120. # Inject Joomla_registration_privesc
  121. # Read joomla_registration_privesc pcap file
  122. orig_ip_dst = None
  123. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  124. inter_arrival_times, inter_arrival_time_dist = self.get_inter_arrival_time(exploit_raw_packets,True)
  125. timeSteps = Lea.fromValFreqsDict(inter_arrival_time_dist)
  126. exploit_raw_packets = RawPcapReader(self.template_attack_pcap_path)
  127. # Random TCP sequence numbers
  128. global attacker_seq
  129. attacker_seq = randint(1000,50000)
  130. global victim_seq
  131. victim_seq = randint(1000,50000)
  132. for pkt_num, pkt in enumerate(exploit_raw_packets):
  133. eth_frame = Ether(pkt[0])
  134. ip_pkt = eth_frame.payload
  135. tcp_pkt = ip_pkt.payload
  136. str_tcp_seg = str(tcp_pkt.payload)
  137. # Clean payloads
  138. eth_frame.payload = b''
  139. ip_pkt.payload = b''
  140. tcp_pkt.payload = b''
  141. if pkt_num == 0:
  142. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  143. if tcp_pkt.getfieldval("dport") == self.http_port:
  144. orig_ip_dst = ip_pkt.getfieldval("dst") # victim IP
  145. # Request: Attacker --> vicitm
  146. if ip_pkt.getfieldval("dst") == orig_ip_dst: # victim IP
  147. # There are 7 TCP connections with different source ports, for each of them we generate random port
  148. if tcp_pkt.getfieldval("sport") != prev_orig_port_source:
  149. port_source = randint(self.minDefaultPort, self.maxDefaultPort)
  150. prev_orig_port_source = tcp_pkt.getfieldval("sport")
  151. # New connection, new random TCP sequence numbers
  152. attacker_seq = randint(1000, 50000)
  153. victim_seq = randint(1000, 50000)
  154. # First packet in a connection has ACK = 0
  155. tcp_pkt.setfieldval("ack", 0)
  156. # Ether
  157. eth_frame.setfieldval("src", mac_source)
  158. eth_frame.setfieldval("dst", mac_destination)
  159. # IP
  160. ip_pkt.setfieldval("src", ip_source)
  161. ip_pkt.setfieldval("dst", ip_destination)
  162. ip_pkt.setfieldval("ttl", source_ttl_value)
  163. # TCP
  164. tcp_pkt.setfieldval("sport",port_source)
  165. tcp_pkt.setfieldval("dport", port_destination)
  166. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/joomla360', target_uri, orig_ip_dst, target_host)
  167. # TCP Seq, Ack
  168. if tcp_pkt.getfieldval("ack") != 0:
  169. tcp_pkt.setfieldval("ack", victim_seq)
  170. tcp_pkt.setfieldval("seq", attacker_seq)
  171. if not(tcp_pkt.getfieldval("flags") == 16 and len(str_tcp_seg) == 0): # flags=A:
  172. attacker_seq += max(len(str_tcp_seg),1)
  173. new_pkt = (eth_frame / ip_pkt/ tcp_pkt / str_tcp_seg)
  174. new_pkt.time = timestamp_next_pkt
  175. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  176. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  177. # Reply: Victim --> attacker
  178. else:
  179. # Ether
  180. eth_frame.setfieldval("src", mac_destination)
  181. eth_frame.setfieldval("dst", mac_source)
  182. # IP
  183. ip_pkt.setfieldval("src", ip_destination)
  184. ip_pkt.setfieldval("dst", ip_source)
  185. ip_pkt.setfieldval("ttl", destination_ttl_value)
  186. # TCP
  187. tcp_pkt.setfieldval("dport", port_source)
  188. tcp_pkt.setfieldval("sport", port_destination)
  189. str_tcp_seg = self.modify_http_header(str_tcp_seg, '/joomla360', target_uri, orig_ip_dst, target_host)
  190. # TCP Seq, ACK
  191. tcp_pkt.setfieldval("ack", attacker_seq)
  192. tcp_pkt.setfieldval("seq", victim_seq)
  193. strLen = len(str_tcp_seg)
  194. if not(tcp_pkt.getfieldval("flags") == 16 and strLen == 0): # flags=A:
  195. victim_seq += max(strLen, 1)
  196. new_pkt = (eth_frame / ip_pkt / tcp_pkt / str_tcp_seg)
  197. pps = max(getIntervalPPS(complement_interval_pps, timestamp_next_pkt), 10)
  198. timestamp_next_pkt = update_timestamp(timestamp_next_pkt, pps) + float(timeSteps.random())
  199. new_pkt.time = timestamp_next_pkt
  200. packets.append(new_pkt)
  201. # Store timestamp of first packet (for attack label)
  202. self.attack_start_utime = packets[0].time
  203. self.attack_end_utime = packets[-1].time
  204. if len(packets) > 0:
  205. packets = sorted(packets, key=lambda pkt: pkt.time)
  206. path_attack_pcap = self.write_attack_pcap(packets, True, path_attack_pcap)
  207. # return packets sorted by packet time_sec_start
  208. # pkt_num+1: because pkt_num starts at 0
  209. return pkt_num + 1, path_attack_pcap