fscan/Plugins/SMB.go

126 lines
3.1 KiB
Go
Raw Normal View History

2020-12-29 17:17:10 +08:00
package Plugins
import (
"fmt"
2024-12-18 22:00:18 +08:00
"github.com/shadow1ng/fscan/Common"
2023-06-09 08:13:56 -04:00
"github.com/stacktitan/smb/smb"
2023-11-13 11:18:25 +08:00
"strings"
"time"
2020-12-29 17:17:10 +08:00
)
2024-12-19 16:15:53 +08:00
func SmbScan(info *Common.HostInfo) (tmperr error) {
2024-12-20 03:46:09 +08:00
if Common.DisableBrute {
2022-01-10 16:45:55 +08:00
return nil
}
2024-12-18 15:19:41 +08:00
// 遍历所有用户
2024-12-18 22:00:18 +08:00
for _, user := range Common.Userdict["smb"] {
// 遍历该用户的所有密码
2024-12-18 22:00:18 +08:00
for _, pass := range Common.Passwords {
2020-12-29 17:17:10 +08:00
pass = strings.Replace(pass, "{user}", user, -1)
success, err := doWithTimeOut(info, user, pass)
if success {
if Common.Domain != "" {
Common.LogSuccess(fmt.Sprintf("SMB认证成功 %s:%s %s\\%s:%s",
info.Host, info.Ports, Common.Domain, user, pass))
} else {
Common.LogSuccess(fmt.Sprintf("SMB认证成功 %s:%s %s:%s",
info.Host, info.Ports, user, pass))
}
return nil
}
2025-01-01 00:39:39 +08:00
if err != nil {
Common.LogError(fmt.Sprintf("SMB认证失败 %s:%s %s:%s %v",
info.Host, info.Ports, user, pass, err))
2024-12-31 20:25:54 +08:00
// 等待失败日志打印完成
time.Sleep(100 * time.Millisecond)
if strings.Contains(err.Error(), "账号锁定") {
// 账号锁定时跳过当前用户的剩余密码
break // 跳出密码循环,继续下一个用户
2021-03-30 18:12:54 +08:00
}
}
}
2024-12-31 20:25:54 +08:00
}
2025-01-01 00:39:39 +08:00
return nil
2020-12-29 17:17:10 +08:00
}
2024-12-19 16:15:53 +08:00
func SmblConn(info *Common.HostInfo, user string, pass string, signal chan struct{}) (flag bool, err error) {
2020-12-29 17:17:10 +08:00
options := smb.Options{
2024-12-18 15:19:41 +08:00
Host: info.Host,
2020-12-29 17:17:10 +08:00
Port: 445,
2024-12-18 15:19:41 +08:00
User: user,
Password: pass,
2024-12-18 22:00:18 +08:00
Domain: Common.Domain,
2020-12-29 17:17:10 +08:00
Workstation: "",
}
session, err := smb.NewSession(options, false)
if err == nil {
2024-12-18 15:19:41 +08:00
defer session.Close()
2020-12-29 17:17:10 +08:00
if session.IsAuthenticated {
return true, nil
2025-01-01 00:39:39 +08:00
}
return false, fmt.Errorf("认证失败")
2025-01-01 00:39:39 +08:00
}
// 清理错误信息中的换行符和多余空格
errMsg := strings.TrimSpace(strings.ReplaceAll(err.Error(), "\n", " "))
if strings.Contains(errMsg, "NT Status Error") {
switch {
case strings.Contains(errMsg, "STATUS_LOGON_FAILURE"):
err = fmt.Errorf("密码错误")
2025-01-01 00:39:39 +08:00
case strings.Contains(errMsg, "STATUS_ACCOUNT_LOCKED_OUT"):
err = fmt.Errorf("账号锁定")
2025-01-01 00:39:39 +08:00
case strings.Contains(errMsg, "STATUS_ACCESS_DENIED"):
err = fmt.Errorf("拒绝访问")
2025-01-01 00:39:39 +08:00
case strings.Contains(errMsg, "STATUS_ACCOUNT_DISABLED"):
err = fmt.Errorf("账号禁用")
2025-01-01 00:39:39 +08:00
case strings.Contains(errMsg, "STATUS_PASSWORD_EXPIRED"):
err = fmt.Errorf("密码过期")
2025-01-01 00:39:39 +08:00
case strings.Contains(errMsg, "STATUS_USER_SESSION_DELETED"):
return false, fmt.Errorf("会话断开")
2025-01-01 00:39:39 +08:00
default:
err = fmt.Errorf("认证失败")
2020-12-29 17:17:10 +08:00
}
}
2024-12-18 15:19:41 +08:00
2020-12-29 17:17:10 +08:00
signal <- struct{}{}
return false, err
2020-12-29 17:17:10 +08:00
}
2024-12-19 16:15:53 +08:00
func doWithTimeOut(info *Common.HostInfo, user string, pass string) (flag bool, err error) {
2025-01-01 00:39:39 +08:00
signal := make(chan struct{}, 1)
result := make(chan struct {
success bool
err error
}, 1)
2024-12-18 15:19:41 +08:00
2020-12-29 17:17:10 +08:00
go func() {
2025-01-01 00:39:39 +08:00
success, err := SmblConn(info, user, pass, signal)
select {
case result <- struct {
success bool
err error
}{success, err}:
default:
}
2020-12-29 17:17:10 +08:00
}()
2024-12-18 15:19:41 +08:00
2020-12-29 17:17:10 +08:00
select {
2025-01-01 00:39:39 +08:00
case r := <-result:
return r.success, r.err
2024-12-18 22:00:18 +08:00
case <-time.After(time.Duration(Common.Timeout) * time.Second):
2025-01-01 00:39:39 +08:00
select {
case r := <-result:
return r.success, r.err
default:
return false, fmt.Errorf("连接超时")
}
2020-12-29 17:17:10 +08:00
}
}