Codebase list python-lsassy / a830117d-f547-48a2-9ee4-80d7c6b3096c/main lsassy / utils / utils.py
a830117d-f547-48a2-9ee4-80d7c6b3096c/main

Tree @a830117d-f547-48a2-9ee4-80d7c6b3096c/main (Download .tar.gz)

utils.py @a830117d-f547-48a2-9ee4-80d7c6b3096c/mainraw · history · blame

# Author:
#  Romain Bentz (pixis - @hackanddo)
# Website:
#  https://beta.hackndo.com

import os
import sys
import argparse

import pkg_resources
from netaddr import IPAddress, IPRange, IPNetwork, AddrFormatError

from lsassy.utils.defines import *

version = pkg_resources.require("lsassy")[0].version


def get_args():
    examples = '''example:
    lsassy -d adsec.local -u pixis -p p4ssw0rd 192.168.1.0/24
    '''

    parser = argparse.ArgumentParser(
        prog="lsassy",
        description='lsassy v{} - Remote lsass dump reader'.format(version),
        epilog=examples,
        formatter_class=argparse.RawTextHelpFormatter
    )

    group_dump = parser.add_argument_group('dump')
    group_dump.add_argument('-m', '--method', action='store', default=1, type=int, help='''Dumping method
    0: Try all methods (dll then procdump then dumpert) to dump lsass, stop on success (Requires -p if dll method fails, -u if procdump method fails)
    1: comsvcs.dll method, stop on success (default)
    2: Procdump method, stop on success (Requires -p)
    3: comsvcs.dll + Powershell method, stop on success
    4: comsvcs.dll + cmd.exe method
    5: (unsafe) dumpert method, stop on success (Requires -u)''')
    group_dump.add_argument('--dumpname', action='store', help='Name given to lsass dump (Default: Random)')
    group_dump.add_argument('--procdump', action='store', help='Procdump path')
    group_dump.add_argument('--dumpert', action='store', help='dumpert path')
    group_dump.add_argument('--threads', default=32, type=int, action='store', help='Threads number')
    group_dump.add_argument('--timeout', default=10, type=int, action='store',
                            help='Timeout before considering lsass was not dumped successfully')

    group_auth = parser.add_argument_group('authentication')
    group_auth.add_argument('-u', '--username', action='store', help='Username')
    group_auth.add_argument('-p', '--password', action='store', help='Plaintext password')
    group_auth.add_argument('-d', '--domain', default="", action='store', help='Domain name')
    group_auth.add_argument('-H', '--hashes', action='store', help='[LM:]NT hash')
    group_auth.add_argument('-k', '--kerberos', action="store_true", help='Use Kerberos authentication. Grabs credentials from ccache file '
                                                    '(KRB5CCNAME) based on target parameters. If valid credentials '
                                                    'cannot be found, it will use the ones specified in the command '
                                                    'line')
    group_auth.add_argument('-dc-ip', action='store', metavar="ip address",
                       help='IP Address of the domain controller. If omitted it will use the domain part (FQDN) specified in '
                            'the target parameter')
    group_auth.add_argument('-aesKey', action="store", metavar = "hex key", help='AES key to use for Kerberos Authentication '
                                                                    '(128 or 256 bits)')

    group_out = parser.add_argument_group('output')
    group_out.add_argument('-o', '--outfile', action='store', help='Output credentials to file')
    group_out.add_argument('-f', '--format', choices=["pretty", "json", "grep", "none"], action='store', default="pretty", help='Output format (Default pretty)')

    parser.add_argument('-r', '--raw', action='store_true',
                        help='No basic result filtering (Display host credentials, duplicates and empty pass)')
    parser.add_argument('-v', action='count', default=0, help='Verbosity level (-v or -vv)')
    parser.add_argument('-q', '--quiet', action='store_true', help='Quiet mode, only display credentials')
    parser.add_argument('-V', '--version', action='version', version='%(prog)s (version {})'.format(version))
    parser.add_argument('target', nargs='*', type=str, action='store', help='The target IP(s), range(s), CIDR(s), hostname(s), FQDN(s), file(s) containing a list of targets')

    if len(sys.argv) == 1:
        parser.print_help()
        sys.exit(RetCode(ERROR_MISSING_ARGUMENTS).error_code)

    args = parser.parse_args()

    if not args.target:
        parser.print_help()
        sys.exit(RetCode(ERROR_MISSING_ARGUMENTS).error_code)

    return args


def lsassy_exit(logger, error):
    if error.error_msg:
        logger.error(error.error_msg)
    if error.error_exception:
        logger.debug("Error : {}".format(error.error_exception))


def lsassy_warn(logger, error):
    if error.error_msg:
        logger.warn(error.error_msg)
    if error.error_exception:
        logger.debug("Error : {}".format(error.error_exception))


def is_valid_ip(ip):
    ip = ip.split(".")
    if len(ip) != 4:
        return False
    return all([0 <= int(t) <= 255 for t in ip])


def get_log_max_spaces(targets):
    return max(len(t) for t in targets) + 4


def get_log_spaces(target, spaces):
    return spaces - len(target)


def parse_targets(target):
    if '-' in target:
        ip_range = target.split('-')
        try:
            t = IPRange(ip_range[0], ip_range[1])
        except AddrFormatError:
            try:
                start_ip = IPAddress(ip_range[0])

                start_ip_words = list(start_ip.words)
                start_ip_words[-1] = ip_range[1]
                start_ip_words = [str(v) for v in start_ip_words]

                end_ip = IPAddress('.'.join(start_ip_words))

                t = IPRange(start_ip, end_ip)
            except AddrFormatError:
                t = target
    else:
        try:
            t = IPNetwork(target)
        except AddrFormatError:
            t = target
    if type(t) == IPNetwork or type(t) == IPRange:
        return list(t)
    else:
        return [t.strip()]


def get_targets(targets):
    ret_targets = []
    for target in targets:
        if os.path.exists(target):
            with open(target, 'r') as target_file:
                for target_entry in target_file:
                    ret_targets += parse_targets(target_entry)
        else:
            ret_targets += parse_targets(target)
    return [str(ip) for ip in ret_targets]


def join_jobs(jobs):
    for job in jobs:
        try:
            job.join()
        except Exception as e:
            pass


def terminate_jobs(jobs):
    for job in jobs:
        try:
            job.terminate()
        except Exception as e:
            pass