257 lines
7.7 KiB
Ruby
257 lines
7.7 KiB
Ruby
# -*- coding: binary -*-
|
|
|
|
##
|
|
#
|
|
# RFB protocol support
|
|
#
|
|
# by Joshua J. Drake <jduck>
|
|
#
|
|
# Based on:
|
|
# vnc_auth_none contributed by Matteo Cantoni <goony[at]nothink.org>
|
|
# vnc_auth_login contributed by carstein <carstein.sec[at]gmail.com>
|
|
#
|
|
# TODO: determine how to detect a view-only session.
|
|
##
|
|
|
|
module Rex
|
|
module Proto
|
|
module RFB
|
|
class Client
|
|
include Rex::Proto::RFB::Constants
|
|
def initialize(sock, opts = {})
|
|
@sock = sock
|
|
@opts = opts
|
|
|
|
@banner = nil
|
|
@majver = -1
|
|
@minver = -1
|
|
@auth_types = []
|
|
end
|
|
|
|
def read_error_message
|
|
len = @sock.get_once(4)
|
|
return 'Unknown error' if !len or len.length != 4
|
|
|
|
len = len.unpack('N').first
|
|
@sock.get_once(len)
|
|
end
|
|
|
|
def handshake
|
|
@banner = @sock.get_once(12)
|
|
if !@banner
|
|
@error = 'Unable to obtain banner from server'
|
|
return false
|
|
end
|
|
|
|
# RFB Protocol Version 3.3 (1998-01)
|
|
# RFB Protocol Version 3.7 (2003-08)
|
|
# RFB Protocol Version 3.8 (2007-06)
|
|
|
|
if @banner =~ /RFB ([0-9]{3})\.([0-9]{3})/
|
|
@majver = Regexp.last_match(1).to_i
|
|
unless Constants::MajorVersions.include?(@majver)
|
|
@error = "Invalid major version number: #{@majver}"
|
|
return false
|
|
end
|
|
else
|
|
@error = "Invalid RFB banner: #{@banner}"
|
|
return false
|
|
end
|
|
|
|
@minver = Regexp.last_match(2).to_i
|
|
|
|
# Forces version 3 to be used. This adds support for version 4 servers.
|
|
# Minor version is at least 3, to work with Apple devices. Attempting to be purely dynamic
|
|
# based on the received server version can result in a 5.0 server version response
|
|
# setting the client version to 3.0 when it should be at least 3.3, so code checks for this.
|
|
# TODO: Add support for Version 4.
|
|
# Version 4 adds additional information to the packet regarding supported
|
|
# authentication types.
|
|
our_ver = format("RFB %03d.%03d\n", 3, @minver < 3 ? 8 : @minver)
|
|
@sock.put(our_ver)
|
|
|
|
true
|
|
end
|
|
|
|
def connect(password = nil)
|
|
return false if !handshake
|
|
return false if !authenticate(password)
|
|
return false if !send_client_init
|
|
|
|
true
|
|
end
|
|
|
|
def send_client_init
|
|
if @opts[:exclusive]
|
|
@sock.put("\x00") # do share.
|
|
else
|
|
@sock.put("\x01") # do share.
|
|
end
|
|
end
|
|
|
|
def authenticate(password = nil)
|
|
authenticate_with_user(nil, password)
|
|
end
|
|
|
|
def authenticate_with_user(username = nil, password = nil)
|
|
type = negotiate_authentication
|
|
authenticate_with_type(type, username, password)
|
|
end
|
|
|
|
def authenticate_with_type(type, username = nil, password = nil)
|
|
return false if !type
|
|
|
|
# Authenticate.
|
|
case type
|
|
when AuthType::None
|
|
# Nothing here.
|
|
|
|
when AuthType::VNC
|
|
return false if !negotiate_vnc_auth(password)
|
|
|
|
when AuthType::ARD
|
|
return false if !negotiate_ard_auth(username, password)
|
|
|
|
end
|
|
|
|
# Handle reading the security result message
|
|
result = @sock.get_once(4)
|
|
if !result
|
|
@error = 'Unable to read auth result'
|
|
return false
|
|
end
|
|
|
|
result = result.unpack('N').first
|
|
case result
|
|
when 0
|
|
return true
|
|
|
|
when 1
|
|
if @minver >= 8
|
|
msg = read_error_message
|
|
@error = "Authentication failed: #{msg}"
|
|
else
|
|
@error = 'Authentication failed'
|
|
end
|
|
when 2
|
|
@error = 'Too many authentication attempts'
|
|
else
|
|
@error = "Unknown authentication result: #{result}"
|
|
end
|
|
|
|
false
|
|
end
|
|
|
|
def negotiate_authentication
|
|
# Authentication type negotiation is protocol version specific.
|
|
if @minver < 7
|
|
buf = @sock.get_once(4)
|
|
if !buf
|
|
@error = 'Unable to obtain requested authentication method'
|
|
return nil
|
|
end
|
|
@auth_types = buf.unpack('N')
|
|
if !@auth_types or @auth_types.first == 0
|
|
msg = read_error_message
|
|
@error = "No authentication types available: #{msg}"
|
|
return nil
|
|
end
|
|
else
|
|
buf = @sock.get_once(1)
|
|
if !buf
|
|
@error = 'Unable to obtain supported authentication method count'
|
|
return nil
|
|
end
|
|
|
|
# first byte is number of security types
|
|
num_types = buf.unpack('C').first
|
|
if (num_types == 0)
|
|
msg = read_error_message
|
|
@error = "No authentication types available: #{msg}"
|
|
return nil
|
|
end
|
|
|
|
buf = @sock.get_once(num_types)
|
|
if !buf or buf.length != num_types
|
|
@error = 'Unable to read authentication types'
|
|
return nil
|
|
end
|
|
|
|
@auth_types = buf.unpack('C*')
|
|
end
|
|
|
|
if !@auth_types or @auth_types.length < 1
|
|
@error = 'No authentication types found'
|
|
return nil
|
|
end
|
|
|
|
# Select the one we prefer
|
|
selected = nil
|
|
selected ||= AuthType::None if @opts[:allow_none] and @auth_types.include? AuthType::None
|
|
selected ||= AuthType::VNC if @auth_types.include? AuthType::VNC
|
|
selected ||= AuthType::ARD if @auth_types.include? AuthType::ARD
|
|
|
|
if !selected
|
|
auth_strings = @auth_types.map { |i| Rex::Proto::RFB::AuthType.to_s(i) }
|
|
@error = "No supported authentication method found. All available options: #{auth_strings.join(', ')}"
|
|
return nil
|
|
end
|
|
|
|
# For 3.7 and later, clients must state which security-type to use
|
|
@sock.put([selected].pack('C')) if @minver >= 7
|
|
|
|
selected
|
|
end
|
|
|
|
def negotiate_vnc_auth(password = nil)
|
|
challenge = @sock.get_once(16)
|
|
if !challenge or challenge.length != 16
|
|
@error = 'Unable to obtain VNC challenge'
|
|
return false
|
|
end
|
|
|
|
response = Cipher.encrypt(challenge, password)
|
|
@sock.put(response)
|
|
|
|
true
|
|
end
|
|
|
|
def negotiate_ard_auth(username = nil, password = nil)
|
|
generator = @sock.get_once(2)
|
|
if !generator or generator.length != 2
|
|
@error = 'Unable to obtain ARD challenge: invalid generator value'
|
|
return false
|
|
end
|
|
generator = generator.unpack('n').first
|
|
|
|
key_length = @sock.get_once(2)
|
|
if !key_length or key_length.length != 2
|
|
@error = 'Unable to obtain ARD challenge: invalid key length'
|
|
return false
|
|
end
|
|
key_length = key_length.unpack('n').first
|
|
|
|
prime_modulus = @sock.get_once(key_length)
|
|
if !prime_modulus or prime_modulus.length != key_length
|
|
@error = 'Unable to obtain ARD challenge: invalid prime modulus'
|
|
return false
|
|
end
|
|
|
|
peer_public_key = @sock.get_once(key_length)
|
|
if !peer_public_key or peer_public_key.length != key_length
|
|
@error = 'Unable to obtain ARD challenge: invalid public key'
|
|
return false
|
|
end
|
|
|
|
response = Cipher.encrypt_ard(username, password, generator, key_length, prime_modulus, peer_public_key)
|
|
@sock.put(response)
|
|
|
|
true
|
|
end
|
|
|
|
attr_reader :error, :majver, :minver, :auth_types, :view_only
|
|
end
|
|
end
|
|
end
|
|
end
|