VaKeR CYBER ARMY
Logo of a company Server : Apache/2.4.41 (Ubuntu)
System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.33
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Directory :  /usr/share/nmap/scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/nmap/scripts/smb2-security-mode.nse
local smb = require "smb"
local smb2 = require "smb2"
local stdnse = require "stdnse"
local table = require "table"
local nmap = require "nmap"

description = [[
Determines the message signing configuration in SMBv2 servers
 for all supported dialects.

The script sends a SMB2_COM_NEGOTIATE request for each SMB2/SMB3 dialect
 and parses the security mode field to determine the message signing
 configuration of the SMB server.

References:
* https://msdn.microsoft.com/en-us/library/cc246561.aspx
]]

---
-- @usage nmap -p 445 --script smb2-security-mode <target>
-- @usage nmap -p 139 --script smb2-security-mode <target>
--
-- @output
-- | smb2-security-mode:
-- |   3.11:
-- |_    Message signing enabled but not required
--
-- @xmloutput
-- <table key="3.11">
-- <elem>Message signing enabled but not required</elem>
-- </table>
---

author = "Paulino Calderon"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"safe", "discovery", "default"}

hostrule = function(host)
  return smb.get_port(host) ~= nil
end

action = function(host,port)
  local status, smbstate, overrides
  local output = stdnse.output_table()
  overrides = overrides or {}

  local smb2_dialects = {0x0202, 0x0210, 0x0300, 0x0302, 0x0311}

  for i, dialect in pairs(smb2_dialects) do
    -- we need a clean connection for each negotiate request
    status, smbstate = smb.start(host)
    if(status == false) then
      return false, smbstate
    end
    overrides['Dialects'] = {dialect}
    status, dialect = smb2.negotiate_v2(smbstate, overrides)
    if status then
      local message_signing = {}

      -- Signing configuration. SMBv2 servers support two flags:
      -- * Message signing enabled
      -- * Message signing required
      local signing_enabled, signing_required
      if smbstate['security_mode'] & 0x01 == 0x01 then
        signing_enabled = true
      end
      if smbstate['security_mode'] & 0x02 == 0x02 then
        signing_required = true
      end

      if signing_enabled and signing_required then
        table.insert(message_signing, "Message signing enabled and required")
      elseif signing_enabled and not(signing_required) then
        table.insert(message_signing, "Message signing enabled but not required")
      elseif not(signing_enabled) and not(signing_required) then
        table.insert(message_signing, "Message signing is disabled and not required!")
      elseif not(signing_enabled) and signing_required then
        table.insert(message_signing, "Message signing is disabled!")
      end
      output[stdnse.tohex(dialect[1], {separator = ".", group = 2})] = message_signing
      -- We exit after first accepted dialect,
      --  SMB signing configuration appears to be global so
      --  there is no point of trying other dialects.
      break
    end

    smb.stop(smbstate)
    status = false
  end

  if #output>0 then
    return output
  else
    stdnse.debug1("No SMB2/SMB3 dialects were accepted.")
    if nmap.verbosity()>1 then
      return "Couldn't establish a SMBv2 connection."
    end
  end
end

VaKeR 2022