|
35 | 35 | from impacket import version
|
36 | 36 | from impacket.dcerpc.v5.samr import UF_ACCOUNTDISABLE
|
37 | 37 | from impacket.examples import logger
|
38 |
| -from impacket.examples.utils import parse_credentials |
| 38 | +from impacket.examples.utils import parse_identity, ldap_login |
39 | 39 | from impacket.ldap import ldap, ldapasn1
|
40 |
| -from impacket.smbconnection import SMBConnection, SessionError |
41 |
| - |
42 | 40 |
|
43 | 41 | class GetADUsers:
|
44 | 42 | def __init__(self, username, password, domain, cmdLineOptions):
|
@@ -73,29 +71,6 @@ def __init__(self, username, password, domain, cmdLineOptions):
|
73 | 71 | self.__colLen = [20, 30, 19, 19]
|
74 | 72 | self.__outputFormat = ' '.join(['{%d:%ds} ' % (num, width) for num, width in enumerate(self.__colLen)])
|
75 | 73 |
|
76 |
| - def getMachineName(self, target): |
77 |
| - try: |
78 |
| - s = SMBConnection(target, target) |
79 |
| - s.login('', '') |
80 |
| - except OSError as e: |
81 |
| - if str(e).find('timed out') > 0: |
82 |
| - raise Exception('The connection is timed out. Probably 445/TCP port is closed. Try to specify ' |
83 |
| - 'corresponding NetBIOS name or FQDN as the value of the -dc-host option') |
84 |
| - else: |
85 |
| - raise |
86 |
| - except SessionError as e: |
87 |
| - if str(e).find('STATUS_NOT_SUPPORTED') > 0: |
88 |
| - raise Exception('The SMB request is not supported. Probably NTLM is disabled. Try to specify ' |
89 |
| - 'corresponding NetBIOS name or FQDN as the value of the -dc-host option') |
90 |
| - else: |
91 |
| - raise |
92 |
| - except Exception: |
93 |
| - if s.getServerName() == '': |
94 |
| - raise Exception('Error while anonymous logging into %s' % target) |
95 |
| - else: |
96 |
| - s.logoff() |
97 |
| - return s.getServerName() |
98 |
| - |
99 | 74 | @staticmethod
|
100 | 75 | def getUnixTime(t):
|
101 | 76 | t -= 116444736000000000
|
@@ -135,45 +110,10 @@ def processRecord(self, item):
|
135 | 110 | pass
|
136 | 111 |
|
137 | 112 | def run(self):
|
138 |
| - if self.__kdcHost is not None: |
139 |
| - self.__target = self.__kdcHost |
140 |
| - else: |
141 |
| - if self.__kdcIP is not None: |
142 |
| - self.__target = self.__kdcIP |
143 |
| - else: |
144 |
| - self.__target = self.__domain |
145 |
| - |
146 |
| - if self.__doKerberos: |
147 |
| - logging.info('Getting machine hostname') |
148 |
| - self.__target = self.getMachineName(self.__target) |
149 |
| - |
150 | 113 | # Connect to LDAP
|
151 |
| - try: |
152 |
| - ldapConnection = ldap.LDAPConnection('ldap://%s' % self.__target, self.baseDN, self.__kdcIP) |
153 |
| - if self.__doKerberos is not True: |
154 |
| - ldapConnection.login(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash) |
155 |
| - else: |
156 |
| - ldapConnection.kerberosLogin(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, |
157 |
| - self.__aesKey, kdcHost=self.__kdcIP) |
158 |
| - except ldap.LDAPSessionError as e: |
159 |
| - if str(e).find('strongerAuthRequired') >= 0: |
160 |
| - # We need to try SSL |
161 |
| - ldapConnection = ldap.LDAPConnection('ldaps://%s' % self.__target, self.baseDN, self.__kdcIP) |
162 |
| - if self.__doKerberos is not True: |
163 |
| - ldapConnection.login(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash) |
164 |
| - else: |
165 |
| - ldapConnection.kerberosLogin(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, |
166 |
| - self.__aesKey, kdcHost=self.__kdcIP) |
167 |
| - else: |
168 |
| - if str(e).find('NTLMAuthNegotiate') >= 0: |
169 |
| - logging.critical("NTLM negotiation failed. Probably NTLM is disabled. Try to use Kerberos " |
170 |
| - "authentication instead.") |
171 |
| - else: |
172 |
| - if self.__kdcIP is not None and self.__kdcHost is not None: |
173 |
| - logging.critical("If the credentials are valid, check the hostname and IP address of KDC. They " |
174 |
| - "must match exactly each other.") |
175 |
| - raise |
176 |
| - |
| 114 | + ldapConnection = ldap_login(self.__target, self.baseDN, self.__kdcIP, self.__kdcHost, self.__doKerberos, self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, self.__aesKey) |
| 115 | + # updating "self.__target" as it may have changed in the ldap_login processing |
| 116 | + self.__target = ldapConnection._dstHost |
177 | 117 | logging.info('Querying %s for information about domain.' % self.__target)
|
178 | 118 | # Print header
|
179 | 119 | print((self.__outputFormat.format(*self.__header)))
|
@@ -240,28 +180,14 @@ def run(self):
|
240 | 180 | options = parser.parse_args()
|
241 | 181 |
|
242 | 182 | # Init the example's logger theme
|
243 |
| - logger.init(options.ts) |
| 183 | + logger.init(options.ts, options.debug) |
244 | 184 |
|
245 |
| - if options.debug is True: |
246 |
| - logging.getLogger().setLevel(logging.DEBUG) |
247 |
| - # Print the Library's installation path |
248 |
| - logging.debug(version.getInstallationPath()) |
249 |
| - else: |
250 |
| - logging.getLogger().setLevel(logging.INFO) |
251 |
| - |
252 |
| - domain, username, password = parse_credentials(options.target) |
| 185 | + domain, username, password, _, _, options.k = parse_identity(options.target, options.hashes, options.no_pass, options.aesKey, options.k) |
253 | 186 |
|
254 | 187 | if domain == '':
|
255 | 188 | logging.critical('Domain should be specified!')
|
256 | 189 | sys.exit(1)
|
257 | 190 |
|
258 |
| - if password == '' and username != '' and options.hashes is None and options.no_pass is False and options.aesKey is None: |
259 |
| - from getpass import getpass |
260 |
| - password = getpass("Password:") |
261 |
| - |
262 |
| - if options.aesKey is not None: |
263 |
| - options.k = True |
264 |
| - |
265 | 191 | try:
|
266 | 192 | executer = GetADUsers(username, password, domain, options)
|
267 | 193 | executer.run()
|
|
0 commit comments