Coverage for /pythoncovmergedfiles/medio/medio/usr/local/lib/python3.11/site-packages/scapy/layers/dcerpc.py: 47%

Shortcuts on this page

r m x   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1264 statements  

1# SPDX-License-Identifier: GPL-2.0-or-later 

2# This file is part of Scapy 

3# See https://scapy.net/ for more information 

4# Copyright (C) Gabriel Potter 

5 

6# scapy.contrib.description = DCE/RPC 

7# scapy.contrib.status = loads 

8 

9""" 

10DCE/RPC 

11Distributed Computing Environment / Remote Procedure Calls 

12 

13Based on [C706] - aka DCE/RPC 1.1 

14https://pubs.opengroup.org/onlinepubs/9629399/toc.pdf 

15 

16And on [MS-RPCE] 

17https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rpce/290c38b1-92fe-4229-91e6-4fc376610c15 

18 

19.. note:: 

20 Please read the documentation over 

21 `DCE/RPC <https://scapy.readthedocs.io/en/latest/layers/dcerpc.html>`_ 

22""" 

23 

24import collections 

25import importlib 

26import inspect 

27import struct 

28 

29from enum import IntEnum 

30from functools import partial 

31from uuid import UUID 

32 

33from scapy.base_classes import Packet_metaclass 

34 

35from scapy.config import conf 

36from scapy.compat import bytes_encode, plain_str 

37from scapy.error import log_runtime 

38from scapy.layers.dns import DNSStrField 

39from scapy.layers.ntlm import ( 

40 NTLM_Header, 

41 NTLMSSP_MESSAGE_SIGNATURE, 

42) 

43from scapy.packet import ( 

44 Packet, 

45 Raw, 

46 bind_bottom_up, 

47 bind_layers, 

48 bind_top_down, 

49 NoPayload, 

50) 

51from scapy.fields import ( 

52 _FieldContainer, 

53 BitEnumField, 

54 BitField, 

55 ByteEnumField, 

56 ByteField, 

57 ConditionalField, 

58 EnumField, 

59 Field, 

60 FieldLenField, 

61 FieldListField, 

62 FlagsField, 

63 IntField, 

64 LEIntEnumField, 

65 LEIntField, 

66 LELongField, 

67 LEShortEnumField, 

68 LEShortField, 

69 LenField, 

70 MultipleTypeField, 

71 PacketField, 

72 PacketLenField, 

73 PacketListField, 

74 PadField, 

75 ReversePadField, 

76 ShortEnumField, 

77 ShortField, 

78 SignedByteField, 

79 StrField, 

80 StrFixedLenField, 

81 StrLenField, 

82 StrLenFieldUtf16, 

83 StrNullField, 

84 StrNullFieldUtf16, 

85 TrailerField, 

86 UUIDEnumField, 

87 UUIDField, 

88 XByteField, 

89 XLEIntField, 

90 XLELongField, 

91 XLEShortField, 

92 XShortField, 

93 XStrFixedLenField, 

94) 

95from scapy.sessions import DefaultSession 

96from scapy.supersocket import StreamSocket 

97 

98from scapy.layers.kerberos import ( 

99 KRB_InnerToken, 

100 Kerberos, 

101) 

102from scapy.layers.gssapi import ( 

103 GSSAPI_BLOB, 

104 GSSAPI_BLOB_SIGNATURE, 

105 GSS_S_COMPLETE, 

106 GSS_S_FLAGS, 

107 GSS_C_FLAGS, 

108 SSP, 

109) 

110from scapy.layers.inet import TCP 

111 

112from scapy.contrib.rtps.common_types import ( 

113 EField, 

114 EPacket, 

115 EPacketField, 

116 EPacketListField, 

117) 

118 

119# Typing imports 

120from typing import ( 

121 Optional, 

122 Union, 

123) 

124 

125# the alignment of auth_pad 

126# This is 4 in [C706] 13.2.6.1 but was updated to 16 in [MS-RPCE] 2.2.2.11 

127_COMMON_AUTH_PAD = 16 

128# the alignment of the NDR Type 1 serialization private header 

129# ([MS-RPCE] sect 2.2.6.2) 

130_TYPE1_S_PAD = 8 

131 

132# DCE/RPC Packet 

133DCE_RPC_TYPE = { 

134 0: "request", 

135 1: "ping", 

136 2: "response", 

137 3: "fault", 

138 4: "working", 

139 5: "no_call", 

140 6: "reject", 

141 7: "acknowledge", 

142 8: "connectionless_cancel", 

143 9: "frag_ack", 

144 10: "cancel_ack", 

145 11: "bind", 

146 12: "bind_ack", 

147 13: "bind_nak", 

148 14: "alter_context", 

149 15: "alter_context_resp", 

150 16: "auth3", 

151 17: "shutdown", 

152 18: "co_cancel", 

153 19: "orphaned", 

154} 

155_DCE_RPC_4_FLAGS1 = [ 

156 "reserved_01", 

157 "last_frag", 

158 "frag", 

159 "no_frag_ack", 

160 "maybe", 

161 "idempotent", 

162 "broadcast", 

163 "reserved_7", 

164] 

165_DCE_RPC_4_FLAGS2 = [ 

166 "reserved_0", 

167 "cancel_pending", 

168 "reserved_2", 

169 "reserved_3", 

170 "reserved_4", 

171 "reserved_5", 

172 "reserved_6", 

173 "reserved_7", 

174] 

175DCE_RPC_TRANSFER_SYNTAXES = { 

176 UUID("00000000-0000-0000-0000-000000000000"): "NULL", 

177 UUID("6cb71c2c-9812-4540-0300-000000000000"): "Bind Time Feature Negotiation", 

178 UUID("8a885d04-1ceb-11c9-9fe8-08002b104860"): "NDR 2.0", 

179 UUID("71710533-beba-4937-8319-b5dbef9ccc36"): "NDR64", 

180} 

181DCE_RPC_INTERFACES_NAMES = {} 

182DCE_RPC_INTERFACES_NAMES_rev = {} 

183 

184 

185class DCERPC_Transport(IntEnum): 

186 """ 

187 Protocols identifiers currently supported by Scapy 

188 """ 

189 

190 NCACN_IP_TCP = 0x07 

191 NCACN_NP = 0x0F 

192 # TODO: add more.. if people use them? 

193 

194 

195# [C706] Appendix I with names from Appendix B 

196DCE_RPC_PROTOCOL_IDENTIFIERS = { 

197 0x0: "OSI OID", # Special 

198 0x0D: "UUID", # Special 

199 # Transports 

200 # 0x2: "DNA Session Control", 

201 # 0x3: "DNA Session Control V3", 

202 # 0x4: "DNA NSP Transport", 

203 # 0x5: "OSI TP4", 

204 0x06: "NCADG_OSI_CLSN", # [C706] 

205 0x07: "NCACN_IP_TCP", # [C706] 

206 0x08: "NCADG_IP_UDP", # [C706] 

207 0x09: "IP", # [C706] 

208 0x0A: "RPC connectionless protocol", # [C706] 

209 0x0B: "RPC connection-oriented protocol", # [C706] 

210 0x0C: "NCALRPC", 

211 0x0F: "NCACN_NP", # [MS-RPCE] 

212 0x11: "NCACN_NB", # [C706] 

213 0x12: "NCACN_NB_NB", # [MS-RPCE] 

214 0x13: "NCACN_SPX", # [C706] 

215 0x14: "NCADG_IPX", # [C706] 

216 0x16: "NCACN_AT_DSP", # [C706] 

217 0x17: "NCADG_AT_DSP", # [C706] 

218 0x19: "NCADG_NB", # [C706] 

219 0x1A: "NCACN_VNS_SPP", # [C706] 

220 0x1B: "NCADG_VNS_IPC", # [C706] 

221 0x1F: "NCACN_HTTP", # [MS-RPCE] 

222} 

223 

224 

225def _dce_rpc_endianness(pkt): 

226 """ 

227 Determine the right endianness sign for a given DCE/RPC packet 

228 """ 

229 if pkt.endian == 0: # big endian 

230 return ">" 

231 elif pkt.endian == 1: # little endian 

232 return "<" 

233 else: 

234 return "!" 

235 

236 

237class _EField(EField): 

238 def __init__(self, fld): 

239 super(_EField, self).__init__(fld, endianness_from=_dce_rpc_endianness) 

240 

241 

242class DceRpc(Packet): 

243 """DCE/RPC packet""" 

244 

245 @classmethod 

246 def dispatch_hook(cls, _pkt=None, *args, **kargs): 

247 if _pkt and len(_pkt) >= 1: 

248 ver = ord(_pkt[0:1]) 

249 if ver == 4: 

250 return DceRpc4 

251 elif ver == 5: 

252 return DceRpc5 

253 return DceRpc5 

254 

255 @classmethod 

256 def tcp_reassemble(cls, data, metadata, session): 

257 if data[0:1] == b"\x05": 

258 return DceRpc5.tcp_reassemble(data, metadata, session) 

259 return DceRpc(data) 

260 

261 

262bind_bottom_up(TCP, DceRpc, sport=135) 

263bind_layers(TCP, DceRpc, dport=135) 

264 

265 

266class _DceRpcPayload(Packet): 

267 @property 

268 def endianness(self): 

269 if not self.underlayer: 

270 return "!" 

271 return _dce_rpc_endianness(self.underlayer) 

272 

273 

274# sect 12.5 

275 

276_drep = [ 

277 BitEnumField("endian", 1, 4, ["big", "little"]), 

278 BitEnumField("encoding", 0, 4, ["ASCII", "EBCDIC"]), 

279 ByteEnumField("float", 0, ["IEEE", "VAX", "CRAY", "IBM"]), 

280 ByteField("reserved1", 0), 

281] 

282 

283 

284class DceRpc4(DceRpc): 

285 """ 

286 DCE/RPC v4 'connection-less' packet 

287 """ 

288 

289 name = "DCE/RPC v4" 

290 fields_desc = ( 

291 [ 

292 ByteEnumField( 

293 "rpc_vers", 4, {4: "4 (connection-less)", 5: "5 (connection-oriented)"} 

294 ), 

295 ByteEnumField("ptype", 0, DCE_RPC_TYPE), 

296 FlagsField("flags1", 0, 8, _DCE_RPC_4_FLAGS1), 

297 FlagsField("flags2", 0, 8, _DCE_RPC_4_FLAGS2), 

298 ] 

299 + _drep 

300 + [ 

301 XByteField("serial_hi", 0), 

302 _EField(UUIDField("object", None)), 

303 _EField(UUIDField("if_id", None)), 

304 _EField(UUIDField("act_id", None)), 

305 _EField(IntField("server_boot", 0)), 

306 _EField(IntField("if_vers", 1)), 

307 _EField(IntField("seqnum", 0)), 

308 _EField(ShortField("opnum", 0)), 

309 _EField(XShortField("ihint", 0xFFFF)), 

310 _EField(XShortField("ahint", 0xFFFF)), 

311 _EField(LenField("len", None, fmt="H")), 

312 _EField(ShortField("fragnum", 0)), 

313 ByteEnumField("auth_proto", 0, ["none", "OSF DCE Private Key"]), 

314 XByteField("serial_lo", 0), 

315 ] 

316 ) 

317 

318 

319# Exceptionally, we define those 3 here. 

320 

321 

322class NL_AUTH_MESSAGE(Packet): 

323 # [MS-NRPC] sect 2.2.1.3.1 

324 name = "NL_AUTH_MESSAGE" 

325 fields_desc = [ 

326 LEIntEnumField( 

327 "MessageType", 

328 0x00000000, 

329 { 

330 0x00000000: "Request", 

331 0x00000001: "Response", 

332 }, 

333 ), 

334 FlagsField( 

335 "Flags", 

336 0, 

337 -32, 

338 [ 

339 "NETBIOS_DOMAIN_NAME", 

340 "NETBIOS_COMPUTER_NAME", 

341 "DNS_DOMAIN_NAME", 

342 "DNS_HOST_NAME", 

343 "NETBIOS_COMPUTER_NAME_UTF8", 

344 ], 

345 ), 

346 ConditionalField( 

347 StrNullField("NetbiosDomainName", ""), 

348 lambda pkt: pkt.Flags.NETBIOS_DOMAIN_NAME, 

349 ), 

350 ConditionalField( 

351 StrNullField("NetbiosComputerName", ""), 

352 lambda pkt: pkt.Flags.NETBIOS_COMPUTER_NAME, 

353 ), 

354 ConditionalField( 

355 DNSStrField("DnsDomainName", ""), 

356 lambda pkt: pkt.Flags.DNS_DOMAIN_NAME, 

357 ), 

358 ConditionalField( 

359 DNSStrField("DnsHostName", ""), 

360 lambda pkt: pkt.Flags.DNS_HOST_NAME, 

361 ), 

362 ConditionalField( 

363 # What the fuck? Why are they doing this 

364 # The spec is just wrong 

365 DNSStrField("NetbiosComputerNameUtf8", ""), 

366 lambda pkt: pkt.Flags.NETBIOS_COMPUTER_NAME_UTF8, 

367 ), 

368 ] 

369 

370 

371class NL_AUTH_SIGNATURE(Packet): 

372 # [MS-NRPC] sect 2.2.1.3.2/2.2.1.3.3 

373 name = "NL_AUTH_(SHA2_)SIGNATURE" 

374 fields_desc = [ 

375 LEShortEnumField( 

376 "SignatureAlgorithm", 

377 0x0077, 

378 { 

379 0x0077: "HMAC-MD5", 

380 0x0013: "HMAC-SHA256", 

381 }, 

382 ), 

383 LEShortEnumField( 

384 "SealAlgorithm", 

385 0xFFFF, 

386 { 

387 0xFFFF: "Unencrypted", 

388 0x007A: "RC4", 

389 0x001A: "AES-128", 

390 }, 

391 ), 

392 XLEShortField("Pad", 0xFFFF), 

393 ShortField("Flags", 0), 

394 XStrFixedLenField("SequenceNumber", b"", length=8), 

395 XStrFixedLenField("Checksum", b"", length=8), 

396 ConditionalField( 

397 XStrFixedLenField("Confounder", b"", length=8), 

398 lambda pkt: pkt.SealAlgorithm != 0xFFFF, 

399 ), 

400 MultipleTypeField( 

401 [ 

402 ( 

403 StrFixedLenField("Reserved2", b"", length=24), 

404 lambda pkt: pkt.SignatureAlgorithm == 0x0013, 

405 ), 

406 ], 

407 StrField("Reserved2", b""), 

408 ), 

409 ] 

410 

411 

412# [MS-RPCE] sect 2.2.1.1.7 

413# https://learn.microsoft.com/en-us/windows/win32/rpc/authentication-service-constants 

414# rpcdce.h 

415 

416 

417class RPC_C_AUTHN(IntEnum): 

418 NONE = 0x00 

419 DCE_PRIVATE = 0x01 

420 DCE_PUBLIC = 0x02 

421 DEC_PUBLIC = 0x04 

422 GSS_NEGOTIATE = 0x09 

423 WINNT = 0x0A 

424 GSS_SCHANNEL = 0x0E 

425 GSS_KERBEROS = 0x10 

426 DPA = 0x11 

427 MSN = 0x12 

428 KERNEL = 0x14 

429 DIGEST = 0x15 

430 NEGO_EXTENDED = 0x1E 

431 PKU2U = 0x1F 

432 LIVE_SSP = 0x20 

433 LIVEXP_SSP = 0x23 

434 CLOUD_AP = 0x24 

435 NETLOGON = 0x44 

436 MSONLINE = 0x52 

437 MQ = 0x64 

438 DEFAULT = 0xFFFFFFFF 

439 

440 

441class RPC_C_AUTHN_LEVEL(IntEnum): 

442 DEFAULT = 0x0 

443 NONE = 0x1 

444 CONNECT = 0x2 

445 CALL = 0x3 

446 PKT = 0x4 

447 PKT_INTEGRITY = 0x5 

448 PKT_PRIVACY = 0x6 

449 

450 

451DCE_C_AUTHN_LEVEL = RPC_C_AUTHN_LEVEL # C706 name 

452 

453 

454class RPC_C_IMP_LEVEL(IntEnum): 

455 DEFAULT = 0x0 

456 ANONYMOUS = 0x1 

457 IDENTIFY = 0x2 

458 IMPERSONATE = 0x3 

459 DELEGATE = 0x4 

460 

461 

462# C706 sect 13.2.6.1 

463 

464 

465class CommonAuthVerifier(Packet): 

466 name = "Common Authentication Verifier" 

467 fields_desc = [ 

468 ByteEnumField( 

469 "auth_type", 

470 0, 

471 RPC_C_AUTHN, 

472 ), 

473 ByteEnumField("auth_level", 0, RPC_C_AUTHN_LEVEL), 

474 ByteField("auth_pad_length", None), 

475 ByteField("auth_reserved", 0), 

476 XLEIntField("auth_context_id", 0), 

477 MultipleTypeField( 

478 [ 

479 # SPNEGO 

480 ( 

481 PacketLenField( 

482 "auth_value", 

483 GSSAPI_BLOB(), 

484 GSSAPI_BLOB, 

485 length_from=lambda pkt: pkt.parent.auth_len, 

486 ), 

487 lambda pkt: pkt.auth_type == 0x09 and pkt.parent and 

488 # Bind/Alter 

489 pkt.parent.ptype in [11, 12, 13, 14, 15, 16], 

490 ), 

491 ( 

492 PacketLenField( 

493 "auth_value", 

494 GSSAPI_BLOB_SIGNATURE(), 

495 GSSAPI_BLOB_SIGNATURE, 

496 length_from=lambda pkt: pkt.parent.auth_len, 

497 ), 

498 lambda pkt: pkt.auth_type == 0x09 

499 and pkt.parent 

500 and ( 

501 # Other 

502 not pkt.parent 

503 or pkt.parent.ptype not in [11, 12, 13, 14, 15, 16] 

504 ), 

505 ), 

506 # Kerberos 

507 ( 

508 PacketLenField( 

509 "auth_value", 

510 Kerberos(), 

511 Kerberos, 

512 length_from=lambda pkt: pkt.parent.auth_len, 

513 ), 

514 lambda pkt: pkt.auth_type == 0x10 and pkt.parent and 

515 # Bind/Alter 

516 pkt.parent.ptype in [11, 12, 13, 14, 15, 16], 

517 ), 

518 ( 

519 PacketLenField( 

520 "auth_value", 

521 KRB_InnerToken(), 

522 KRB_InnerToken, 

523 length_from=lambda pkt: pkt.parent.auth_len, 

524 ), 

525 lambda pkt: pkt.auth_type == 0x10 

526 and pkt.parent 

527 and ( 

528 # Other 

529 not pkt.parent 

530 or pkt.parent.ptype not in [11, 12, 13, 14, 15, 16] 

531 ), 

532 ), 

533 # NTLM 

534 ( 

535 PacketLenField( 

536 "auth_value", 

537 NTLM_Header(), 

538 NTLM_Header, 

539 length_from=lambda pkt: pkt.parent.auth_len, 

540 ), 

541 lambda pkt: pkt.auth_type in [0x0A, 0xFF] and pkt.parent and 

542 # Bind/Alter 

543 pkt.parent.ptype in [11, 12, 13, 14, 15, 16], 

544 ), 

545 ( 

546 PacketLenField( 

547 "auth_value", 

548 NTLMSSP_MESSAGE_SIGNATURE(), 

549 NTLMSSP_MESSAGE_SIGNATURE, 

550 length_from=lambda pkt: pkt.parent.auth_len, 

551 ), 

552 lambda pkt: pkt.auth_type in [0x0A, 0xFF] 

553 and pkt.parent 

554 and ( 

555 # Other 

556 not pkt.parent 

557 or pkt.parent.ptype not in [11, 12, 13, 14, 15, 16] 

558 ), 

559 ), 

560 # NetLogon 

561 ( 

562 PacketLenField( 

563 "auth_value", 

564 NL_AUTH_MESSAGE(), 

565 NL_AUTH_MESSAGE, 

566 length_from=lambda pkt: pkt.parent.auth_len, 

567 ), 

568 lambda pkt: pkt.auth_type == 0x44 and pkt.parent and 

569 # Bind/Alter 

570 pkt.parent.ptype in [11, 12, 13, 14, 15], 

571 ), 

572 ( 

573 PacketLenField( 

574 "auth_value", 

575 NL_AUTH_SIGNATURE(), 

576 NL_AUTH_SIGNATURE, 

577 length_from=lambda pkt: pkt.parent.auth_len, 

578 ), 

579 lambda pkt: pkt.auth_type == 0x44 

580 and ( 

581 # Other 

582 not pkt.parent 

583 or pkt.parent.ptype not in [11, 12, 13, 14, 15] 

584 ), 

585 ), 

586 ], 

587 PacketLenField( 

588 "auth_value", 

589 None, 

590 conf.raw_layer, 

591 length_from=lambda pkt: pkt.parent and pkt.parent.auth_len or 0, 

592 ), 

593 ), 

594 ] 

595 

596 def is_protected(self): 

597 if not self.auth_value: 

598 return False 

599 if self.parent and self.parent.ptype in [11, 12, 13, 14, 15, 16]: 

600 return False 

601 return True 

602 

603 def is_ssp(self): 

604 if not self.auth_value: 

605 return False 

606 if self.parent and self.parent.ptype not in [11, 12, 13, 14, 15, 16]: 

607 return False 

608 return True 

609 

610 def default_payload_class(self, pkt): 

611 return conf.padding_layer 

612 

613 

614# [MS-RPCE] sect 2.2.2.13 - Verification Trailer 

615_SECTRAILER_MAGIC = b"\x8a\xe3\x13\x71\x02\xf4\x36\x71" 

616 

617 

618class DceRpcSecVTCommand(Packet): 

619 name = "Verification trailer command" 

620 fields_desc = [ 

621 BitField("SEC_VT_MUST_PROCESS_COMMAND", 0, 1, tot_size=-2), 

622 BitField("SEC_VT_COMMAND_END", 0, 1), 

623 BitEnumField( 

624 "Command", 

625 0, 

626 -14, 

627 { 

628 0x0001: "SEC_VT_COMMAND_BITMASK_1", 

629 0x0002: "SEC_VT_COMMAND_PCONTEXT", 

630 0x0003: "SEC_VT_COMMAND_HEADER2", 

631 }, 

632 end_tot_size=-2, 

633 ), 

634 LenField("Length", None, fmt="<H"), 

635 ] 

636 

637 

638# [MS-RPCE] sect 2.2.2.13.2 

639 

640 

641class DceRpcSecVTBitmask(Packet): 

642 name = "rpc_sec_vt_bitmask" 

643 fields_desc = [ 

644 LEIntField("bits", 1), 

645 ] 

646 

647 def default_payload_class(self, pkt): 

648 return conf.padding_layer 

649 

650 

651bind_layers(DceRpcSecVTCommand, DceRpcSecVTBitmask, Command=0x0001) 

652 

653 

654# [MS-RPCE] sect 2.2.2.13.4 

655 

656 

657class DceRpcSecVTPcontext(Packet): 

658 name = "rpc_sec_vt_pcontext" 

659 fields_desc = [ 

660 UUIDEnumField( 

661 "InterfaceId", 

662 None, 

663 ( 

664 DCE_RPC_INTERFACES_NAMES.get, 

665 lambda x: DCE_RPC_INTERFACES_NAMES_rev.get(x.lower()), 

666 ), 

667 uuid_fmt=UUIDField.FORMAT_LE, 

668 ), 

669 LEIntField("Version", 0), 

670 UUIDEnumField( 

671 "TransferSyntax", 

672 None, 

673 DCE_RPC_TRANSFER_SYNTAXES, 

674 uuid_fmt=UUIDField.FORMAT_LE, 

675 ), 

676 LEIntField("TransferVersion", 0), 

677 ] 

678 

679 def default_payload_class(self, pkt): 

680 return conf.padding_layer 

681 

682 

683bind_layers(DceRpcSecVTCommand, DceRpcSecVTPcontext, Command=0x0002) 

684 

685 

686# [MS-RPCE] sect 2.2.2.13.3 

687 

688 

689class DceRpcSecVTHeader2(Packet): 

690 name = "rpc_sec_vt_header2" 

691 fields_desc = [ 

692 ByteField("PTYPE", 0), 

693 ByteField("Reserved1", 0), 

694 LEShortField("Reserved2", 0), 

695 LEIntField("drep", 0), 

696 LEIntField("call_id", 0), 

697 LEShortField("p_cont_id", 0), 

698 LEShortField("opnum", 0), 

699 ] 

700 

701 def default_payload_class(self, pkt): 

702 return conf.padding_layer 

703 

704 

705bind_layers(DceRpcSecVTCommand, DceRpcSecVTHeader2, Command=0x0003) 

706 

707 

708class DceRpcSecVT(Packet): 

709 name = "Verification trailer" 

710 fields_desc = [ 

711 XStrFixedLenField("rpc_sec_verification_trailer", _SECTRAILER_MAGIC, length=8), 

712 PacketListField("commands", [], DceRpcSecVTCommand), 

713 ] 

714 

715 

716class _VerifTrailerField(PacketField): 

717 def getfield( 

718 self, 

719 pkt, 

720 s, 

721 ): 

722 if _SECTRAILER_MAGIC in s: 

723 # a bit ugly 

724 ind = s.index(_SECTRAILER_MAGIC) 

725 sectrailer_bytes, remain = bytes(s[:-ind]), bytes(s[-ind:]) 

726 vt_trailer = self.m2i(pkt, sectrailer_bytes) 

727 if not isinstance(vt_trailer.payload, NoPayload): 

728 # bad parse 

729 return s, None 

730 return remain, vt_trailer 

731 return s, None 

732 

733 

734# sect 12.6.3 

735 

736 

737_DCE_RPC_5_FLAGS = { 

738 0x01: "PFC_FIRST_FRAG", 

739 0x02: "PFC_LAST_FRAG", 

740 0x04: "PFC_PENDING_CANCEL", 

741 0x08: "PFC_RESERVED_1", 

742 0x10: "PFC_CONC_MPX", 

743 0x20: "PFC_DID_NOT_EXECUTE", 

744 0x40: "PFC_MAYBE", 

745 0x80: "PFC_OBJECT_UUID", 

746} 

747 

748# [MS-RPCE] sect 2.2.2.3 

749 

750_DCE_RPC_5_FLAGS_2 = _DCE_RPC_5_FLAGS.copy() 

751_DCE_RPC_5_FLAGS_2[0x04] = "PFC_SUPPORT_HEADER_SIGN" 

752 

753 

754_DCE_RPC_ERROR_CODES = { 

755 # Win32 

756 0x776: "OR_INVALID_OXID", 

757 0x777: "OR_INVALID_OID", 

758 0x778: "OR_INVALID_SET", 

759 # Appendix N 

760 0x1C010001: "nca_s_comm_failure", 

761 0x1C010002: "nca_s_op_rng_error", 

762 0x1C010003: "nca_s_unk_if", 

763 0x1C010006: "nca_s_wrong_boot_time", 

764 0x1C010009: "nca_s_you_crashed", 

765 0x1C01000B: "nca_s_proto_error", 

766 0x1C010013: "nca_s_out_args_too_big", 

767 0x1C010014: "nca_s_server_too_busy", 

768 0x1C010015: "nca_s_fault_string_too_long", 

769 0x1C010017: "nca_s_unsupported_type", 

770 0x1C000001: "nca_s_fault_int_div_by_zero", 

771 0x1C000002: "nca_s_fault_addr_error", 

772 0x1C000003: "nca_s_fault_fp_div_zero", 

773 0x1C000004: "nca_s_fault_fp_underflow", 

774 0x1C000005: "nca_s_fault_fp_overflow", 

775 0x1C000006: "nca_s_fault_invalid_tag", 

776 0x1C000007: "nca_s_fault_invalid_bound", 

777 0x1C000008: "nca_s_rpc_version_mismatch", 

778 0x1C000009: "nca_s_unspec_reject", 

779 0x1C00000A: "nca_s_bad_actid", 

780 0x1C00000B: "nca_s_who_are_you_failed", 

781 0x1C00000C: "nca_s_manager_not_entered", 

782 0x1C00000D: "nca_s_fault_cancel", 

783 0x1C00000E: "nca_s_fault_ill_inst", 

784 0x1C00000F: "nca_s_fault_fp_error", 

785 0x1C000010: "nca_s_fault_int_overflow", 

786 0x1C000012: "nca_s_fault_unspec", 

787 0x1C000013: "nca_s_fault_remote_comm_failure", 

788 0x1C000014: "nca_s_fault_pipe_empty", 

789 0x1C000015: "nca_s_fault_pipe_closed", 

790 0x1C000016: "nca_s_fault_pipe_order", 

791 0x1C000017: "nca_s_fault_pipe_discipline", 

792 0x1C000018: "nca_s_fault_pipe_comm_error", 

793 0x1C000019: "nca_s_fault_pipe_memory", 

794 0x1C00001A: "nca_s_fault_context_mismatch", 

795 0x1C00001B: "nca_s_fault_remote_no_memory", 

796 0x1C00001C: "nca_s_invalid_pres_context_id", 

797 0x1C00001D: "nca_s_unsupported_authn_level", 

798 0x1C00001F: "nca_s_invalid_checksum", 

799 0x1C000020: "nca_s_invalid_crc", 

800 0x1C000021: "nca_s_fault_user_defined", 

801 0x1C000022: "nca_s_fault_tx_open_failed", 

802 0x1C000023: "nca_s_fault_codeset_conv_error", 

803 0x1C000024: "nca_s_fault_object_not_found", 

804 0x1C000025: "nca_s_fault_no_client_stub", 

805 # [MS-ERREF] 

806 0x000006D3: "RPC_S_UNKNOWN_AUTHN_SERVICE", 

807 0x000006D8: "EPT_S_CANT_PERFORM_OP", 

808 0x000006F7: "RPC_X_BAD_STUB_DATA", 

809 0x00000719: "RPC_S_NO_INTERFACES", 

810 0x0000071A: "RPC_S_CALL_CANCELLED", 

811 0x0000071B: "RPC_S_BINDING_INCOMPLETE", 

812 0x0000071C: "RPC_S_COMM_FAILURE", 

813 0x0000071D: "RPC_S_UNSUPPORTED_AUTHN_LEVEL", 

814 0x0000071E: "RPC_S_NO_PRINC_NAME", 

815 0x0000071F: "RPC_S_NOT_RPC_ERROR", 

816 0x00000720: "RPC_S_UUID_LOCAL_ONLY", 

817 0x00000721: "RPC_S_SEC_PKG_ERROR", 

818 0x00000722: "RPC_S_NOT_CANCELLED", 

819 0x0000076A: "RPC_S_GROUP_MEMBER_NOT_FOUND", 

820 0x0000076C: "RPC_S_INVALID_OBJECT", 

821 0x80004002: "E_NOINTERFACE", 

822 0x80010107: "RPC_E_INVALIDMETHOD", 

823 0x80010108: "RPC_E_DISCONNECTED", 

824 0x80010109: "RPC_E_RETRY", 

825 0x80040153: "REGDB_E_INVALIDVALUE", 

826 0x80040154: "REGDB_E_CLASSNOTREG", 

827 0x80040155: "REGDB_E_IIDNOTREG", 

828 0x800706F7: "COM_X_BAD_STUB_DATA", 

829} 

830 

831_DCE_RPC_REJECTION_REASONS = { 

832 0: "REASON_NOT_SPECIFIED", 

833 1: "TEMPORARY_CONGESTION", 

834 2: "LOCAL_LIMIT_EXCEEDED", 

835 3: "CALLED_PADDR_UNKNOWN", 

836 4: "PROTOCOL_VERSION_NOT_SUPPORTED", 

837 5: "DEFAULT_CONTEXT_NOT_SUPPORTED", 

838 6: "USER_DATA_NOT_READABLE", 

839 7: "NO_PSAP_AVAILABLE", 

840 8: "AUTHENTICATION_TYPE_NOT_RECOGNIZED", 

841 9: "INVALID_CHECKSUM", 

842} 

843 

844 

845class DceRpc5(DceRpc): 

846 """ 

847 DCE/RPC v5 'connection-oriented' packet 

848 """ 

849 

850 name = "DCE/RPC v5" 

851 fields_desc = ( 

852 [ 

853 ByteEnumField( 

854 "rpc_vers", 5, {4: "4 (connection-less)", 5: "5 (connection-oriented)"} 

855 ), 

856 ByteField("rpc_vers_minor", 0), 

857 ByteEnumField("ptype", 0, DCE_RPC_TYPE), 

858 MultipleTypeField( 

859 # [MS-RPCE] sect 2.2.2.3 

860 [ 

861 ( 

862 FlagsField("pfc_flags", 0x3, 8, _DCE_RPC_5_FLAGS_2), 

863 lambda pkt: pkt.ptype in [11, 12, 13, 14, 15, 16], 

864 ) 

865 ], 

866 FlagsField("pfc_flags", 0x3, 8, _DCE_RPC_5_FLAGS), 

867 ), 

868 ] 

869 + _drep 

870 + [ 

871 ByteField("reserved2", 0), 

872 _EField(ShortField("frag_len", None)), 

873 _EField( 

874 FieldLenField( 

875 "auth_len", 

876 None, 

877 fmt="H", 

878 length_of="auth_verifier", 

879 adjust=lambda _, x: 0 if not x else (x - 8), 

880 ) 

881 ), 

882 _EField(IntField("call_id", None)), 

883 # Now let's proceed with trailer fields, i.e. at the end of the PACKET 

884 # (below all payloads, etc.). Have a look at Figure 3 in sect 2.2.2.13 

885 # of [MS-RPCE] but note the following: 

886 # - auth_verifier includes sec_trailer + the authentication token 

887 # - auth_padding is the authentication padding 

888 # - vt_trailer is the verification trailer 

889 ConditionalField( 

890 TrailerField( 

891 PacketLenField( 

892 "auth_verifier", 

893 None, 

894 CommonAuthVerifier, 

895 length_from=lambda pkt: pkt.auth_len + 8, 

896 ) 

897 ), 

898 lambda pkt: pkt.auth_len != 0, 

899 ), 

900 ConditionalField( 

901 TrailerField( 

902 StrLenField( 

903 "auth_padding", 

904 None, 

905 length_from=lambda pkt: pkt.auth_verifier.auth_pad_length, 

906 ) 

907 ), 

908 lambda pkt: pkt.auth_len != 0, 

909 ), 

910 TrailerField( 

911 _VerifTrailerField("vt_trailer", None, DceRpcSecVT), 

912 ), 

913 ] 

914 ) 

915 

916 def do_dissect(self, s): 

917 # Overload do_dissect to only include the current layer in dissection. 

918 # This allows to support TrailerFields, even in the case where multiple DceRpc5 

919 # packets are concatenated 

920 frag_len = self.get_field("frag_len").getfield(self, s[8:10])[1] 

921 s, remain = s[:frag_len], s[frag_len:] 

922 return super(DceRpc5, self).do_dissect(s) + remain 

923 

924 def extract_padding(self, s): 

925 # Now, take any data that doesn't fit in the current fragment and make it 

926 # padding. The caller is responsible for looking for eventual padding and 

927 # creating the next fragment, etc. 

928 pay_len = self.frag_len - len(self.original) + len(s) 

929 return s[:pay_len], s[pay_len:] 

930 

931 def post_build(self, pkt, pay): 

932 if ( 

933 self.auth_verifier 

934 and self.auth_padding is None 

935 and self.auth_verifier.auth_pad_length is None 

936 ): 

937 # Compute auth_len and add padding 

938 auth_len = self.get_field("auth_len").getfield(self, pkt[10:12])[1] + 8 

939 auth_verifier, pay = pay[-auth_len:], pay[:-auth_len] 

940 pdu_len = len(pay) 

941 if self.payload: 

942 pdu_len -= len(self.payload.self_build()) 

943 padlen = (-pdu_len) % _COMMON_AUTH_PAD 

944 auth_verifier = ( 

945 auth_verifier[:2] + struct.pack("B", padlen) + auth_verifier[3:] 

946 ) 

947 pay = pay + (padlen * b"\x00") + auth_verifier 

948 if self.frag_len is None: 

949 # Compute frag_len 

950 length = len(pkt) + len(pay) 

951 pkt = ( 

952 pkt[:8] 

953 + self.get_field("frag_len").addfield(self, b"", length) 

954 + pkt[10:] 

955 ) 

956 return pkt + pay 

957 

958 def answers(self, pkt): 

959 return isinstance(pkt, DceRpc5) and pkt[DceRpc5].call_id == self.call_id 

960 

961 @classmethod 

962 def tcp_reassemble(cls, data, _, session): 

963 if data[0:1] != b"\x05": 

964 return 

965 endian = struct.unpack("!B", data[4:5])[0] >> 4 

966 if endian not in [0, 1]: 

967 return 

968 length = struct.unpack(("<" if endian else ">") + "H", data[8:10])[0] 

969 if len(data) >= length: 

970 if conf.dcerpc_session_enable: 

971 # If DCE/RPC sessions are enabled, use them ! 

972 if "dcerpcsess" not in session: 

973 session["dcerpcsess"] = dcerpcsess = DceRpcSession() 

974 else: 

975 dcerpcsess = session["dcerpcsess"] 

976 return dcerpcsess.process(DceRpc5(data)) 

977 return DceRpc5(data) 

978 

979 

980# sec 12.6.3.1 

981 

982 

983class DceRpc5AbstractSyntax(EPacket): 

984 name = "Presentation Syntax (p_syntax_id_t)" 

985 fields_desc = [ 

986 _EField( 

987 UUIDEnumField( 

988 "if_uuid", 

989 None, 

990 ( 

991 # Those are dynamic 

992 DCE_RPC_INTERFACES_NAMES.get, 

993 lambda x: DCE_RPC_INTERFACES_NAMES_rev.get(x.lower()), 

994 ), 

995 ) 

996 ), 

997 _EField(IntField("if_version", 3)), 

998 ] 

999 

1000 

1001class DceRpc5TransferSyntax(EPacket): 

1002 name = "Presentation Transfer Syntax (p_syntax_id_t)" 

1003 fields_desc = [ 

1004 _EField( 

1005 UUIDEnumField( 

1006 "if_uuid", 

1007 None, 

1008 DCE_RPC_TRANSFER_SYNTAXES, 

1009 ) 

1010 ), 

1011 _EField(IntField("if_version", 3)), 

1012 ] 

1013 

1014 

1015class DceRpc5Context(EPacket): 

1016 name = "Presentation Context (p_cont_elem_t)" 

1017 fields_desc = [ 

1018 _EField(ShortField("cont_id", 0)), 

1019 FieldLenField("n_transfer_syn", None, count_of="transfer_syntaxes", fmt="B"), 

1020 ByteField("reserved", 0), 

1021 EPacketField("abstract_syntax", None, DceRpc5AbstractSyntax), 

1022 EPacketListField( 

1023 "transfer_syntaxes", 

1024 None, 

1025 DceRpc5TransferSyntax, 

1026 count_from=lambda pkt: pkt.n_transfer_syn, 

1027 endianness_from=_dce_rpc_endianness, 

1028 ), 

1029 ] 

1030 

1031 

1032class DceRpc5Result(EPacket): 

1033 name = "Context negotiation Result" 

1034 fields_desc = [ 

1035 _EField( 

1036 ShortEnumField( 

1037 "result", 0, ["acceptance", "user_rejection", "provider_rejection"] 

1038 ) 

1039 ), 

1040 _EField( 

1041 ShortEnumField( 

1042 "reason", 

1043 0, 

1044 _DCE_RPC_REJECTION_REASONS, 

1045 ) 

1046 ), 

1047 EPacketField("transfer_syntax", None, DceRpc5TransferSyntax), 

1048 ] 

1049 

1050 

1051class DceRpc5PortAny(EPacket): 

1052 name = "Port Any (port_any_t)" 

1053 fields_desc = [ 

1054 _EField(FieldLenField("length", None, length_of="port_spec", fmt="H")), 

1055 _EField(StrLenField("port_spec", b"", length_from=lambda pkt: pkt.length)), 

1056 ] 

1057 

1058 

1059# sec 12.6.4.3 

1060 

1061 

1062class DceRpc5Bind(_DceRpcPayload): 

1063 name = "DCE/RPC v5 - Bind" 

1064 fields_desc = [ 

1065 _EField(ShortField("max_xmit_frag", 5840)), 

1066 _EField(ShortField("max_recv_frag", 8192)), 

1067 _EField(IntField("assoc_group_id", 0)), 

1068 # p_cont_list_t 

1069 _EField( 

1070 FieldLenField("n_context_elem", None, count_of="context_elem", fmt="B") 

1071 ), 

1072 StrFixedLenField("reserved", 0, length=3), 

1073 EPacketListField( 

1074 "context_elem", 

1075 [], 

1076 DceRpc5Context, 

1077 endianness_from=_dce_rpc_endianness, 

1078 count_from=lambda pkt: pkt.n_context_elem, 

1079 ), 

1080 ] 

1081 

1082 

1083bind_layers(DceRpc5, DceRpc5Bind, ptype=11) 

1084 

1085# sec 12.6.4.4 

1086 

1087 

1088class DceRpc5BindAck(_DceRpcPayload): 

1089 name = "DCE/RPC v5 - Bind Ack" 

1090 fields_desc = [ 

1091 _EField(ShortField("max_xmit_frag", 5840)), 

1092 _EField(ShortField("max_recv_frag", 8192)), 

1093 _EField(IntField("assoc_group_id", 0)), 

1094 PadField( 

1095 EPacketField("sec_addr", None, DceRpc5PortAny), 

1096 align=4, 

1097 ), 

1098 # p_result_list_t 

1099 _EField(FieldLenField("n_results", None, count_of="results", fmt="B")), 

1100 StrFixedLenField("reserved", 0, length=3), 

1101 EPacketListField( 

1102 "results", 

1103 [], 

1104 DceRpc5Result, 

1105 endianness_from=_dce_rpc_endianness, 

1106 count_from=lambda pkt: pkt.n_results, 

1107 ), 

1108 ] 

1109 

1110 

1111bind_layers(DceRpc5, DceRpc5BindAck, ptype=12) 

1112 

1113# sec 12.6.4.5 

1114 

1115 

1116class DceRpc5Version(EPacket): 

1117 name = "version_t" 

1118 fields_desc = [ 

1119 ByteField("major", 0), 

1120 ByteField("minor", 0), 

1121 ] 

1122 

1123 

1124class DceRpc5BindNak(_DceRpcPayload): 

1125 name = "DCE/RPC v5 - Bind Nak" 

1126 fields_desc = [ 

1127 _EField( 

1128 ShortEnumField("provider_reject_reason", 0, _DCE_RPC_REJECTION_REASONS) 

1129 ), 

1130 # p_rt_versions_supported_t 

1131 _EField(FieldLenField("n_protocols", None, count_of="protocols", fmt="B")), 

1132 EPacketListField( 

1133 "protocols", 

1134 [], 

1135 DceRpc5Version, 

1136 count_from=lambda pkt: pkt.n_protocols, 

1137 endianness_from=_dce_rpc_endianness, 

1138 ), 

1139 # [MS-RPCE] sect 2.2.2.9 

1140 ConditionalField( 

1141 ReversePadField( 

1142 _EField( 

1143 UUIDEnumField( 

1144 "signature", 

1145 None, 

1146 { 

1147 UUID( 

1148 "90740320-fad0-11d3-82d7-009027b130ab" 

1149 ): "Extended Error", 

1150 }, 

1151 ) 

1152 ), 

1153 align=8, 

1154 ), 

1155 lambda pkt: pkt.fields.get("signature", None) 

1156 or ( 

1157 pkt.underlayer 

1158 and pkt.underlayer.frag_len >= 24 + pkt.n_protocols * 2 + 16 

1159 ), 

1160 ), 

1161 ] 

1162 

1163 

1164bind_layers(DceRpc5, DceRpc5BindNak, ptype=13) 

1165 

1166 

1167# sec 12.6.4.1 

1168 

1169 

1170class DceRpc5AlterContext(_DceRpcPayload): 

1171 name = "DCE/RPC v5 - AlterContext" 

1172 fields_desc = DceRpc5Bind.fields_desc 

1173 

1174 

1175bind_layers(DceRpc5, DceRpc5AlterContext, ptype=14) 

1176 

1177 

1178# sec 12.6.4.2 

1179 

1180 

1181class DceRpc5AlterContextResp(_DceRpcPayload): 

1182 name = "DCE/RPC v5 - AlterContextResp" 

1183 fields_desc = DceRpc5BindAck.fields_desc 

1184 

1185 

1186bind_layers(DceRpc5, DceRpc5AlterContextResp, ptype=15) 

1187 

1188# [MS-RPCE] sect 2.2.2.10 - rpc_auth_3 

1189 

1190 

1191class DceRpc5Auth3(Packet): 

1192 name = "DCE/RPC v5 - Auth3" 

1193 fields_desc = [StrFixedLenField("pad", b"", length=4)] 

1194 

1195 

1196bind_layers(DceRpc5, DceRpc5Auth3, ptype=16) 

1197 

1198# sec 12.6.4.7 

1199 

1200 

1201class DceRpc5Fault(_DceRpcPayload): 

1202 name = "DCE/RPC v5 - Fault" 

1203 fields_desc = [ 

1204 _EField(IntField("alloc_hint", 0)), 

1205 _EField(ShortField("cont_id", 0)), 

1206 ByteField("cancel_count", 0), 

1207 FlagsField("reserved", 0, -8, {0x1: "RPC extended error"}), 

1208 _EField(LEIntEnumField("status", 0, _DCE_RPC_ERROR_CODES)), 

1209 IntField("reserved2", 0), 

1210 ] 

1211 

1212 

1213bind_layers(DceRpc5, DceRpc5Fault, ptype=3) 

1214 

1215 

1216# sec 12.6.4.9 

1217 

1218 

1219class DceRpc5Request(_DceRpcPayload): 

1220 name = "DCE/RPC v5 - Request" 

1221 fields_desc = [ 

1222 _EField(IntField("alloc_hint", 0)), 

1223 _EField(ShortField("cont_id", 0)), 

1224 _EField(ShortField("opnum", 0)), 

1225 ConditionalField( 

1226 PadField( 

1227 _EField(UUIDField("object", None)), 

1228 align=8, 

1229 ), 

1230 lambda pkt: pkt.underlayer and pkt.underlayer.pfc_flags.PFC_OBJECT_UUID, 

1231 ), 

1232 ] 

1233 

1234 

1235bind_layers(DceRpc5, DceRpc5Request, ptype=0) 

1236 

1237# sec 12.6.4.10 

1238 

1239 

1240class DceRpc5Response(_DceRpcPayload): 

1241 name = "DCE/RPC v5 - Response" 

1242 fields_desc = [ 

1243 _EField(IntField("alloc_hint", 0)), 

1244 _EField(ShortField("cont_id", 0)), 

1245 ByteField("cancel_count", 0), 

1246 ByteField("reserved", 0), 

1247 ] 

1248 

1249 

1250bind_layers(DceRpc5, DceRpc5Response, ptype=2) 

1251 

1252# --- API 

1253 

1254DceRpcOp = collections.namedtuple("DceRpcOp", ["request", "response"]) 

1255DCE_RPC_INTERFACES = {} 

1256 

1257 

1258class DceRpcInterface: 

1259 def __init__(self, name, uuid, version_tuple, if_version, opnums): 

1260 self.name = name 

1261 self.uuid = uuid 

1262 self.major_version, self.minor_version = version_tuple 

1263 self.if_version = if_version 

1264 self.opnums = opnums 

1265 

1266 def __repr__(self): 

1267 return "<DCE/RPC Interface %s v%s.%s>" % ( 

1268 self.name, 

1269 self.major_version, 

1270 self.minor_version, 

1271 ) 

1272 

1273 

1274def register_dcerpc_interface(name, uuid, version, opnums): 

1275 """ 

1276 Register a DCE/RPC interface 

1277 """ 

1278 version_tuple = tuple(map(int, version.split("."))) 

1279 assert len(version_tuple) == 2, "Version should be in format 'X.X' !" 

1280 if_version = (version_tuple[1] << 16) + version_tuple[0] 

1281 if (uuid, if_version) in DCE_RPC_INTERFACES: 

1282 # Interface is already registered. 

1283 interface = DCE_RPC_INTERFACES[(uuid, if_version)] 

1284 if interface.name == name: 

1285 if set(opnums) - set(interface.opnums): 

1286 # Interface is an extension of a previous interface 

1287 interface.opnums.update(opnums) 

1288 else: 

1289 log_runtime.warning( 

1290 "This interface is already registered: %s. Skip" % interface 

1291 ) 

1292 return 

1293 else: 

1294 raise ValueError( 

1295 "An interface with the same UUID is already registered: %s" % interface 

1296 ) 

1297 else: 

1298 # New interface 

1299 DCE_RPC_INTERFACES_NAMES[uuid] = name 

1300 DCE_RPC_INTERFACES_NAMES_rev[name.lower()] = uuid 

1301 DCE_RPC_INTERFACES[(uuid, if_version)] = DceRpcInterface( 

1302 name, 

1303 uuid, 

1304 version_tuple, 

1305 if_version, 

1306 opnums, 

1307 ) 

1308 # bind for build 

1309 for opnum, operations in opnums.items(): 

1310 bind_top_down(DceRpc5Request, operations.request, opnum=opnum) 

1311 

1312 

1313def find_dcerpc_interface(name) -> DceRpcInterface: 

1314 """ 

1315 Find an interface object through the name in the IDL 

1316 """ 

1317 try: 

1318 return next(x for x in DCE_RPC_INTERFACES.values() if x.name == name) 

1319 except StopIteration: 

1320 raise AttributeError("Unknown interface !") 

1321 

1322 

1323COM_INTERFACES = {} 

1324 

1325 

1326class ComInterface: 

1327 if_version = 0 

1328 

1329 def __init__(self, name, uuid, opnums): 

1330 self.name = name 

1331 self.uuid = uuid 

1332 self.opnums = opnums 

1333 

1334 def __repr__(self): 

1335 return "<COM Interface %s>" % (self.name,) 

1336 

1337 

1338def register_com_interface(name, uuid, opnums): 

1339 """ 

1340 Register a COM interface 

1341 """ 

1342 COM_INTERFACES[uuid] = ComInterface( 

1343 name, 

1344 uuid, 

1345 opnums, 

1346 ) 

1347 # bind for build 

1348 for opnum, operations in opnums.items(): 

1349 bind_top_down(DceRpc5Request, operations.request, opnum=opnum) 

1350 

1351 

1352def find_com_interface(name) -> ComInterface: 

1353 """ 

1354 Find an interface object through the name in the IDL 

1355 """ 

1356 try: 

1357 return next(x for x in COM_INTERFACES.values() if x.name == name) 

1358 except StopIteration: 

1359 raise AttributeError("Unknown interface !") 

1360 

1361 

1362# --- NDR fields - [C706] chap 14 

1363 

1364 

1365def _set_ctx_on(f, obj): 

1366 if isinstance(f, _NDRPacket): 

1367 f.ndr64 = obj.ndr64 

1368 f.ndrendian = obj.ndrendian 

1369 if isinstance(f, list): 

1370 for x in f: 

1371 if isinstance(x, _NDRPacket): 

1372 x.ndr64 = obj.ndr64 

1373 x.ndrendian = obj.ndrendian 

1374 

1375 

1376def _e(ndrendian): 

1377 return {"big": ">", "little": "<"}[ndrendian] 

1378 

1379 

1380class _NDRPacket(Packet): 

1381 __slots__ = ["ndr64", "ndrendian", "deferred_pointers", "request_packet"] 

1382 

1383 def __init__(self, *args, **kwargs): 

1384 self.ndr64 = kwargs.pop("ndr64", conf.ndr64) 

1385 self.ndrendian = kwargs.pop("ndrendian", "little") 

1386 # request_packet is used in the session, so that a response packet 

1387 # can resolve union arms if the case parameter is in the request. 

1388 self.request_packet = kwargs.pop("request_packet", None) 

1389 self.deferred_pointers = [] 

1390 super(_NDRPacket, self).__init__(*args, **kwargs) 

1391 

1392 def do_dissect(self, s): 

1393 _up = self.parent or self.underlayer 

1394 if _up and isinstance(_up, _NDRPacket): 

1395 self.ndr64 = _up.ndr64 

1396 self.ndrendian = _up.ndrendian 

1397 else: 

1398 # See comment above NDRConstructedType 

1399 return NDRConstructedType([]).read_deferred_pointers( 

1400 self, super(_NDRPacket, self).do_dissect(s) 

1401 ) 

1402 return super(_NDRPacket, self).do_dissect(s) 

1403 

1404 def post_dissect(self, s): 

1405 if self.deferred_pointers: 

1406 # Can't trust the cache if there were deferred pointers 

1407 self.raw_packet_cache = None 

1408 return s 

1409 

1410 def do_build(self): 

1411 _up = self.parent or self.underlayer 

1412 for f in self.fields.values(): 

1413 _set_ctx_on(f, self) 

1414 if not _up or not isinstance(_up, _NDRPacket): 

1415 # See comment above NDRConstructedType 

1416 return NDRConstructedType([]).add_deferred_pointers( 

1417 self, super(_NDRPacket, self).do_build() 

1418 ) 

1419 return super(_NDRPacket, self).do_build() 

1420 

1421 def default_payload_class(self, pkt): 

1422 return conf.padding_layer 

1423 

1424 def clone_with(self, *args, **kwargs): 

1425 pkt = super(_NDRPacket, self).clone_with(*args, **kwargs) 

1426 # We need to copy deferred_pointers to not break pointer deferral 

1427 # on build. 

1428 pkt.deferred_pointers = self.deferred_pointers 

1429 pkt.ndr64 = self.ndr64 

1430 pkt.ndrendian = self.ndrendian 

1431 return pkt 

1432 

1433 def copy(self): 

1434 pkt = super(_NDRPacket, self).copy() 

1435 pkt.deferred_pointers = self.deferred_pointers 

1436 pkt.ndr64 = self.ndr64 

1437 pkt.ndrendian = self.ndrendian 

1438 return pkt 

1439 

1440 def show2(self, dump=False, indent=3, lvl="", label_lvl=""): 

1441 return self.__class__( 

1442 bytes(self), ndr64=self.ndr64, ndrendian=self.ndrendian 

1443 ).show(dump, indent, lvl, label_lvl) 

1444 

1445 def getfield_and_val(self, attr): 

1446 try: 

1447 return Packet.getfield_and_val(self, attr) 

1448 except ValueError: 

1449 if self.request_packet: 

1450 # Try to resolve the field from the request on failure 

1451 try: 

1452 return self.request_packet.getfield_and_val(attr) 

1453 except AttributeError: 

1454 pass 

1455 raise 

1456 

1457 def valueof(self, request): 

1458 """ 

1459 Util to get the value of a NDRField, ignoring arrays, pointers, etc. 

1460 """ 

1461 val = self 

1462 for ndr_field in request.split("."): 

1463 fld, fval = val.getfield_and_val(ndr_field) 

1464 val = fld.valueof(val, fval) 

1465 return val 

1466 

1467 

1468class _NDRAlign: 

1469 def padlen(self, flen, pkt): 

1470 return -flen % self._align[pkt.ndr64] 

1471 

1472 def original_length(self, pkt): 

1473 # Find the length of the NDR frag to be able to pad properly 

1474 while pkt: 

1475 par = pkt.parent or pkt.underlayer 

1476 if par and isinstance(par, _NDRPacket): 

1477 pkt = par 

1478 else: 

1479 break 

1480 return len(pkt.original) 

1481 

1482 

1483class NDRAlign(_NDRAlign, ReversePadField): 

1484 """ 

1485 ReversePadField modified to fit NDR. 

1486 

1487 - If no align size is specified, use the one from the inner field 

1488 - Size is calculated from the beginning of the NDR stream 

1489 """ 

1490 

1491 def __init__(self, fld, align, padwith=None): 

1492 super(NDRAlign, self).__init__(fld, align=align, padwith=padwith) 

1493 

1494 

1495class _VirtualField(Field): 

1496 # Hold a value but doesn't show up when building/dissecting 

1497 def addfield(self, pkt, s, x): 

1498 return s 

1499 

1500 def getfield(self, pkt, s): 

1501 return s, None 

1502 

1503 

1504class _NDRPacketMetaclass(Packet_metaclass): 

1505 def __new__(cls, name, bases, dct): 

1506 newcls = super(_NDRPacketMetaclass, cls).__new__(cls, name, bases, dct) 

1507 conformants = dct.get("DEPORTED_CONFORMANTS", []) 

1508 if conformants: 

1509 amount = len(conformants) 

1510 if amount == 1: 

1511 newcls.fields_desc.insert( 

1512 0, 

1513 _VirtualField("max_count", None), 

1514 ) 

1515 else: 

1516 newcls.fields_desc.insert( 

1517 0, 

1518 FieldListField( 

1519 "max_counts", 

1520 [], 

1521 _VirtualField("", 0), 

1522 count_from=lambda _: amount, 

1523 ), 

1524 ) 

1525 return newcls # type: ignore 

1526 

1527 

1528class NDRPacket(_NDRPacket, metaclass=_NDRPacketMetaclass): 

1529 """ 

1530 A NDR Packet. Handles pointer size & endianness 

1531 """ 

1532 

1533 __slots__ = ["_align"] 

1534 

1535 # NDR64 pad structures 

1536 # [MS-RPCE] 2.2.5.3.4.1 

1537 ALIGNMENT = (1, 1) 

1538 # [C706] sect 14.3.7 - Conformants max_count can be added to the beginning 

1539 DEPORTED_CONFORMANTS = [] 

1540 

1541 

1542# Primitive types 

1543 

1544 

1545class _NDRValueOf: 

1546 def valueof(self, pkt, x): 

1547 return x 

1548 

1549 

1550class _NDRLenField(_NDRValueOf, Field): 

1551 """ 

1552 Field similar to FieldLenField that takes size_of and adjust as arguments, 

1553 and take the value of a size on build. 

1554 """ 

1555 

1556 __slots__ = ["size_of", "adjust"] 

1557 

1558 def __init__(self, *args, **kwargs): 

1559 self.size_of = kwargs.pop("size_of", None) 

1560 self.adjust = kwargs.pop("adjust", lambda _, x: x) 

1561 super(_NDRLenField, self).__init__(*args, **kwargs) 

1562 

1563 def i2m(self, pkt, x): 

1564 if x is None and pkt is not None and self.size_of is not None: 

1565 fld, fval = pkt.getfield_and_val(self.size_of) 

1566 f = fld.i2len(pkt, fval) 

1567 x = self.adjust(pkt, f) 

1568 elif x is None: 

1569 x = 0 

1570 return x 

1571 

1572 

1573class NDRByteField(_NDRLenField, ByteField): 

1574 pass 

1575 

1576 

1577class NDRSignedByteField(_NDRLenField, SignedByteField): 

1578 pass 

1579 

1580 

1581class _NDRField(_NDRLenField): 

1582 FMT = "" 

1583 ALIGN = (0, 0) 

1584 

1585 def getfield(self, pkt, s): 

1586 return NDRAlign( 

1587 Field("", 0, fmt=_e(pkt.ndrendian) + self.FMT), align=self.ALIGN 

1588 ).getfield(pkt, s) 

1589 

1590 def addfield(self, pkt, s, val): 

1591 return NDRAlign( 

1592 Field("", 0, fmt=_e(pkt.ndrendian) + self.FMT), align=self.ALIGN 

1593 ).addfield(pkt, s, self.i2m(pkt, val)) 

1594 

1595 

1596class NDRShortField(_NDRField): 

1597 FMT = "H" 

1598 ALIGN = (2, 2) 

1599 

1600 

1601class NDRSignedShortField(_NDRField): 

1602 FMT = "h" 

1603 ALIGN = (2, 2) 

1604 

1605 

1606class NDRIntField(_NDRField): 

1607 FMT = "I" 

1608 ALIGN = (4, 4) 

1609 

1610 

1611class NDRSignedIntField(_NDRField): 

1612 FMT = "i" 

1613 ALIGN = (4, 4) 

1614 

1615 

1616class NDRLongField(_NDRField): 

1617 FMT = "Q" 

1618 ALIGN = (8, 8) 

1619 

1620 

1621class NDRSignedLongField(_NDRField): 

1622 FMT = "q" 

1623 ALIGN = (8, 8) 

1624 

1625 

1626class NDRIEEEFloatField(_NDRField): 

1627 FMT = "f" 

1628 ALIGN = (4, 4) 

1629 

1630 

1631class NDRIEEEDoubleField(_NDRField): 

1632 FMT = "d" 

1633 ALIGN = (8, 8) 

1634 

1635 

1636# Enum types 

1637 

1638 

1639class _NDREnumField(_NDRValueOf, EnumField): 

1640 # [MS-RPCE] sect 2.2.5.2 - Enums are 4 octets in NDR64 

1641 FMTS = ["H", "I"] 

1642 

1643 def getfield(self, pkt, s): 

1644 fmt = _e(pkt.ndrendian) + self.FMTS[pkt.ndr64] 

1645 return NDRAlign(Field("", 0, fmt=fmt), align=(2, 4)).getfield(pkt, s) 

1646 

1647 def addfield(self, pkt, s, val): 

1648 fmt = _e(pkt.ndrendian) + self.FMTS[pkt.ndr64] 

1649 return NDRAlign(Field("", 0, fmt=fmt), align=(2, 4)).addfield( 

1650 pkt, s, self.i2m(pkt, val) 

1651 ) 

1652 

1653 

1654class NDRInt3264EnumField(NDRAlign): 

1655 def __init__(self, *args, **kwargs): 

1656 super(NDRInt3264EnumField, self).__init__( 

1657 _NDREnumField(*args, **kwargs), align=(2, 4) 

1658 ) 

1659 

1660 

1661class NDRIntEnumField(_NDRValueOf, NDRAlign): 

1662 # v1_enum are always 4-octets, even in NDR32 

1663 def __init__(self, *args, **kwargs): 

1664 super(NDRIntEnumField, self).__init__( 

1665 LEIntEnumField(*args, **kwargs), align=(4, 4) 

1666 ) 

1667 

1668 

1669# Special types 

1670 

1671 

1672class NDRInt3264Field(_NDRLenField): 

1673 FMTS = ["I", "Q"] 

1674 

1675 def getfield(self, pkt, s): 

1676 fmt = _e(pkt.ndrendian) + self.FMTS[pkt.ndr64] 

1677 return NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).getfield(pkt, s) 

1678 

1679 def addfield(self, pkt, s, val): 

1680 fmt = _e(pkt.ndrendian) + self.FMTS[pkt.ndr64] 

1681 return NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).addfield( 

1682 pkt, s, self.i2m(pkt, val) 

1683 ) 

1684 

1685 

1686class NDRSignedInt3264Field(NDRInt3264Field): 

1687 FMTS = ["i", "q"] 

1688 

1689 

1690# Pointer types 

1691 

1692 

1693class NDRPointer(_NDRPacket): 

1694 fields_desc = [ 

1695 MultipleTypeField( 

1696 [(XLELongField("referent_id", 1), lambda pkt: pkt and pkt.ndr64)], 

1697 XLEIntField("referent_id", 1), 

1698 ), 

1699 PacketField("value", None, conf.raw_layer), 

1700 ] 

1701 

1702 

1703class NDRFullPointerField(_FieldContainer): 

1704 """ 

1705 A NDR Full/Unique pointer field encapsulation. 

1706 

1707 :param EMBEDDED: This pointer is embedded. This means that it's representation 

1708 will not appear after the pointer (pointer deferral applies). 

1709 See [C706] 14.3.12.3 - Algorithm for Deferral of Referents 

1710 """ 

1711 

1712 EMBEDDED = False 

1713 EMBEDDED_REF = False 

1714 

1715 def __init__(self, fld, ref=False, fmt="I"): 

1716 self.fld = fld 

1717 self.ref = ref 

1718 self.default = None 

1719 

1720 def getfield(self, pkt, s): 

1721 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

1722 remain, referent_id = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).getfield( 

1723 pkt, s 

1724 ) 

1725 

1726 # No value 

1727 if referent_id == 0 and not self.EMBEDDED_REF: 

1728 return remain, None 

1729 

1730 # With value 

1731 if self.EMBEDDED: 

1732 # deferred 

1733 ptr = NDRPointer( 

1734 ndr64=pkt.ndr64, ndrendian=pkt.ndrendian, referent_id=referent_id 

1735 ) 

1736 pkt.deferred_pointers.append((ptr, partial(self.fld.getfield, pkt))) 

1737 return remain, ptr 

1738 

1739 remain, val = self.fld.getfield(pkt, remain) 

1740 return remain, NDRPointer( 

1741 ndr64=pkt.ndr64, ndrendian=pkt.ndrendian, referent_id=referent_id, value=val 

1742 ) 

1743 

1744 def addfield(self, pkt, s, val): 

1745 if val is not None and not isinstance(val, NDRPointer): 

1746 raise ValueError( 

1747 "Expected NDRPointer in %s. You are using it wrong!" % self.name 

1748 ) 

1749 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

1750 fld = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)) 

1751 

1752 # No value 

1753 if val is None and not self.EMBEDDED_REF: 

1754 return fld.addfield(pkt, s, 0) 

1755 

1756 # With value 

1757 _set_ctx_on(val.value, pkt) 

1758 s = fld.addfield(pkt, s, val.referent_id) 

1759 if self.EMBEDDED: 

1760 # deferred 

1761 pkt.deferred_pointers.append( 

1762 ((lambda s: self.fld.addfield(pkt, s, val.value)), val) 

1763 ) 

1764 return s 

1765 

1766 return self.fld.addfield(pkt, s, val.value) 

1767 

1768 def any2i(self, pkt, x): 

1769 # User-friendly helper 

1770 if x is not None and not isinstance(x, NDRPointer): 

1771 return NDRPointer( 

1772 referent_id=0x20000, 

1773 value=self.fld.any2i(pkt, x), 

1774 ) 

1775 return x 

1776 

1777 # Can't use i2repr = Field.i2repr and so on on PY2 :/ 

1778 def i2repr(self, pkt, val): 

1779 return repr(val) 

1780 

1781 def i2h(self, pkt, x): 

1782 return x 

1783 

1784 def h2i(self, pkt, x): 

1785 return x 

1786 

1787 def i2len(self, pkt, x): 

1788 if x is None: 

1789 return 0 

1790 return self.fld.i2len(pkt, x.value) 

1791 

1792 def valueof(self, pkt, x): 

1793 if x is None: 

1794 return x 

1795 return self.fld.valueof(pkt, x.value) 

1796 

1797 

1798class NDRFullEmbPointerField(NDRFullPointerField): 

1799 """ 

1800 A NDR Embedded Full pointer. 

1801 

1802 Same as NDRFullPointerField with EMBEDDED = True. 

1803 """ 

1804 

1805 EMBEDDED = True 

1806 

1807 

1808class NDRRefEmbPointerField(NDRFullPointerField): 

1809 """ 

1810 A NDR Embedded Reference pointer. 

1811 

1812 Same as NDRFullPointerField with EMBEDDED = True and EMBEDDED_REF = True. 

1813 """ 

1814 

1815 EMBEDDED = True 

1816 EMBEDDED_REF = True 

1817 

1818 

1819# Constructed types 

1820 

1821 

1822# Note: this is utterly complex and will drive you crazy 

1823 

1824# If you have a NDRPacket that contains a deferred pointer on the top level 

1825# (only happens in non DCE/RPC structures, such as in MS-PAC, where you have an NDR 

1826# structure encapsulated in a non-NDR structure), there will be left-over deferred 

1827# pointers when exiting dissection/build (deferred pointers are only computed when 

1828# reaching a field that extends NDRConstructedType, which is normal: if you follow 

1829# the DCE/RPC spec, pointers are never deferred in root structures) 

1830# Therefore there is a special case forcing the build/dissection of any leftover 

1831# pointers in NDRPacket, if Scapy detects that they won't be handled by any parent. 

1832 

1833# Implementation notes: I chose to set 'handles_deferred' inside the FIELD, rather 

1834# than inside the PACKET. This is faster to compute because whether a constructed type 

1835# should handle deferral or not is computed only once when loading, therefore Scapy 

1836# knows in advance whether to handle deferred pointers or not. But it is technically 

1837# incorrect: with this approach, a structure (packet) cannot be used in 2 code paths 

1838# that have different pointer managements. I mean by that that if there was a 

1839# structure that was directly embedded in a RPC request without a pointer but also 

1840# embedded with a pointer in another RPC request, it would break. 

1841# Fortunately this isn't the case: structures are never reused for 2 purposes. 

1842# (or at least I never seen that... <i hope this works>) 

1843 

1844 

1845class NDRConstructedType(object): 

1846 def __init__(self, fields): 

1847 self.handles_deferred = False 

1848 self.ndr_fields = fields 

1849 self.rec_check_deferral() 

1850 

1851 def rec_check_deferral(self): 

1852 # We iterate through the fields within this constructed type. 

1853 # If we have a pointer, mark this field as handling deferrance 

1854 # and make all sub-constructed types not. 

1855 for f in self.ndr_fields: 

1856 if isinstance(f, NDRFullPointerField) and f.EMBEDDED: 

1857 self.handles_deferred = True 

1858 if isinstance(f, NDRConstructedType): 

1859 f.rec_check_deferral() 

1860 if f.handles_deferred: 

1861 self.handles_deferred = True 

1862 f.handles_deferred = False 

1863 

1864 def getfield(self, pkt, s): 

1865 s, fval = super(NDRConstructedType, self).getfield(pkt, s) 

1866 if isinstance(fval, _NDRPacket): 

1867 # If a sub-packet we just dissected has deferred pointers, 

1868 # pass it to parent packet to propagate. 

1869 pkt.deferred_pointers.extend(fval.deferred_pointers) 

1870 del fval.deferred_pointers[:] 

1871 if self.handles_deferred: 

1872 # This field handles deferral ! 

1873 s = self.read_deferred_pointers(pkt, s) 

1874 return s, fval 

1875 

1876 def read_deferred_pointers(self, pkt, s): 

1877 # Now read content of the pointers that were deferred 

1878 q = collections.deque() 

1879 q.extend(pkt.deferred_pointers) 

1880 del pkt.deferred_pointers[:] 

1881 while q: 

1882 # Recursively resolve pointers that were deferred 

1883 ptr, getfld = q.popleft() 

1884 s, val = getfld(s) 

1885 ptr.value = val 

1886 if isinstance(val, _NDRPacket): 

1887 # Pointer resolves to a packet.. that may have deferred pointers? 

1888 q.extend(val.deferred_pointers) 

1889 del val.deferred_pointers[:] 

1890 return s 

1891 

1892 def addfield(self, pkt, s, val): 

1893 try: 

1894 s = super(NDRConstructedType, self).addfield(pkt, s, val) 

1895 except Exception as ex: 

1896 try: 

1897 ex.args = ( 

1898 "While building field '%s': " % self.name + ex.args[0], 

1899 ) + ex.args[1:] 

1900 except (AttributeError, IndexError): 

1901 pass 

1902 raise ex 

1903 if isinstance(val, _NDRPacket): 

1904 # If a sub-packet we just dissected has deferred pointers, 

1905 # pass it to parent packet to propagate. 

1906 pkt.deferred_pointers.extend(val.deferred_pointers) 

1907 del val.deferred_pointers[:] 

1908 if self.handles_deferred: 

1909 # This field handles deferral ! 

1910 s = self.add_deferred_pointers(pkt, s) 

1911 return s 

1912 

1913 def add_deferred_pointers(self, pkt, s): 

1914 # Now add content of pointers that were deferred 

1915 q = collections.deque() 

1916 q.extend(pkt.deferred_pointers) 

1917 del pkt.deferred_pointers[:] 

1918 while q: 

1919 addfld, fval = q.popleft() 

1920 s = addfld(s) 

1921 if isinstance(fval, NDRPointer) and isinstance(fval.value, _NDRPacket): 

1922 q.extend(fval.value.deferred_pointers) 

1923 del fval.value.deferred_pointers[:] 

1924 return s 

1925 

1926 

1927class _NDRPacketField(_NDRValueOf, PacketField): 

1928 def m2i(self, pkt, m): 

1929 return self.cls(m, ndr64=pkt.ndr64, ndrendian=pkt.ndrendian, _parent=pkt) 

1930 

1931 

1932class _NDRPacketPadField(PadField): 

1933 # [MS-RPCE] 2.2.5.3.4.1 Structure with Trailing Gap 

1934 # Structures have extra alignment/padding in NDR64. 

1935 def padlen(self, flen, pkt): 

1936 if pkt.ndr64: 

1937 return -flen % self._align[1] 

1938 else: 

1939 return 0 

1940 

1941 

1942class NDRPacketField(NDRConstructedType, NDRAlign): 

1943 def __init__(self, name, default, pkt_cls, **kwargs): 

1944 self.DEPORTED_CONFORMANTS = pkt_cls.DEPORTED_CONFORMANTS 

1945 self.fld = _NDRPacketField(name, default, pkt_cls=pkt_cls, **kwargs) 

1946 NDRAlign.__init__( 

1947 self, 

1948 _NDRPacketPadField(self.fld, align=pkt_cls.ALIGNMENT), 

1949 align=pkt_cls.ALIGNMENT, 

1950 ) 

1951 NDRConstructedType.__init__(self, pkt_cls.fields_desc) 

1952 

1953 def getfield(self, pkt, x): 

1954 # Handle deformed conformants max_count here 

1955 if self.DEPORTED_CONFORMANTS: 

1956 # C706 14.3.2: "In other words, the size information precedes the 

1957 # structure and is aligned independently of the structure alignment." 

1958 fld = NDRInt3264Field("", 0) 

1959 max_counts = [] 

1960 for _ in self.DEPORTED_CONFORMANTS: 

1961 x, max_count = fld.getfield(pkt, x) 

1962 max_counts.append(max_count) 

1963 res, val = super(NDRPacketField, self).getfield(pkt, x) 

1964 if len(max_counts) == 1: 

1965 val.max_count = max_counts[0] 

1966 else: 

1967 val.max_counts = max_counts 

1968 return res, val 

1969 return super(NDRPacketField, self).getfield(pkt, x) 

1970 

1971 def addfield(self, pkt, s, x): 

1972 # Handle deformed conformants max_count here 

1973 if self.DEPORTED_CONFORMANTS: 

1974 mcfld = NDRInt3264Field("", 0) 

1975 if len(self.DEPORTED_CONFORMANTS) == 1: 

1976 max_counts = [x.max_count] 

1977 else: 

1978 max_counts = x.max_counts 

1979 for fldname, max_count in zip(self.DEPORTED_CONFORMANTS, max_counts): 

1980 if max_count is None: 

1981 fld, val = x.getfield_and_val(fldname) 

1982 max_count = fld.i2len(x, val) 

1983 s = mcfld.addfield(pkt, s, max_count) 

1984 return super(NDRPacketField, self).addfield(pkt, s, x) 

1985 return super(NDRPacketField, self).addfield(pkt, s, x) 

1986 

1987 

1988# Array types 

1989 

1990 

1991class _NDRPacketListField(NDRConstructedType, PacketListField): 

1992 """ 

1993 A PacketListField for NDR that can optionally pack the packets into NDRPointers 

1994 """ 

1995 

1996 islist = 1 

1997 holds_packets = 1 

1998 

1999 __slots__ = ["ptr_pack", "fld"] 

2000 

2001 def __init__(self, name, default, pkt_cls, **kwargs): 

2002 self.ptr_pack = kwargs.pop("ptr_pack", False) 

2003 if self.ptr_pack: 

2004 self.fld = NDRFullEmbPointerField(NDRPacketField("", None, pkt_cls)) 

2005 else: 

2006 self.fld = NDRPacketField("", None, pkt_cls) 

2007 PacketListField.__init__(self, name, default, pkt_cls=pkt_cls, **kwargs) 

2008 NDRConstructedType.__init__(self, [self.fld]) 

2009 

2010 def m2i(self, pkt, s): 

2011 remain, val = self.fld.getfield(pkt, s) 

2012 if val is None: 

2013 val = NDRNone() 

2014 # A mistake here would be to use / instead of add_payload. It adds a copy 

2015 # which breaks pointer defferal. Same applies elsewhere 

2016 val.add_payload(conf.padding_layer(remain)) 

2017 return val 

2018 

2019 def any2i(self, pkt, x): 

2020 # User-friendly helper 

2021 if isinstance(x, list): 

2022 x = [self.fld.any2i(pkt, y) for y in x] 

2023 return super(_NDRPacketListField, self).any2i(pkt, x) 

2024 

2025 def i2m(self, pkt, val): 

2026 return self.fld.addfield(pkt, b"", val) 

2027 

2028 def i2len(self, pkt, x): 

2029 return len(x) 

2030 

2031 def valueof(self, pkt, x): 

2032 return [ 

2033 self.fld.valueof(pkt, y if not isinstance(y, NDRNone) else None) for y in x 

2034 ] 

2035 

2036 

2037class NDRFieldListField(NDRConstructedType, FieldListField): 

2038 """ 

2039 A FieldListField for NDR 

2040 """ 

2041 

2042 islist = 1 

2043 

2044 def __init__(self, *args, **kwargs): 

2045 kwargs.pop("ptr_pack", None) # TODO: unimplemented 

2046 if "length_is" in kwargs: 

2047 kwargs["count_from"] = kwargs.pop("length_is") 

2048 elif "size_is" in kwargs: 

2049 kwargs["count_from"] = kwargs.pop("size_is") 

2050 FieldListField.__init__(self, *args, **kwargs) 

2051 NDRConstructedType.__init__(self, [self.field]) 

2052 

2053 def i2len(self, pkt, x): 

2054 return len(x) 

2055 

2056 def valueof(self, pkt, x): 

2057 return [self.field.valueof(pkt, y) for y in x] 

2058 

2059 

2060class NDRVaryingArray(_NDRPacket): 

2061 fields_desc = [ 

2062 MultipleTypeField( 

2063 [(LELongField("offset", 0), lambda pkt: pkt and pkt.ndr64)], 

2064 LEIntField("offset", 0), 

2065 ), 

2066 MultipleTypeField( 

2067 [ 

2068 ( 

2069 LELongField("actual_count", None), 

2070 lambda pkt: pkt and pkt.ndr64, 

2071 ) 

2072 ], 

2073 LEIntField("actual_count", None), 

2074 ), 

2075 PacketField("value", None, conf.raw_layer), 

2076 ] 

2077 

2078 

2079class _NDRVarField: 

2080 """ 

2081 NDR Varying Array / String field 

2082 """ 

2083 

2084 LENGTH_FROM = False 

2085 COUNT_FROM = False 

2086 

2087 def __init__(self, *args, **kwargs): 

2088 # We build the length_is function by taking into account both the 

2089 # actual_count (from the varying field) and a potentially provided 

2090 # length_is field. 

2091 if "length_is" in kwargs: 

2092 _length_is = kwargs.pop("length_is") 

2093 length_is = lambda pkt: (_length_is(pkt.underlayer) or pkt.actual_count) 

2094 else: 

2095 length_is = lambda pkt: pkt.actual_count 

2096 # Pass it to the sub-field (actually subclass) 

2097 if self.LENGTH_FROM: 

2098 kwargs["length_from"] = length_is 

2099 elif self.COUNT_FROM: 

2100 kwargs["count_from"] = length_is 

2101 super(_NDRVarField, self).__init__(*args, **kwargs) 

2102 

2103 def getfield(self, pkt, s): 

2104 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

2105 remain, offset = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).getfield(pkt, s) 

2106 remain, actual_count = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).getfield( 

2107 pkt, remain 

2108 ) 

2109 final = NDRVaryingArray( 

2110 ndr64=pkt.ndr64, 

2111 ndrendian=pkt.ndrendian, 

2112 offset=offset, 

2113 actual_count=actual_count, 

2114 _underlayer=pkt, 

2115 ) 

2116 remain, val = super(_NDRVarField, self).getfield(final, remain) 

2117 final.value = super(_NDRVarField, self).i2h(pkt, val) 

2118 return remain, final 

2119 

2120 def addfield(self, pkt, s, val): 

2121 if not isinstance(val, NDRVaryingArray): 

2122 raise ValueError( 

2123 "Expected NDRVaryingArray in %s. You are using it wrong!" % self.name 

2124 ) 

2125 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

2126 _set_ctx_on(val.value, pkt) 

2127 s = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).addfield(pkt, s, val.offset) 

2128 s = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).addfield( 

2129 pkt, 

2130 s, 

2131 val.actual_count is None 

2132 and super(_NDRVarField, self).i2len(pkt, val.value) 

2133 or val.actual_count, 

2134 ) 

2135 return super(_NDRVarField, self).addfield( 

2136 pkt, s, super(_NDRVarField, self).h2i(pkt, val.value) 

2137 ) 

2138 

2139 def i2len(self, pkt, x): 

2140 return super(_NDRVarField, self).i2len(pkt, x.value) 

2141 

2142 def any2i(self, pkt, x): 

2143 # User-friendly helper 

2144 if not isinstance(x, NDRVaryingArray): 

2145 return NDRVaryingArray( 

2146 value=super(_NDRVarField, self).any2i(pkt, x), 

2147 ) 

2148 return x 

2149 

2150 # Can't use i2repr = Field.i2repr and so on on PY2 :/ 

2151 def i2repr(self, pkt, val): 

2152 return repr(val) 

2153 

2154 def i2h(self, pkt, x): 

2155 return x 

2156 

2157 def h2i(self, pkt, x): 

2158 return x 

2159 

2160 def valueof(self, pkt, x): 

2161 return super(_NDRVarField, self).valueof(pkt, x.value) 

2162 

2163 

2164class NDRConformantArray(_NDRPacket): 

2165 fields_desc = [ 

2166 MultipleTypeField( 

2167 [(LELongField("max_count", None), lambda pkt: pkt and pkt.ndr64)], 

2168 LEIntField("max_count", None), 

2169 ), 

2170 MultipleTypeField( 

2171 [ 

2172 ( 

2173 PacketListField( 

2174 "value", 

2175 [], 

2176 conf.raw_layer, 

2177 count_from=lambda pkt: pkt.max_count, 

2178 ), 

2179 ( 

2180 lambda pkt: pkt.fields.get("value", None) 

2181 and isinstance(pkt.fields["value"][0], Packet), 

2182 lambda _, val: val and isinstance(val[0], Packet), 

2183 ), 

2184 ) 

2185 ], 

2186 FieldListField( 

2187 "value", [], LEIntField("", 0), count_from=lambda pkt: pkt.max_count 

2188 ), 

2189 ), 

2190 ] 

2191 

2192 

2193class NDRConformantString(_NDRPacket): 

2194 fields_desc = [ 

2195 MultipleTypeField( 

2196 [(LELongField("max_count", None), lambda pkt: pkt and pkt.ndr64)], 

2197 LEIntField("max_count", None), 

2198 ), 

2199 StrField("value", ""), 

2200 ] 

2201 

2202 

2203class _NDRConfField: 

2204 """ 

2205 NDR Conformant Array / String field 

2206 """ 

2207 

2208 CONFORMANT_STRING = False 

2209 LENGTH_FROM = False 

2210 COUNT_FROM = False 

2211 

2212 def __init__(self, *args, **kwargs): 

2213 # when conformant_in_struct is True, we remove the level of abstraction 

2214 # provided by NDRConformantString / NDRConformantArray because max_count 

2215 # is a proper field in the parent packet. 

2216 self.conformant_in_struct = kwargs.pop("conformant_in_struct", False) 

2217 # size_is/max_is end up here, and is what defines a conformant field. 

2218 if "size_is" in kwargs: 

2219 size_is = kwargs.pop("size_is") 

2220 if self.LENGTH_FROM: 

2221 kwargs["length_from"] = size_is 

2222 elif self.COUNT_FROM: 

2223 kwargs["count_from"] = size_is 

2224 super(_NDRConfField, self).__init__(*args, **kwargs) 

2225 

2226 def getfield(self, pkt, s): 

2227 # [C706] - 14.3.7 Structures Containing Arrays 

2228 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

2229 if self.conformant_in_struct: 

2230 return super(_NDRConfField, self).getfield(pkt, s) 

2231 remain, max_count = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).getfield( 

2232 pkt, s 

2233 ) 

2234 remain, val = super(_NDRConfField, self).getfield(pkt, remain) 

2235 return remain, ( 

2236 NDRConformantString if self.CONFORMANT_STRING else NDRConformantArray 

2237 )(ndr64=pkt.ndr64, ndrendian=pkt.ndrendian, max_count=max_count, value=val) 

2238 

2239 def addfield(self, pkt, s, val): 

2240 if self.conformant_in_struct: 

2241 return super(_NDRConfField, self).addfield(pkt, s, val) 

2242 if self.CONFORMANT_STRING and not isinstance(val, NDRConformantString): 

2243 raise ValueError( 

2244 "Expected NDRConformantString in %s. You are using it wrong!" 

2245 % self.name 

2246 ) 

2247 elif not self.CONFORMANT_STRING and not isinstance(val, NDRConformantArray): 

2248 raise ValueError( 

2249 "Expected NDRConformantArray in %s. You are using it wrong!" % self.name 

2250 ) 

2251 fmt = _e(pkt.ndrendian) + ["I", "Q"][pkt.ndr64] 

2252 _set_ctx_on(val.value, pkt) 

2253 if val.value and isinstance(val.value[0], NDRVaryingArray): 

2254 value = val.value[0] 

2255 else: 

2256 value = val.value 

2257 s = NDRAlign(Field("", 0, fmt=fmt), align=(4, 8)).addfield( 

2258 pkt, 

2259 s, 

2260 val.max_count is None 

2261 and super(_NDRConfField, self).i2len(pkt, value) 

2262 or val.max_count, 

2263 ) 

2264 return super(_NDRConfField, self).addfield(pkt, s, value) 

2265 

2266 def _subval(self, x): 

2267 if self.conformant_in_struct: 

2268 value = x 

2269 elif ( 

2270 not self.CONFORMANT_STRING 

2271 and x.value 

2272 and isinstance(x.value[0], NDRVaryingArray) 

2273 ): 

2274 value = x.value[0] 

2275 else: 

2276 value = x.value 

2277 return value 

2278 

2279 def i2len(self, pkt, x): 

2280 return super(_NDRConfField, self).i2len(pkt, self._subval(x)) 

2281 

2282 def any2i(self, pkt, x): 

2283 # User-friendly helper 

2284 if self.conformant_in_struct: 

2285 return super(_NDRConfField, self).any2i(pkt, x) 

2286 if self.CONFORMANT_STRING and not isinstance(x, NDRConformantString): 

2287 return NDRConformantString( 

2288 value=super(_NDRConfField, self).any2i(pkt, x), 

2289 ) 

2290 elif not isinstance(x, NDRConformantArray): 

2291 return NDRConformantArray( 

2292 value=super(_NDRConfField, self).any2i(pkt, x), 

2293 ) 

2294 return x 

2295 

2296 # Can't use i2repr = Field.i2repr and so on on PY2 :/ 

2297 def i2repr(self, pkt, val): 

2298 return repr(val) 

2299 

2300 def i2h(self, pkt, x): 

2301 return x 

2302 

2303 def h2i(self, pkt, x): 

2304 return x 

2305 

2306 def valueof(self, pkt, x): 

2307 return super(_NDRConfField, self).valueof(pkt, self._subval(x)) 

2308 

2309 

2310class NDRVarPacketListField(_NDRVarField, _NDRPacketListField): 

2311 """ 

2312 NDR Varying PacketListField. Unused 

2313 """ 

2314 

2315 COUNT_FROM = True 

2316 

2317 

2318class NDRConfPacketListField(_NDRConfField, _NDRPacketListField): 

2319 """ 

2320 NDR Conformant PacketListField 

2321 """ 

2322 

2323 COUNT_FROM = True 

2324 

2325 

2326class NDRConfVarPacketListField(_NDRConfField, _NDRVarField, _NDRPacketListField): 

2327 """ 

2328 NDR Conformant Varying PacketListField 

2329 """ 

2330 

2331 COUNT_FROM = True 

2332 

2333 

2334class NDRConfFieldListField(_NDRConfField, NDRFieldListField): 

2335 """ 

2336 NDR Conformant FieldListField 

2337 """ 

2338 

2339 COUNT_FROM = True 

2340 

2341 

2342class NDRConfVarFieldListField(_NDRConfField, _NDRVarField, NDRFieldListField): 

2343 """ 

2344 NDR Conformant Varying FieldListField 

2345 """ 

2346 

2347 COUNT_FROM = True 

2348 

2349 

2350# NDR String fields 

2351 

2352 

2353class _NDRUtf16(Field): 

2354 def h2i(self, pkt, x): 

2355 encoding = {"big": "utf-16be", "little": "utf-16le"}[pkt.ndrendian] 

2356 return plain_str(x).encode(encoding) 

2357 

2358 def i2h(self, pkt, x): 

2359 encoding = {"big": "utf-16be", "little": "utf-16le"}[pkt.ndrendian] 

2360 return bytes_encode(x).decode(encoding, errors="replace") 

2361 

2362 

2363class NDRConfStrLenField(_NDRConfField, _NDRValueOf, StrLenField): 

2364 """ 

2365 NDR Conformant StrLenField. 

2366 

2367 This is not a "string" per NDR, but an a conformant byte array 

2368 (e.g. tower_octet_string). For ease of use, we implicitly convert 

2369 it in specific cases. 

2370 """ 

2371 

2372 CONFORMANT_STRING = True 

2373 LENGTH_FROM = True 

2374 

2375 

2376class NDRConfStrLenFieldUtf16(_NDRConfField, _NDRValueOf, StrLenFieldUtf16, _NDRUtf16): 

2377 """ 

2378 NDR Conformant StrLenFieldUtf16. 

2379 

2380 See NDRConfStrLenField for comment. 

2381 """ 

2382 

2383 CONFORMANT_STRING = True 

2384 ON_WIRE_SIZE_UTF16 = False 

2385 LENGTH_FROM = True 

2386 

2387 

2388class NDRVarStrLenField(_NDRVarField, StrLenField): 

2389 """ 

2390 NDR Varying StrLenField 

2391 """ 

2392 

2393 LENGTH_FROM = True 

2394 

2395 

2396class NDRVarStrLenFieldUtf16(_NDRVarField, _NDRValueOf, StrLenFieldUtf16, _NDRUtf16): 

2397 """ 

2398 NDR Varying StrLenFieldUtf16 

2399 """ 

2400 

2401 ON_WIRE_SIZE_UTF16 = False 

2402 LENGTH_FROM = True 

2403 

2404 

2405class NDRConfVarStrLenField(_NDRConfField, _NDRVarField, _NDRValueOf, StrLenField): 

2406 """ 

2407 NDR Conformant Varying StrLenField 

2408 """ 

2409 

2410 LENGTH_FROM = True 

2411 

2412 

2413class NDRConfVarStrLenFieldUtf16( 

2414 _NDRConfField, _NDRVarField, _NDRValueOf, StrLenFieldUtf16, _NDRUtf16 

2415): 

2416 """ 

2417 NDR Conformant Varying StrLenFieldUtf16 

2418 """ 

2419 

2420 ON_WIRE_SIZE_UTF16 = False 

2421 LENGTH_FROM = True 

2422 

2423 

2424class NDRConfVarStrNullField(_NDRConfField, _NDRVarField, _NDRValueOf, StrNullField): 

2425 """ 

2426 NDR Conformant Varying StrNullField 

2427 """ 

2428 

2429 NULLFIELD = True 

2430 

2431 

2432class NDRConfVarStrNullFieldUtf16( 

2433 _NDRConfField, _NDRVarField, _NDRValueOf, StrNullFieldUtf16, _NDRUtf16 

2434): 

2435 """ 

2436 NDR Conformant Varying StrNullFieldUtf16 

2437 """ 

2438 

2439 ON_WIRE_SIZE_UTF16 = False 

2440 NULLFIELD = True 

2441 

2442 

2443# Union type 

2444 

2445 

2446class NDRUnion(_NDRPacket): 

2447 fields_desc = [ 

2448 IntField("tag", 0), 

2449 PacketField("value", None, conf.raw_layer), 

2450 ] 

2451 

2452 

2453class _NDRUnionField(MultipleTypeField): 

2454 __slots__ = ["switch_fmt", "align"] 

2455 

2456 def __init__(self, flds, dflt, align, switch_fmt): 

2457 self.switch_fmt = switch_fmt 

2458 self.align = align 

2459 super(_NDRUnionField, self).__init__(flds, dflt) 

2460 

2461 def getfield(self, pkt, s): 

2462 fmt = _e(pkt.ndrendian) + self.switch_fmt[pkt.ndr64] 

2463 remain, tag = NDRAlign(Field("", 0, fmt=fmt), align=self.align).getfield(pkt, s) 

2464 fld, _ = super(_NDRUnionField, self)._find_fld_pkt_val(pkt, NDRUnion(tag=tag)) 

2465 remain, val = fld.getfield(pkt, remain) 

2466 return remain, NDRUnion( 

2467 tag=tag, value=val, ndr64=pkt.ndr64, ndrendian=pkt.ndrendian, _parent=pkt 

2468 ) 

2469 

2470 def addfield(self, pkt, s, val): 

2471 fmt = _e(pkt.ndrendian) + self.switch_fmt[pkt.ndr64] 

2472 if not isinstance(val, NDRUnion): 

2473 raise ValueError( 

2474 "Expected NDRUnion in %s. You are using it wrong!" % self.name 

2475 ) 

2476 _set_ctx_on(val.value, pkt) 

2477 # First, align the whole tag+union against the align param 

2478 s = NDRAlign(Field("", 0, fmt=fmt), align=self.align).addfield(pkt, s, val.tag) 

2479 # Then, compute the subfield with its own alignment 

2480 return super(_NDRUnionField, self).addfield(pkt, s, val) 

2481 

2482 def _find_fld_pkt_val(self, pkt, val): 

2483 fld, val = super(_NDRUnionField, self)._find_fld_pkt_val(pkt, val) 

2484 return fld, val.value 

2485 

2486 # Can't use i2repr = Field.i2repr and so on on PY2 :/ 

2487 def i2repr(self, pkt, val): 

2488 return repr(val) 

2489 

2490 def i2h(self, pkt, x): 

2491 return x 

2492 

2493 def h2i(self, pkt, x): 

2494 return x 

2495 

2496 def valueof(self, pkt, x): 

2497 fld, val = self._find_fld_pkt_val(pkt, x) 

2498 return fld.valueof(pkt, x.value) 

2499 

2500 

2501class NDRUnionField(NDRConstructedType, _NDRUnionField): 

2502 def __init__(self, flds, dflt, align, switch_fmt): 

2503 _NDRUnionField.__init__(self, flds, dflt, align=align, switch_fmt=switch_fmt) 

2504 NDRConstructedType.__init__(self, [x[0] for x in flds] + [dflt]) 

2505 

2506 def any2i(self, pkt, x): 

2507 # User-friendly helper 

2508 if x: 

2509 if not isinstance(x, NDRUnion): 

2510 raise ValueError("Invalid value for %s; should be NDRUnion" % self.name) 

2511 else: 

2512 x.value = _NDRUnionField.any2i(self, pkt, x) 

2513 return x 

2514 

2515 

2516# Misc 

2517 

2518 

2519class _ProxyArray: 

2520 # Hack for recursive fields DEPORTED_CONFORMANTS field 

2521 __slots__ = ["getfld"] 

2522 

2523 def __init__(self, getfld): 

2524 self.getfld = getfld 

2525 

2526 def __len__(self): 

2527 try: 

2528 return len(self.getfld()) 

2529 except AttributeError: 

2530 return 0 

2531 

2532 def __iter__(self): 

2533 try: 

2534 return iter(self.getfld()) 

2535 except AttributeError: 

2536 return iter([]) 

2537 

2538 

2539class _ProxyTuple: 

2540 # Hack for recursive fields ALIGNMENT field 

2541 __slots__ = ["getfld"] 

2542 

2543 def __init__(self, getfld): 

2544 self.getfld = getfld 

2545 

2546 def __getitem__(self, name): 

2547 try: 

2548 return self.getfld()[name] 

2549 except AttributeError: 

2550 raise KeyError 

2551 

2552 

2553def NDRRecursiveClass(clsname): 

2554 """ 

2555 Return a special class that is used for pointer recursion 

2556 """ 

2557 # Get module where this is called 

2558 frame = inspect.currentframe().f_back 

2559 mod = frame.f_globals["__loader__"].name 

2560 getcls = lambda: getattr(importlib.import_module(mod), clsname) 

2561 

2562 class _REC(NDRPacket): 

2563 ALIGNMENT = _ProxyTuple(lambda: getattr(getcls(), "ALIGNMENT")) 

2564 DEPORTED_CONFORMANTS = _ProxyArray( 

2565 lambda: getattr(getcls(), "DEPORTED_CONFORMANTS") 

2566 ) 

2567 

2568 @classmethod 

2569 def dispatch_hook(cls, _pkt=None, *args, **kargs): 

2570 return getcls() 

2571 

2572 return _REC 

2573 

2574 

2575# The very few NDR-specific structures 

2576 

2577 

2578class NDRContextHandle(NDRPacket): 

2579 ALIGNMENT = (4, 4) 

2580 fields_desc = [ 

2581 LEIntField("attributes", 0), 

2582 StrFixedLenField("uuid", b"", length=16), 

2583 ] 

2584 

2585 def guess_payload_class(self, payload): 

2586 return conf.padding_layer 

2587 

2588 

2589class NDRNone(NDRPacket): 

2590 # This is only used in NDRPacketListField to act as a "None" pointer, and is 

2591 # a workaround because the field doesn't support None as a value in the list. 

2592 name = "None" 

2593 ALIGNMENT = (4, 8) 

2594 fields_desc = [ 

2595 NDRInt3264Field("ptr", 0), 

2596 ] 

2597 

2598 

2599# --- Type Serialization Version 1 - [MSRPCE] sect 2.2.6 

2600 

2601 

2602def _get_ndrtype1_endian(pkt): 

2603 if pkt.underlayer is None: 

2604 return "<" 

2605 return {0x00: ">", 0x10: "<"}.get(pkt.underlayer.Endianness, "<") 

2606 

2607 

2608class NDRSerialization1Header(Packet): 

2609 fields_desc = [ 

2610 ByteField("Version", 1), 

2611 ByteEnumField("Endianness", 0x10, {0x00: "big", 0x10: "little"}), 

2612 LEShortField("CommonHeaderLength", 8), 

2613 XLEIntField("Filler", 0xCCCCCCCC), 

2614 ] 

2615 

2616 # Add a bit of goo so that valueof() goes through the header 

2617 

2618 def _ndrlayer(self): 

2619 cur = self 

2620 while cur and not isinstance(cur, _NDRPacket) and cur.payload: 

2621 cur = cur.payload 

2622 if isinstance(cur, NDRPointer): 

2623 cur = cur.value 

2624 return cur 

2625 

2626 def getfield_and_val(self, attr): 

2627 try: 

2628 return Packet.getfield_and_val(self, attr) 

2629 except ValueError: 

2630 return self._ndrlayer().getfield_and_val(attr) 

2631 

2632 def valueof(self, name): 

2633 return self._ndrlayer().valueof(name) 

2634 

2635 

2636class NDRSerialization1PrivateHeader(Packet): 

2637 fields_desc = [ 

2638 EField( 

2639 LEIntField("ObjectBufferLength", 0), endianness_from=_get_ndrtype1_endian 

2640 ), 

2641 XLEIntField("Filler", 0), 

2642 ] 

2643 

2644 

2645def ndr_deserialize1(b, cls, ptr_pack=False): 

2646 """ 

2647 Deserialize Type Serialization Version 1 

2648 [MS-RPCE] sect 2.2.6 

2649 

2650 :param ptr_pack: pack in a pointer to the structure. 

2651 """ 

2652 if issubclass(cls, NDRPacket): 

2653 # We use an intermediary class because it uses NDRPacketField which handles 

2654 # deported conformant fields 

2655 if ptr_pack: 

2656 hdrlen = 20 

2657 

2658 class _cls(NDRPacket): 

2659 fields_desc = [NDRFullPointerField(NDRPacketField("pkt", None, cls))] 

2660 

2661 else: 

2662 hdrlen = 16 

2663 

2664 class _cls(NDRPacket): 

2665 fields_desc = [NDRPacketField("pkt", None, cls)] 

2666 

2667 hdr = NDRSerialization1Header(b[:8]) / NDRSerialization1PrivateHeader(b[8:16]) 

2668 endian = {0x00: "big", 0x10: "little"}[hdr.Endianness] 

2669 padlen = (-hdr.ObjectBufferLength) % _TYPE1_S_PAD 

2670 # padlen should be 0 (pad included in length), but some implementations 

2671 # implement apparently misread the spec 

2672 return ( 

2673 hdr 

2674 / _cls( 

2675 b[16 : hdrlen + hdr.ObjectBufferLength], 

2676 ndr64=False, # Only NDR32 is supported in Type 1 

2677 ndrendian=endian, 

2678 ).pkt 

2679 / conf.padding_layer(b[hdrlen + padlen + hdr.ObjectBufferLength :]) 

2680 ) 

2681 return NDRSerialization1Header(b[:8]) / cls(b[8:]) 

2682 

2683 

2684def ndr_serialize1(pkt, ptr_pack=False): 

2685 """ 

2686 Serialize Type Serialization Version 1 

2687 [MS-RPCE] sect 2.2.6 

2688 

2689 :param ptr_pack: pack in a pointer to the structure. 

2690 """ 

2691 pkt = pkt.copy() 

2692 endian = getattr(pkt, "ndrendian", "little") 

2693 if not isinstance(pkt, NDRSerialization1Header): 

2694 if not isinstance(pkt, NDRPacket): 

2695 return bytes(NDRSerialization1Header(Endianness=endian) / pkt) 

2696 if isinstance(pkt, NDRPointer): 

2697 cls = pkt.value.__class__ 

2698 else: 

2699 cls = pkt.__class__ 

2700 val = pkt 

2701 pkt_len = len(pkt) 

2702 # ObjectBufferLength: 

2703 # > It MUST include the padding length and exclude the header itself 

2704 pkt = NDRSerialization1Header( 

2705 Endianness=endian 

2706 ) / NDRSerialization1PrivateHeader( 

2707 ObjectBufferLength=pkt_len + (-pkt_len) % _TYPE1_S_PAD 

2708 ) 

2709 else: 

2710 cls = pkt.value.__class__ 

2711 val = pkt.payload.payload 

2712 pkt.payload.remove_payload() 

2713 

2714 # See above about why we need an intermediary class 

2715 if ptr_pack: 

2716 

2717 class _cls(NDRPacket): 

2718 fields_desc = [NDRFullPointerField(NDRPacketField("pkt", None, cls))] 

2719 

2720 else: 

2721 

2722 class _cls(NDRPacket): 

2723 fields_desc = [NDRPacketField("pkt", None, cls)] 

2724 

2725 ret = bytes(pkt / _cls(pkt=val, ndr64=False, ndrendian=endian)) 

2726 return ret + (-len(ret) % _TYPE1_S_PAD) * b"\x00" 

2727 

2728 

2729class _NDRSerializeType1: 

2730 def __init__(self, *args, **kwargs): 

2731 self.ptr_pack = kwargs.pop("ptr_pack", False) 

2732 super(_NDRSerializeType1, self).__init__(*args, **kwargs) 

2733 

2734 def i2m(self, pkt, val): 

2735 return ndr_serialize1(val, ptr_pack=self.ptr_pack) 

2736 

2737 def m2i(self, pkt, s): 

2738 return ndr_deserialize1(s, self.cls, ptr_pack=self.ptr_pack) 

2739 

2740 def i2len(self, pkt, val): 

2741 return len(self.i2m(pkt, val)) 

2742 

2743 

2744class NDRSerializeType1PacketField(_NDRSerializeType1, PacketField): 

2745 __slots__ = ["ptr_pack"] 

2746 

2747 

2748class NDRSerializeType1PacketLenField(_NDRSerializeType1, PacketLenField): 

2749 __slots__ = ["ptr_pack"] 

2750 

2751 

2752class NDRSerializeType1PacketListField(_NDRSerializeType1, PacketListField): 

2753 __slots__ = ["ptr_pack"] 

2754 

2755 def i2len(self, pkt, val): 

2756 return sum(len(self.i2m(pkt, p)) for p in val) 

2757 

2758 

2759# --- DCE/RPC session 

2760 

2761 

2762class DceRpcSession(DefaultSession): 

2763 """ 

2764 A DCE/RPC session within a TCP socket. 

2765 """ 

2766 

2767 def __init__(self, *args, **kwargs): 

2768 self.rpc_bind_interface: Union[DceRpcInterface, ComInterface] = None 

2769 self.rpc_bind_is_com: bool = False 

2770 self.ndr64 = False 

2771 self.ndrendian = "little" 

2772 self.support_header_signing = kwargs.pop("support_header_signing", True) 

2773 self.header_sign = conf.dcerpc_force_header_signing 

2774 self.ssp = kwargs.pop("ssp", None) 

2775 self.sspcontext = kwargs.pop("sspcontext", None) 

2776 self.auth_level = kwargs.pop("auth_level", None) 

2777 self.sent_cont_ids = [] 

2778 self.cont_id = 0 # Currently selected context 

2779 self.auth_context_id = 0 # Currently selected authentication context 

2780 self.map_callid_opnum = {} 

2781 self.frags = collections.defaultdict(lambda: b"") 

2782 self.sniffsspcontexts = {} # Unfinished contexts for passive 

2783 if conf.dcerpc_session_enable and conf.winssps_passive: 

2784 for ssp in conf.winssps_passive: 

2785 self.sniffsspcontexts[ssp] = None 

2786 super(DceRpcSession, self).__init__(*args, **kwargs) 

2787 

2788 def _up_pkt(self, pkt): 

2789 """ 

2790 Common function to handle the DCE/RPC session: what interfaces are bind, 

2791 opnums, etc. 

2792 """ 

2793 opnum = None 

2794 opts = {} 

2795 if DceRpc5Bind in pkt or DceRpc5AlterContext in pkt: 

2796 # bind => get which RPC interface 

2797 self.sent_cont_ids = [x.cont_id for x in pkt.context_elem] 

2798 for ctx in pkt.context_elem: 

2799 if_uuid = ctx.abstract_syntax.if_uuid 

2800 if_version = ctx.abstract_syntax.if_version 

2801 try: 

2802 self.rpc_bind_interface = DCE_RPC_INTERFACES[(if_uuid, if_version)] 

2803 self.rpc_bind_is_com = False 

2804 except KeyError: 

2805 try: 

2806 self.rpc_bind_interface = COM_INTERFACES[if_uuid] 

2807 self.rpc_bind_is_com = True 

2808 except KeyError: 

2809 self.rpc_bind_interface = None 

2810 log_runtime.warning( 

2811 "Unknown RPC interface %s. Try loading the IDL" % if_uuid 

2812 ) 

2813 elif DceRpc5BindAck in pkt or DceRpc5AlterContextResp in pkt: 

2814 # bind ack => is it NDR64 

2815 for i, res in enumerate(pkt.results): 

2816 if res.result == 0: # Accepted 

2817 # Context 

2818 try: 

2819 self.cont_id = self.sent_cont_ids[i] 

2820 except IndexError: 

2821 self.cont_id = 0 

2822 finally: 

2823 self.sent_cont_ids = [] 

2824 

2825 # Endianness 

2826 self.ndrendian = {0: "big", 1: "little"}[pkt[DceRpc5].endian] 

2827 

2828 # Transfer syntax 

2829 if res.transfer_syntax.sprintf("%if_uuid%") == "NDR64": 

2830 self.ndr64 = True 

2831 elif DceRpc5Request in pkt: 

2832 # request => match opnum with callID 

2833 opnum = pkt.opnum 

2834 if self.rpc_bind_is_com: 

2835 self.map_callid_opnum[pkt.call_id] = ( 

2836 opnum, 

2837 pkt[DceRpc5Request].payload.payload, 

2838 ) 

2839 else: 

2840 self.map_callid_opnum[pkt.call_id] = opnum, pkt[DceRpc5Request].payload 

2841 elif DceRpc5Response in pkt: 

2842 # response => get opnum from table 

2843 try: 

2844 opnum, opts["request_packet"] = self.map_callid_opnum[pkt.call_id] 

2845 del self.map_callid_opnum[pkt.call_id] 

2846 except KeyError: 

2847 log_runtime.info("Unknown call_id %s in DCE/RPC session" % pkt.call_id) 

2848 # Bind / Alter request/response specific 

2849 if ( 

2850 DceRpc5Bind in pkt 

2851 or DceRpc5AlterContext in pkt 

2852 or DceRpc5BindAck in pkt 

2853 or DceRpc5AlterContextResp in pkt 

2854 ): 

2855 # Detect if "Header Signing" is in use 

2856 if pkt.pfc_flags & 0x04: # PFC_SUPPORT_HEADER_SIGN 

2857 self.header_sign = True 

2858 return opnum, opts 

2859 

2860 # [C706] sect 12.6.2 - Fragmentation and Reassembly 

2861 # Since the connection-oriented transport guarantees sequentiality, the receiver 

2862 # will always receive the fragments in order. 

2863 

2864 def _defragment(self, pkt, body=None): 

2865 """ 

2866 Function to defragment DCE/RPC packets. 

2867 """ 

2868 uid = pkt.call_id 

2869 if pkt.pfc_flags.PFC_FIRST_FRAG and pkt.pfc_flags.PFC_LAST_FRAG: 

2870 # Not fragmented 

2871 return body 

2872 if pkt.pfc_flags.PFC_FIRST_FRAG or uid in self.frags: 

2873 # Packet is fragmented 

2874 if body is None: 

2875 body = pkt[DceRpc5].payload.payload.original 

2876 self.frags[uid] += body 

2877 if pkt.pfc_flags.PFC_LAST_FRAG: 

2878 return self.frags[uid] 

2879 else: 

2880 # Not fragmented 

2881 return body 

2882 

2883 # C706 sect 12.5.2.15 - PDU Body Length 

2884 # "The maximum PDU body size is 65528 bytes." 

2885 MAX_PDU_BODY_SIZE = 4176 

2886 

2887 def _fragment(self, pkt, body): 

2888 """ 

2889 Function to fragment DCE/RPC packets. 

2890 """ 

2891 if len(body) > self.MAX_PDU_BODY_SIZE: 

2892 # Clear any PFC_*_FRAG flag 

2893 pkt.pfc_flags &= 0xFC 

2894 

2895 # Iterate through fragments 

2896 cur = None 

2897 while body: 

2898 # Create a fragment 

2899 pkt_frag = pkt.copy() 

2900 

2901 if cur is None: 

2902 # It's the first one 

2903 pkt_frag.pfc_flags += "PFC_FIRST_FRAG" 

2904 

2905 # Split 

2906 cur, body = ( 

2907 body[: self.MAX_PDU_BODY_SIZE], 

2908 body[self.MAX_PDU_BODY_SIZE :], 

2909 ) 

2910 

2911 if not body: 

2912 # It's the last one 

2913 pkt_frag.pfc_flags += "PFC_LAST_FRAG" 

2914 yield pkt_frag, cur 

2915 else: 

2916 yield pkt, body 

2917 

2918 # [MS-RPCE] sect 3.3.1.5.2.2 

2919 

2920 # The PDU header, PDU body, and sec_trailer MUST be passed in the input message, in 

2921 # this order, to GSS_WrapEx, GSS_UnwrapEx, GSS_GetMICEx, and GSS_VerifyMICEx. For 

2922 # integrity protection the sign flag for that PDU segment MUST be set to TRUE, else 

2923 # it MUST be set to FALSE. For confidentiality protection, the conf_req_flag for 

2924 # that PDU segment MUST be set to TRUE, else it MUST be set to FALSE. 

2925 

2926 # If the authentication level is RPC_C_AUTHN_LEVEL_PKT_PRIVACY, the PDU body will 

2927 # be encrypted. 

2928 # The PDU body from the output message of GSS_UnwrapEx represents the plain text 

2929 # version of the PDU body. The PDU header and sec_trailer output from the output 

2930 # message SHOULD be ignored. 

2931 # Similarly the signature output SHOULD be ignored. 

2932 

2933 def in_pkt(self, pkt): 

2934 # Check for encrypted payloads 

2935 body = None 

2936 if conf.raw_layer in pkt.payload: 

2937 body = bytes(pkt.payload[conf.raw_layer]) 

2938 # If we are doing passive sniffing 

2939 if conf.dcerpc_session_enable and conf.winssps_passive: 

2940 # We have Windows SSPs, and no current context 

2941 if pkt.auth_verifier and pkt.auth_verifier.is_ssp(): 

2942 # This is a bind/alter/auth3 req/resp 

2943 for ssp in self.sniffsspcontexts: 

2944 self.sniffsspcontexts[ssp], status = ssp.GSS_Passive( 

2945 self.sniffsspcontexts[ssp], 

2946 pkt.auth_verifier.auth_value, 

2947 req_flags=GSS_S_FLAGS.GSS_S_ALLOW_MISSING_BINDINGS 

2948 | GSS_C_FLAGS.GSS_C_DCE_STYLE, 

2949 ) 

2950 if status == GSS_S_COMPLETE: 

2951 self.auth_level = DCE_C_AUTHN_LEVEL( 

2952 int(pkt.auth_verifier.auth_level) 

2953 ) 

2954 self.ssp = ssp 

2955 self.sspcontext = self.sniffsspcontexts[ssp] 

2956 self.sniffsspcontexts[ssp] = None 

2957 elif ( 

2958 self.sspcontext 

2959 and pkt.auth_verifier 

2960 and pkt.auth_verifier.is_protected() 

2961 and body 

2962 ): 

2963 # This is a request/response 

2964 if self.sspcontext.passive: 

2965 self.ssp.GSS_Passive_set_Direction( 

2966 self.sspcontext, 

2967 IsAcceptor=DceRpc5Response in pkt, 

2968 ) 

2969 if pkt.auth_verifier and pkt.auth_verifier.is_protected() and body: 

2970 if self.sspcontext is None: 

2971 return pkt 

2972 if self.auth_level in ( 

2973 RPC_C_AUTHN_LEVEL.PKT_INTEGRITY, 

2974 RPC_C_AUTHN_LEVEL.PKT_PRIVACY, 

2975 ): 

2976 # note: 'vt_trailer' is included in the pdu body 

2977 # [MS-RPCE] sect 2.2.2.13 

2978 # "The data structures MUST only appear in a request PDU, and they 

2979 # SHOULD be placed in the PDU immediately after the stub data but 

2980 # before the authentication padding octets. Therefore, for security 

2981 # purposes, the verification trailer is considered part of the PDU 

2982 # body." 

2983 if pkt.vt_trailer: 

2984 body += bytes(pkt.vt_trailer) 

2985 # Account for padding when computing checksum/encryption 

2986 if pkt.auth_padding: 

2987 body += pkt.auth_padding 

2988 

2989 # Build pdu_header and sec_trailer 

2990 pdu_header = pkt.copy() 

2991 sec_trailer = pdu_header.auth_verifier 

2992 # sec_trailer: include the sec_trailer but not the Authentication token 

2993 authval_len = len(sec_trailer.auth_value) 

2994 # Discard everything out of the header 

2995 pdu_header.auth_padding = None 

2996 pdu_header.auth_verifier = None 

2997 pdu_header.payload.payload = NoPayload() 

2998 pdu_header.vt_trailer = None 

2999 

3000 # [MS-RPCE] sect 2.2.2.12 

3001 if self.auth_level == RPC_C_AUTHN_LEVEL.PKT_PRIVACY: 

3002 _msgs = self.ssp.GSS_UnwrapEx( 

3003 self.sspcontext, 

3004 [ 

3005 # "PDU header" 

3006 SSP.WRAP_MSG( 

3007 conf_req_flag=False, 

3008 sign=self.header_sign, 

3009 data=bytes(pdu_header), 

3010 ), 

3011 # "PDU body" 

3012 SSP.WRAP_MSG( 

3013 conf_req_flag=True, 

3014 sign=True, 

3015 data=body, 

3016 ), 

3017 # "sec_trailer" 

3018 SSP.WRAP_MSG( 

3019 conf_req_flag=False, 

3020 sign=self.header_sign, 

3021 data=bytes(sec_trailer)[:-authval_len], 

3022 ), 

3023 ], 

3024 pkt.auth_verifier.auth_value, 

3025 ) 

3026 body = _msgs[1].data # PDU body 

3027 elif self.auth_level == RPC_C_AUTHN_LEVEL.PKT_INTEGRITY: 

3028 self.ssp.GSS_VerifyMICEx( 

3029 self.sspcontext, 

3030 [ 

3031 # "PDU header" 

3032 SSP.MIC_MSG( 

3033 sign=self.header_sign, 

3034 data=bytes(pdu_header), 

3035 ), 

3036 # "PDU body" 

3037 SSP.MIC_MSG( 

3038 sign=True, 

3039 data=body, 

3040 ), 

3041 # "sec_trailer" 

3042 SSP.MIC_MSG( 

3043 sign=self.header_sign, 

3044 data=bytes(sec_trailer)[:-authval_len], 

3045 ), 

3046 ], 

3047 pkt.auth_verifier.auth_value, 

3048 ) 

3049 # Put padding back into the header 

3050 if pkt.auth_padding: 

3051 padlen = len(pkt.auth_padding) 

3052 body, pkt.auth_padding = body[:-padlen], body[-padlen:] 

3053 # Put back vt_trailer into the header, if present. 

3054 if _SECTRAILER_MAGIC in body: 

3055 body, pkt.vt_trailer = pkt.get_field("vt_trailer").getfield( 

3056 pkt, body 

3057 ) 

3058 # If it's a request / response, could be fragmented 

3059 if isinstance(pkt.payload, (DceRpc5Request, DceRpc5Response)) and body: 

3060 body = self._defragment(pkt, body) 

3061 if not body: 

3062 return 

3063 # Get opnum and options 

3064 opnum, opts = self._up_pkt(pkt) 

3065 # Try to parse the payload 

3066 if opnum is not None and self.rpc_bind_interface: 

3067 # use opnum to parse the payload 

3068 is_response = DceRpc5Response in pkt 

3069 try: 

3070 cls = self.rpc_bind_interface.opnums[opnum][is_response] 

3071 except KeyError: 

3072 log_runtime.warning( 

3073 "Unknown opnum %s for interface %s" 

3074 % (opnum, self.rpc_bind_interface) 

3075 ) 

3076 pkt.payload[conf.raw_layer].load = body 

3077 return pkt 

3078 if body: 

3079 orpc = None 

3080 if self.rpc_bind_is_com: 

3081 # If interface is a COM interface, start off by dissecting the 

3082 # ORPCTHIS / ORPCTHAT argument 

3083 from scapy.layers.msrpce.raw.ms_dcom import ORPCTHAT, ORPCTHIS 

3084 

3085 # [MS-DCOM] sect 2.2.13 

3086 # "ORPCTHIS and ORPCTHAT structures MUST be marshaled using 

3087 # the NDR (32) Transfer Syntax" 

3088 if is_response: 

3089 orpc = ORPCTHAT(body, ndr64=False) 

3090 else: 

3091 orpc = ORPCTHIS(body, ndr64=False) 

3092 body = orpc.load 

3093 orpc.remove_payload() 

3094 # Dissect payload using class 

3095 try: 

3096 payload = cls( 

3097 body, ndr64=self.ndr64, ndrendian=self.ndrendian, **opts 

3098 ) 

3099 except Exception: 

3100 if conf.debug_dissector: 

3101 log_runtime.error("%s dissector failed", cls.__name__) 

3102 if cls is not None: 

3103 raise 

3104 payload = conf.raw_layer(body, _internal=1) 

3105 pkt.payload[conf.raw_layer].underlayer.remove_payload() 

3106 if conf.padding_layer in payload: 

3107 # Most likely, dissection failed. 

3108 log_runtime.warning( 

3109 "Padding detected when dissecting %s. Looks wrong." % cls 

3110 ) 

3111 pad = payload[conf.padding_layer] 

3112 pad.underlayer.payload = conf.raw_layer(load=pad.load) 

3113 if orpc is not None: 

3114 pkt /= orpc 

3115 pkt /= payload 

3116 # If a request was encrypted, we need to re-register it once re-parsed. 

3117 if not is_response and self.auth_level == RPC_C_AUTHN_LEVEL.PKT_PRIVACY: 

3118 self._up_pkt(pkt) 

3119 elif not cls.fields_desc: 

3120 # Request class has no payload 

3121 pkt /= cls(ndr64=self.ndr64, ndrendian=self.ndrendian, **opts) 

3122 elif body: 

3123 pkt.payload[conf.raw_layer].load = body 

3124 return pkt 

3125 

3126 def out_pkt(self, pkt): 

3127 assert DceRpc5 in pkt 

3128 # Register opnum and options 

3129 self._up_pkt(pkt) 

3130 

3131 # If it's a request / response, we can frag it 

3132 if isinstance(pkt.payload, (DceRpc5Request, DceRpc5Response)): 

3133 # The list of packet responses 

3134 pkts = [] 

3135 # Take the body payload, and eventually split it 

3136 body = bytes(pkt.payload.payload) 

3137 

3138 for pkt, body in self._fragment(pkt, body): 

3139 if pkt.auth_verifier is not None: 

3140 # Verifier already set 

3141 pkts.append(pkt) 

3142 continue 

3143 

3144 # Sign / Encrypt 

3145 if self.sspcontext: 

3146 signature = None 

3147 if self.auth_level in ( 

3148 RPC_C_AUTHN_LEVEL.PKT_INTEGRITY, 

3149 RPC_C_AUTHN_LEVEL.PKT_PRIVACY, 

3150 ): 

3151 # Remember that vt_trailer is included in the PDU 

3152 if pkt.vt_trailer: 

3153 body += bytes(pkt.vt_trailer) 

3154 # Account for padding when computing checksum/encryption 

3155 if pkt.auth_padding is None: 

3156 padlen = (-len(body)) % _COMMON_AUTH_PAD # authdata padding 

3157 pkt.auth_padding = b"\x00" * padlen 

3158 else: 

3159 padlen = len(pkt.auth_padding) 

3160 # Remember that padding IS SIGNED & ENCRYPTED 

3161 body += pkt.auth_padding 

3162 # Add the auth_verifier 

3163 pkt.auth_verifier = CommonAuthVerifier( 

3164 auth_type=self.ssp.auth_type, 

3165 auth_level=self.auth_level, 

3166 auth_context_id=self.auth_context_id, 

3167 auth_pad_length=padlen, 

3168 # Note: auth_value should have the correct length because 

3169 # when using PFC_SUPPORT_HEADER_SIGN, auth_len 

3170 # (and frag_len) is included in the token.. but this 

3171 # creates a dependency loop as you'd need to know the token 

3172 # length to compute the token. Windows solves this by 

3173 # setting the 'Maximum Signature Length' (or something 

3174 # similar) beforehand, instead of the real length. 

3175 # See `gensec_sig_size` in samba. 

3176 auth_value=b"\x00" 

3177 * self.ssp.MaximumSignatureLength(self.sspcontext), 

3178 ) 

3179 # Build pdu_header and sec_trailer 

3180 pdu_header = pkt.copy() 

3181 pdu_header.auth_len = len(pdu_header.auth_verifier) - 8 

3182 pdu_header.frag_len = len(pdu_header) 

3183 sec_trailer = pdu_header.auth_verifier 

3184 # sec_trailer: include the sec_trailer but not the 

3185 # Authentication token 

3186 authval_len = len(sec_trailer.auth_value) 

3187 # sec_trailer.auth_value = None 

3188 # Discard everything out of the header 

3189 pdu_header.auth_padding = None 

3190 pdu_header.auth_verifier = None 

3191 pdu_header.payload.payload = NoPayload() 

3192 pdu_header.vt_trailer = None 

3193 signature = None 

3194 # [MS-RPCE] sect 2.2.2.12 

3195 if self.auth_level == RPC_C_AUTHN_LEVEL.PKT_PRIVACY: 

3196 _msgs, signature = self.ssp.GSS_WrapEx( 

3197 self.sspcontext, 

3198 [ 

3199 # "PDU header" 

3200 SSP.WRAP_MSG( 

3201 conf_req_flag=False, 

3202 sign=self.header_sign, 

3203 data=bytes(pdu_header), 

3204 ), 

3205 # "PDU body" 

3206 SSP.WRAP_MSG( 

3207 conf_req_flag=True, 

3208 sign=True, 

3209 data=body, 

3210 ), 

3211 # "sec_trailer" 

3212 SSP.WRAP_MSG( 

3213 conf_req_flag=False, 

3214 sign=self.header_sign, 

3215 data=bytes(sec_trailer)[:-authval_len], 

3216 ), 

3217 ], 

3218 ) 

3219 s = _msgs[1].data # PDU body 

3220 elif self.auth_level == RPC_C_AUTHN_LEVEL.PKT_INTEGRITY: 

3221 signature = self.ssp.GSS_GetMICEx( 

3222 self.sspcontext, 

3223 [ 

3224 # "PDU header" 

3225 SSP.MIC_MSG( 

3226 sign=self.header_sign, 

3227 data=bytes(pdu_header), 

3228 ), 

3229 # "PDU body" 

3230 SSP.MIC_MSG( 

3231 sign=True, 

3232 data=body, 

3233 ), 

3234 # "sec_trailer" 

3235 SSP.MIC_MSG( 

3236 sign=self.header_sign, 

3237 data=bytes(sec_trailer)[:-authval_len], 

3238 ), 

3239 ], 

3240 pkt.auth_verifier.auth_value, 

3241 ) 

3242 s = body 

3243 else: 

3244 raise ValueError("Impossible") 

3245 # Put padding back in the header 

3246 if padlen: 

3247 s, pkt.auth_padding = s[:-padlen], s[-padlen:] 

3248 # Put back vt_trailer into the header 

3249 if pkt.vt_trailer: 

3250 vtlen = len(pkt.vt_trailer) 

3251 s, pkt.vt_trailer = s[:-vtlen], s[-vtlen:] 

3252 else: 

3253 s = body 

3254 

3255 # now inject the encrypted payload into the packet 

3256 pkt.payload.payload = conf.raw_layer(load=s) 

3257 # and the auth_value 

3258 if signature: 

3259 pkt.auth_verifier.auth_value = signature 

3260 else: 

3261 pkt.auth_verifier = None 

3262 # Add to the list 

3263 pkts.append(pkt) 

3264 return pkts 

3265 else: 

3266 return [pkt] 

3267 

3268 def process(self, pkt: Packet) -> Optional[Packet]: 

3269 """ 

3270 Used when DceRpcSession is used for passive sniffing. 

3271 """ 

3272 pkt = super(DceRpcSession, self).process(pkt) 

3273 if pkt is not None and DceRpc5 in pkt: 

3274 rpkt = self.in_pkt(pkt) 

3275 if rpkt is None: 

3276 # We are passively dissecting a fragmented packet. Return 

3277 # just the header showing that it was indeed, fragmented. 

3278 pkt[DceRpc5].payload.remove_payload() 

3279 return pkt 

3280 return rpkt 

3281 return pkt 

3282 

3283 

3284class DceRpcSocket(StreamSocket): 

3285 """ 

3286 A Wrapper around StreamSocket that uses a DceRpcSession 

3287 """ 

3288 

3289 def __init__(self, *args, **kwargs): 

3290 self.transport = kwargs.pop("transport", None) 

3291 self.session = DceRpcSession( 

3292 ssp=kwargs.pop("ssp", None), 

3293 auth_level=kwargs.pop("auth_level", None), 

3294 support_header_signing=kwargs.pop("support_header_signing", True), 

3295 ) 

3296 super(DceRpcSocket, self).__init__(*args, **kwargs) 

3297 

3298 def send(self, x, **kwargs): 

3299 for pkt in self.session.out_pkt(x): 

3300 if self.transport == DCERPC_Transport.NCACN_NP: 

3301 # In this case DceRpcSocket wraps a SMB_RPC_SOCKET, call it directly. 

3302 self.ins.send(pkt, **kwargs) 

3303 else: 

3304 super(DceRpcSocket, self).send(pkt, **kwargs) 

3305 

3306 def recv(self, x=None): 

3307 pkt = super(DceRpcSocket, self).recv(x) 

3308 if pkt is not None: 

3309 return self.session.in_pkt(pkt) 

3310 

3311 

3312# --- TODO cleanup below 

3313 

3314# Heuristically way to find the payload class 

3315# 

3316# To add a possible payload to a DCE/RPC packet, one must first create the 

3317# packet class, then instead of binding layers using bind_layers, he must 

3318# call DceRpcPayload.register_possible_payload() with the payload class as 

3319# parameter. 

3320# 

3321# To be able to decide if the payload class is capable of handling the rest of 

3322# the dissection, the classmethod can_handle() should be implemented in the 

3323# payload class. This method is given the rest of the string to dissect as 

3324# first argument, and the DceRpc packet instance as second argument. Based on 

3325# this information, the method must return True if the class is capable of 

3326# handling the dissection, False otherwise 

3327 

3328 

3329class DceRpc4Payload(Packet): 

3330 """Dummy class which use the dispatch_hook to find the payload class""" 

3331 

3332 _payload_class = [] 

3333 

3334 @classmethod 

3335 def dispatch_hook(cls, _pkt, _underlayer=None, *args, **kargs): 

3336 """dispatch_hook to choose among different registered payloads""" 

3337 for klass in cls._payload_class: 

3338 if hasattr(klass, "can_handle") and klass.can_handle(_pkt, _underlayer): 

3339 return klass 

3340 log_runtime.warning("DCE/RPC payload class not found or undefined (using Raw)") 

3341 return Raw 

3342 

3343 @classmethod 

3344 def register_possible_payload(cls, pay): 

3345 """Method to call from possible DCE/RPC endpoint to register it as 

3346 possible payload""" 

3347 cls._payload_class.append(pay) 

3348 

3349 

3350bind_layers(DceRpc4, DceRpc4Payload)