souleyez 2.43.29__py3-none-any.whl → 3.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9564 -2881
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +564 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +409 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +417 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +913 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +219 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +237 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23034 -10679
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/METADATA +2 -2
- souleyez-3.0.0.dist-info/RECORD +443 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/WHEEL +1 -1
- souleyez-2.43.29.dist-info/RECORD +0 -379
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,417 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Handler for NetExec (nxc) - successor to CrackMapExec.
|
|
4
|
+
Parses shares, credentials, and authentication results.
|
|
5
|
+
"""
|
|
6
|
+
import logging
|
|
7
|
+
import os
|
|
8
|
+
import re
|
|
9
|
+
from typing import Any, Dict, Optional
|
|
10
|
+
|
|
11
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
12
|
+
|
|
13
|
+
logger = logging.getLogger(__name__)
|
|
14
|
+
|
|
15
|
+
STATUS_DONE = "done"
|
|
16
|
+
STATUS_ERROR = "error"
|
|
17
|
+
STATUS_WARNING = "warning"
|
|
18
|
+
STATUS_NO_RESULTS = "no_results"
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
class NxcHandler(BaseToolHandler):
|
|
22
|
+
"""Handler for NetExec SMB/WinRM/etc enumeration."""
|
|
23
|
+
|
|
24
|
+
tool_name = "nxc"
|
|
25
|
+
display_name = "NetExec"
|
|
26
|
+
|
|
27
|
+
has_error_handler = True
|
|
28
|
+
has_warning_handler = True
|
|
29
|
+
has_no_results_handler = True
|
|
30
|
+
has_done_handler = True
|
|
31
|
+
|
|
32
|
+
# Patterns for parsing
|
|
33
|
+
SHARE_PATTERN = r"^\s*(\S+)\s+(READ|WRITE|READ,WRITE|NO ACCESS)\s*(.*)$"
|
|
34
|
+
VALID_CRED_PATTERN = r"\[\+\]\s+(\S+)\\([^:]+):([^\s]+)"
|
|
35
|
+
PWNED_PATTERN = r"\(Pwn3d!\)"
|
|
36
|
+
|
|
37
|
+
def parse_job(
|
|
38
|
+
self,
|
|
39
|
+
engagement_id: int,
|
|
40
|
+
log_path: str,
|
|
41
|
+
job: Dict[str, Any],
|
|
42
|
+
host_manager: Optional[Any] = None,
|
|
43
|
+
findings_manager: Optional[Any] = None,
|
|
44
|
+
credentials_manager: Optional[Any] = None,
|
|
45
|
+
) -> Dict[str, Any]:
|
|
46
|
+
"""Parse nxc results."""
|
|
47
|
+
try:
|
|
48
|
+
target = job.get("target", "")
|
|
49
|
+
if not log_path or not os.path.exists(log_path):
|
|
50
|
+
return {
|
|
51
|
+
"tool": "nxc",
|
|
52
|
+
"status": STATUS_ERROR,
|
|
53
|
+
"error": "Log file not found",
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
57
|
+
log_content = f.read()
|
|
58
|
+
|
|
59
|
+
# Strip ANSI codes
|
|
60
|
+
log_content = re.sub(r"\x1b\[[0-9;]*m", "", log_content)
|
|
61
|
+
|
|
62
|
+
shares = []
|
|
63
|
+
readable_shares = []
|
|
64
|
+
writable_shares = []
|
|
65
|
+
credentials = []
|
|
66
|
+
expired_credentials = [] # Credentials that need password change
|
|
67
|
+
is_pwned = False
|
|
68
|
+
domain = ""
|
|
69
|
+
hostname = ""
|
|
70
|
+
|
|
71
|
+
# Parse domain/hostname from banner
|
|
72
|
+
# Format: SMB 10.129.234.72 445 DC [*] Windows Server 2022 (name:DC) (domain:baby2.vl)
|
|
73
|
+
banner_match = re.search(
|
|
74
|
+
r"\(name:([^)]+)\).*\(domain:([^)]+)\)", log_content
|
|
75
|
+
)
|
|
76
|
+
if banner_match:
|
|
77
|
+
hostname = banner_match.group(1)
|
|
78
|
+
domain = banner_match.group(2)
|
|
79
|
+
|
|
80
|
+
# Check for Pwn3d (SMB admin access)
|
|
81
|
+
if re.search(self.PWNED_PATTERN, log_content):
|
|
82
|
+
is_pwned = True
|
|
83
|
+
|
|
84
|
+
# Check for SSH Shell access (Linux)
|
|
85
|
+
# Format: [+] leia_organa:help_me_obiwan Linux - Shell access!
|
|
86
|
+
has_shell_access = False
|
|
87
|
+
if "Shell access!" in log_content:
|
|
88
|
+
has_shell_access = True
|
|
89
|
+
# Parse SSH credentials
|
|
90
|
+
ssh_cred_pattern = r"\[\+\]\s+([^:\s]+):(\S+)\s+.*Shell access!"
|
|
91
|
+
for match in re.finditer(ssh_cred_pattern, log_content):
|
|
92
|
+
username = match.group(1)
|
|
93
|
+
password = match.group(2)
|
|
94
|
+
cred = {
|
|
95
|
+
"username": username,
|
|
96
|
+
"password": password,
|
|
97
|
+
"domain": "",
|
|
98
|
+
"service": "ssh",
|
|
99
|
+
"status": "valid",
|
|
100
|
+
}
|
|
101
|
+
credentials.append(cred)
|
|
102
|
+
|
|
103
|
+
# Store in database
|
|
104
|
+
if credentials_manager and host_manager:
|
|
105
|
+
try:
|
|
106
|
+
host = host_manager.get_host_by_ip(engagement_id, target)
|
|
107
|
+
if host:
|
|
108
|
+
credentials_manager.add_credential(
|
|
109
|
+
engagement_id=engagement_id,
|
|
110
|
+
host_id=host["id"],
|
|
111
|
+
username=username,
|
|
112
|
+
password=password,
|
|
113
|
+
service="ssh",
|
|
114
|
+
port=22,
|
|
115
|
+
credential_type="password",
|
|
116
|
+
tool="nxc",
|
|
117
|
+
status="valid",
|
|
118
|
+
)
|
|
119
|
+
logger.warning(
|
|
120
|
+
f"SSH SHELL ACCESS: {username}:{password} on {target}"
|
|
121
|
+
)
|
|
122
|
+
except Exception as e:
|
|
123
|
+
logger.debug(f"Could not store SSH credential: {e}")
|
|
124
|
+
|
|
125
|
+
# Parse valid credentials
|
|
126
|
+
# Format: [+] baby2.vl\Carl.Moore:Carl.Moore
|
|
127
|
+
for match in re.finditer(self.VALID_CRED_PATTERN, log_content):
|
|
128
|
+
domain_part = match.group(1)
|
|
129
|
+
username = match.group(2)
|
|
130
|
+
password = match.group(3)
|
|
131
|
+
|
|
132
|
+
cred = {
|
|
133
|
+
"username": username,
|
|
134
|
+
"password": password,
|
|
135
|
+
"domain": domain_part,
|
|
136
|
+
"service": "smb",
|
|
137
|
+
"status": "valid",
|
|
138
|
+
}
|
|
139
|
+
credentials.append(cred)
|
|
140
|
+
|
|
141
|
+
# Store in database
|
|
142
|
+
if credentials_manager and host_manager:
|
|
143
|
+
try:
|
|
144
|
+
host = host_manager.get_host_by_ip(engagement_id, target)
|
|
145
|
+
if host:
|
|
146
|
+
credentials_manager.add_credential(
|
|
147
|
+
engagement_id=engagement_id,
|
|
148
|
+
host_id=host["id"],
|
|
149
|
+
username=username,
|
|
150
|
+
password=password,
|
|
151
|
+
service="smb",
|
|
152
|
+
credential_type="password",
|
|
153
|
+
tool="nxc",
|
|
154
|
+
status="valid",
|
|
155
|
+
)
|
|
156
|
+
logger.warning(
|
|
157
|
+
f"CREDENTIAL FOUND: {domain_part}\\{username}:{password}"
|
|
158
|
+
)
|
|
159
|
+
except Exception as e:
|
|
160
|
+
logger.debug(f"Could not store credential: {e}")
|
|
161
|
+
|
|
162
|
+
# Parse expired credentials (STATUS_PASSWORD_MUST_CHANGE)
|
|
163
|
+
# Format: [-] baby.vl\Caroline.Robinson:BabyStart123! STATUS_PASSWORD_MUST_CHANGE
|
|
164
|
+
expired_pattern = (
|
|
165
|
+
r"\[-\]\s+(\S+)\\([^:]+):(\S+)\s+STATUS_PASSWORD_MUST_CHANGE"
|
|
166
|
+
)
|
|
167
|
+
for match in re.finditer(expired_pattern, log_content):
|
|
168
|
+
domain_part = match.group(1)
|
|
169
|
+
username = match.group(2)
|
|
170
|
+
password = match.group(3)
|
|
171
|
+
|
|
172
|
+
cred = {
|
|
173
|
+
"username": username,
|
|
174
|
+
"password": password,
|
|
175
|
+
"domain": domain_part,
|
|
176
|
+
"service": "smb",
|
|
177
|
+
"status": "expired",
|
|
178
|
+
}
|
|
179
|
+
expired_credentials.append(cred)
|
|
180
|
+
|
|
181
|
+
# Store in database with expired status
|
|
182
|
+
if credentials_manager and host_manager:
|
|
183
|
+
try:
|
|
184
|
+
host = host_manager.get_host_by_ip(engagement_id, target)
|
|
185
|
+
if host:
|
|
186
|
+
credentials_manager.add_credential(
|
|
187
|
+
engagement_id=engagement_id,
|
|
188
|
+
host_id=host["id"],
|
|
189
|
+
username=username,
|
|
190
|
+
password=password,
|
|
191
|
+
service="smb",
|
|
192
|
+
credential_type="password",
|
|
193
|
+
tool="nxc",
|
|
194
|
+
status="expired",
|
|
195
|
+
)
|
|
196
|
+
logger.warning(
|
|
197
|
+
f"EXPIRED CREDENTIAL FOUND: {domain_part}\\{username}:{password} - PASSWORD MUST CHANGE"
|
|
198
|
+
)
|
|
199
|
+
except Exception as e:
|
|
200
|
+
logger.debug(f"Could not store expired credential: {e}")
|
|
201
|
+
|
|
202
|
+
# Parse shares
|
|
203
|
+
# nxc format: SMB IP PORT HOST ShareName Permissions Remark
|
|
204
|
+
# Example: SMB 10.129.234.72 445 DC homes READ,WRITE
|
|
205
|
+
share_section = False
|
|
206
|
+
for line in log_content.split("\n"):
|
|
207
|
+
if "Enumerated shares" in line:
|
|
208
|
+
share_section = True
|
|
209
|
+
continue
|
|
210
|
+
if share_section and line.strip():
|
|
211
|
+
# Skip header and separator lines
|
|
212
|
+
if "Share" in line and "Permissions" in line and "Remark" in line:
|
|
213
|
+
continue
|
|
214
|
+
if "-----" in line:
|
|
215
|
+
continue
|
|
216
|
+
# Stop at completion marker
|
|
217
|
+
if "=== Completed" in line or "Exit Code" in line:
|
|
218
|
+
break
|
|
219
|
+
|
|
220
|
+
# nxc output has: SMB IP PORT HOST ShareName Permissions Comment
|
|
221
|
+
# Parse by splitting on whitespace and extracting after the hostname
|
|
222
|
+
parts = line.split()
|
|
223
|
+
if len(parts) >= 5 and parts[0] == "SMB":
|
|
224
|
+
# Find the share name - it's after the hostname (4th column)
|
|
225
|
+
# Format: SMB IP PORT HOSTNAME SHARENAME [PERMISSIONS] [COMMENT...]
|
|
226
|
+
# Index: 0 1 2 3 4 5 6+
|
|
227
|
+
share_name = parts[4] if len(parts) > 4 else ""
|
|
228
|
+
|
|
229
|
+
# Skip metadata lines
|
|
230
|
+
if not share_name or share_name in [
|
|
231
|
+
"[*]",
|
|
232
|
+
"[+]",
|
|
233
|
+
"[-]",
|
|
234
|
+
"Share",
|
|
235
|
+
]:
|
|
236
|
+
continue
|
|
237
|
+
|
|
238
|
+
# Permissions (if present) - look for READ, WRITE, READ,WRITE
|
|
239
|
+
perms = ""
|
|
240
|
+
comment = ""
|
|
241
|
+
if len(parts) > 5:
|
|
242
|
+
# Check if 5th element is a permission
|
|
243
|
+
if parts[5] in ["READ", "WRITE", "READ,WRITE"]:
|
|
244
|
+
perms = parts[5]
|
|
245
|
+
comment = " ".join(parts[6:]) if len(parts) > 6 else ""
|
|
246
|
+
else:
|
|
247
|
+
# No permissions, rest is comment
|
|
248
|
+
comment = " ".join(parts[5:])
|
|
249
|
+
|
|
250
|
+
share = {
|
|
251
|
+
"name": share_name,
|
|
252
|
+
"permissions": perms,
|
|
253
|
+
"comment": comment,
|
|
254
|
+
}
|
|
255
|
+
shares.append(share)
|
|
256
|
+
|
|
257
|
+
if "READ" in perms:
|
|
258
|
+
readable_shares.append(share)
|
|
259
|
+
if "WRITE" in perms:
|
|
260
|
+
writable_shares.append(share)
|
|
261
|
+
|
|
262
|
+
# Determine status
|
|
263
|
+
# Check for transient errors first (should trigger retry)
|
|
264
|
+
transient_errors = [
|
|
265
|
+
"NetBIOSTimeout",
|
|
266
|
+
"connection timed out",
|
|
267
|
+
"Connection reset",
|
|
268
|
+
]
|
|
269
|
+
has_transient_error = any(
|
|
270
|
+
err.lower() in log_content.lower() for err in transient_errors
|
|
271
|
+
)
|
|
272
|
+
|
|
273
|
+
if credentials:
|
|
274
|
+
status = STATUS_DONE
|
|
275
|
+
elif has_shell_access:
|
|
276
|
+
status = STATUS_DONE # SSH shell access without parsed creds
|
|
277
|
+
elif expired_credentials:
|
|
278
|
+
status = STATUS_WARNING # Expired creds need attention
|
|
279
|
+
elif shares:
|
|
280
|
+
status = STATUS_DONE
|
|
281
|
+
elif has_transient_error:
|
|
282
|
+
status = STATUS_WARNING # Transient error - may be retried
|
|
283
|
+
elif (
|
|
284
|
+
"STATUS_LOGON_FAILURE" in log_content
|
|
285
|
+
or "STATUS_ACCESS_DENIED" in log_content
|
|
286
|
+
):
|
|
287
|
+
status = STATUS_NO_RESULTS
|
|
288
|
+
else:
|
|
289
|
+
status = STATUS_NO_RESULTS
|
|
290
|
+
|
|
291
|
+
# Build summary
|
|
292
|
+
summary_parts = []
|
|
293
|
+
if credentials:
|
|
294
|
+
summary_parts.append(f"{len(credentials)} valid credential(s)")
|
|
295
|
+
if expired_credentials:
|
|
296
|
+
summary_parts.append(
|
|
297
|
+
f"{len(expired_credentials)} expired credential(s)"
|
|
298
|
+
)
|
|
299
|
+
if is_pwned:
|
|
300
|
+
summary_parts.append("PWNED!")
|
|
301
|
+
if has_shell_access:
|
|
302
|
+
summary_parts.append("SHELL ACCESS!")
|
|
303
|
+
if shares:
|
|
304
|
+
summary_parts.append(
|
|
305
|
+
f"{len(shares)} shares ({len(readable_shares)} readable, {len(writable_shares)} writable)"
|
|
306
|
+
)
|
|
307
|
+
summary = " | ".join(summary_parts) if summary_parts else "No findings"
|
|
308
|
+
|
|
309
|
+
result = {
|
|
310
|
+
"tool": "nxc",
|
|
311
|
+
"status": status,
|
|
312
|
+
"target": target,
|
|
313
|
+
"domain": domain,
|
|
314
|
+
"hostname": hostname,
|
|
315
|
+
"shares": shares,
|
|
316
|
+
"readable_shares": readable_shares,
|
|
317
|
+
"writable_shares": writable_shares,
|
|
318
|
+
"credentials": credentials,
|
|
319
|
+
"expired_credentials": expired_credentials,
|
|
320
|
+
"is_pwned": is_pwned,
|
|
321
|
+
"has_shell_access": has_shell_access,
|
|
322
|
+
"summary": summary,
|
|
323
|
+
}
|
|
324
|
+
|
|
325
|
+
if credentials:
|
|
326
|
+
logger.info(f"nxc: Found {len(credentials)} valid credential(s)")
|
|
327
|
+
if expired_credentials:
|
|
328
|
+
logger.warning(
|
|
329
|
+
f"nxc: Found {len(expired_credentials)} EXPIRED credential(s) - password change required!"
|
|
330
|
+
)
|
|
331
|
+
if shares:
|
|
332
|
+
logger.info(
|
|
333
|
+
f"nxc: Found {len(shares)} share(s) ({len(readable_shares)} readable, {len(writable_shares)} writable)"
|
|
334
|
+
)
|
|
335
|
+
|
|
336
|
+
return result
|
|
337
|
+
|
|
338
|
+
except Exception as e:
|
|
339
|
+
logger.error(f"Error parsing nxc job: {e}")
|
|
340
|
+
return {"tool": "nxc", "status": STATUS_ERROR, "error": str(e)}
|
|
341
|
+
|
|
342
|
+
def display_done(
|
|
343
|
+
self,
|
|
344
|
+
job: Dict[str, Any],
|
|
345
|
+
log_path: str,
|
|
346
|
+
show_all: bool = False,
|
|
347
|
+
show_passwords: bool = False,
|
|
348
|
+
) -> None:
|
|
349
|
+
"""Display successful nxc results."""
|
|
350
|
+
import click
|
|
351
|
+
|
|
352
|
+
parse_result = job.get("parse_result", {})
|
|
353
|
+
|
|
354
|
+
domain = parse_result.get("domain", "")
|
|
355
|
+
hostname = parse_result.get("hostname", "")
|
|
356
|
+
shares = parse_result.get("shares", [])
|
|
357
|
+
credentials = parse_result.get("credentials", [])
|
|
358
|
+
expired_credentials = parse_result.get("expired_credentials", [])
|
|
359
|
+
is_pwned = parse_result.get("is_pwned", False)
|
|
360
|
+
target = parse_result.get("target", "")
|
|
361
|
+
|
|
362
|
+
if domain or hostname:
|
|
363
|
+
click.echo(
|
|
364
|
+
f" Target: {hostname}.{domain}" if hostname else f" Domain: {domain}"
|
|
365
|
+
)
|
|
366
|
+
|
|
367
|
+
if is_pwned:
|
|
368
|
+
click.secho(" [!] Pwn3d! - Admin access achieved", fg="red", bold=True)
|
|
369
|
+
|
|
370
|
+
if credentials:
|
|
371
|
+
click.secho(
|
|
372
|
+
f"\n Valid Credentials ({len(credentials)}):", fg="green", bold=True
|
|
373
|
+
)
|
|
374
|
+
for cred in credentials:
|
|
375
|
+
domain_part = cred.get("domain", "")
|
|
376
|
+
username = cred.get("username", "")
|
|
377
|
+
password = cred.get("password", "") if show_passwords else "********"
|
|
378
|
+
click.echo(f" {domain_part}\\{username}:{password}")
|
|
379
|
+
|
|
380
|
+
if expired_credentials:
|
|
381
|
+
click.secho(
|
|
382
|
+
f"\n Expired Credentials ({len(expired_credentials)}):",
|
|
383
|
+
fg="yellow",
|
|
384
|
+
bold=True,
|
|
385
|
+
)
|
|
386
|
+
click.secho(" [!] Password must be changed before use!", fg="yellow")
|
|
387
|
+
for cred in expired_credentials:
|
|
388
|
+
domain_part = cred.get("domain", "")
|
|
389
|
+
username = cred.get("username", "")
|
|
390
|
+
password = cred.get("password", "") if show_passwords else "********"
|
|
391
|
+
click.echo(f" {domain_part}\\{username}:{password}")
|
|
392
|
+
click.secho(f"\n To change password, run:", fg="cyan")
|
|
393
|
+
for cred in expired_credentials:
|
|
394
|
+
domain_part = cred.get("domain", "")
|
|
395
|
+
username = cred.get("username", "")
|
|
396
|
+
click.echo(
|
|
397
|
+
f" smbpasswd -U {domain_part}/{username} -r {target or domain}"
|
|
398
|
+
)
|
|
399
|
+
|
|
400
|
+
if shares:
|
|
401
|
+
click.secho(f"\n Shares ({len(shares)}):", fg="cyan", bold=True)
|
|
402
|
+
for share in shares:
|
|
403
|
+
name = share.get("name", "")
|
|
404
|
+
perms = share.get("permissions", "")
|
|
405
|
+
comment = share.get("comment", "")
|
|
406
|
+
|
|
407
|
+
# Color based on permissions
|
|
408
|
+
if "WRITE" in perms:
|
|
409
|
+
click.secho(f" {name:20} {perms:15} {comment}", fg="yellow")
|
|
410
|
+
elif "READ" in perms:
|
|
411
|
+
click.secho(f" {name:20} {perms:15} {comment}", fg="green")
|
|
412
|
+
else:
|
|
413
|
+
click.echo(f" {name:20} {perms:15} {comment}")
|
|
414
|
+
|
|
415
|
+
|
|
416
|
+
# Register handler
|
|
417
|
+
handler = NxcHandler()
|