Hacking the SMB analyzer. Checkpoint.

This commit is contained in:
Gregor Maier 2011-06-01 14:30:02 -07:00
parent ac2b507480
commit 1b638eec0c
7 changed files with 353 additions and 105 deletions

View file

@ -931,6 +931,8 @@ type smb_hdr : record {
pid: count;
uid: count;
mid: count;
first_time: time;
last_time: time;
};
type smb_trans : record {

View file

@ -1,8 +1,255 @@
# $Id:$
#
@load conn-id
# TODO: capture filter
redef capture_filters += { ["smb"] = "port 445" };
global smb_ports = { 445/tcp } &redef;
global smb_ports = { 139/tcp, 445/tcp } &redef;
redef dpd_config += { [ANALYZER_SMB] = [$ports = smb_ports] };
# No default implementation for events.
const smb_log = open_log_file("smb") &redef;
type smb_cmd_info: record {
pid: count;
mid: count;
cmd: count;
cmdstr: string;
# hack: for operations involving file ids: note the file id.
# this is 16 bit, so we use 0x10000 to indicate that the fid is not
# valid
fid: count;
# for read/writes: number of bytes read/written
file_payload: count;
req_first_time: time;
req_last_time: time;
req_body_len: count;
rep_first_time: time;
rep_last_time: time;
rep_body_len: count;
done: bool;
};
type smb_pending_cmds: table[count, count] of smb_cmd_info;
global smb_sessions: table[conn_id] of smb_pending_cmds;
# it seems Bro has issues with anonymous records of the form [cid,count]
# so we just use a table of table
global fid_map: table[conn_id] of table[count] of string;
global next_fid = 0;
# the commands in this set are handled by a more specific event handler
# that add additional information. I.e., the smb_message event still does
# request/reply matching, but the more specific event takes care of printing.
# It's all a hack....
global more_specific_cmds: set[count];
event bro_init()
{
add more_specific_cmds[0x2e]; # read_andx
add more_specific_cmds[0x2f]; # write_andx
}
function smb_new_cmd_info(hdr: smb_hdr, body_len: count): smb_cmd_info
{
local info: smb_cmd_info;
info$cmd = hdr$command;
info$pid = hdr$pid;
info$mid = hdr$mid;
info$cmdstr = "";
info$fid = 0x10000;
info$file_payload = 0;
info$req_first_time = hdr$first_time;
info$req_last_time = hdr$last_time;
info$req_body_len = body_len;
info$rep_first_time = double_to_time(0.0);
info$rep_last_time = double_to_time(0.0);
info$rep_body_len = 0;
info$done = F;
return info;
}
function get_fid(cid: conn_id, fid: count): string
{
if (cid !in fid_map)
fid_map[cid] = table();
if ( fid !in fid_map[cid])
{
if (fid >= 0x10000)
return "FIDxx";
fid_map[cid][fid] = fmt("FID%d", next_fid);
++next_fid;
}
return fid_map[cid][fid];
}
function fmt_smb_hdr(hdr: smb_hdr): string
{
return fmt("%.6f %.6f %d %d %d %d %d", hdr$first_time, hdr$last_time, hdr$tid,
hdr$pid, hdr$mid, hdr$uid, hdr$status);
}
function fmt_msg_prefix(cid: conn_id, is_orig: bool, hdr: smb_hdr): string
{
return fmt("%s %d (%d) %s", id_string(cid), is_orig, hdr$command,
fmt_smb_hdr(hdr));
}
function smb_log_cmd(c: connection, info: smb_cmd_info)
{
local msg = "";
msg = fmt("COMMAND %s (%d) %d:%d %.6f %.6f %d %.6f %.6f %d %s",
info$cmdstr, info$cmd, info$pid, info$mid,
info$req_first_time, info$req_last_time, info$req_body_len,
info$rep_first_time, info$rep_last_time, info$rep_body_len,
get_fid(c$id, info$fid));
print smb_log, msg;
}
function smb_log_cmd2(c: connection, hdr: smb_hdr)
{
if (c$id !in smb_sessions)
return;
local cur_session = smb_sessions[c$id];
if ([hdr$pid,hdr$mid] !in cur_session)
return;
local info = cur_session[hdr$pid, hdr$mid];
smb_log_cmd(c, info);
}
function mismatch_fmt_hdr(hdr: smb_hdr, cmd: string): string
{
return fmt("%s %d:%d", cmd, hdr$pid, hdr$mid);
}
function mismatch_fmt_info(info: smb_cmd_info): string
{
return fmt("%s %d:%d", info$cmdstr, info$pid, info$mid);
}
function smb_set_fid(cid: conn_id, hdr: smb_hdr, fid: count)
{
# smb_messge takes care of error / mismatch handling, so we can
# just punt here
if (cid !in smb_sessions)
return;
local cur_session = smb_sessions[cid];
if ([hdr$pid,hdr$mid] !in cur_session)
return;
local info = cur_session[hdr$pid, hdr$mid];
info$fid = fid;
}
function smb_set_file_payload(cid: conn_id, hdr: smb_hdr, payload_len: count)
{
# smb_messge takes care of error / mismatch handling, so we can
# just punt here
if (cid !in smb_sessions)
return;
local cur_session = smb_sessions[cid];
if ([hdr$pid,hdr$mid] !in cur_session)
return;
local info = cur_session[hdr$pid, hdr$mid];
info$file_payload = payload_len;
}
# note, the smb_message event is raised before and more specific ones, so
# we use it to match requests to replies.
# A hack, but it works
event smb_message(c: connection, hdr: smb_hdr, is_orig: bool, cmd: string, body_length: count, body: string)
{
###print smb_log, fmt("%s %s %d", fmt_msg_prefix(c$id, is_orig, hdr), cmd, body_length);
if (c$id !in smb_sessions)
smb_sessions[c$id] = table();
local cur_session = smb_sessions[c$id];
# cleanup and log
if ([hdr$pid,hdr$mid] in cur_session)
if (cur_session[hdr$pid,hdr$mid]$done)
delete cur_session[hdr$pid,hdr$mid];
if (is_orig)
{
if ([hdr$pid,hdr$mid] in cur_session)
print smb_log, fmt("Mismatch: got a request but already have request queued: %s %s",
mismatch_fmt_info(cur_session[hdr$pid,hdr$mid]), mismatch_fmt_hdr(hdr,cmd));
cur_session[hdr$pid, hdr$mid] = smb_new_cmd_info(hdr, body_length);
cur_session[hdr$pid, hdr$mid]$cmdstr = cmd;
}
else
{
if ([hdr$pid,hdr$mid] !in cur_session)
print smb_log, fmt("Mismatch: got a reply but no request queued: %s", mismatch_fmt_hdr(hdr,cmd));
else
{
local info = cur_session[hdr$pid, hdr$mid];
if (info$cmd != hdr$command)
{
print smb_log, fmt("Mismatch: request and reply command don't match: %s %s",
mismatch_fmt_info(cur_session[hdr$pid,hdr$mid]), mismatch_fmt_hdr(hdr,cmd));
delete cur_session[hdr$pid,hdr$mid];
}
else if (info$mid != hdr$mid || info$pid != hdr$pid)
{
# This really should not happen
print smb_log, fmt("Mismatch: request and reply IDs don't match: %s %s",
mismatch_fmt_info(cur_session[hdr$pid,hdr$mid]), mismatch_fmt_hdr(hdr,cmd));
delete cur_session[hdr$pid,hdr$mid];
}
else
{
info$rep_first_time = hdr$first_time;
info$rep_last_time = hdr$last_time;
info$rep_body_len = body_length;
info$done = T;
if (hdr$command !in more_specific_cmds)
smb_log_cmd(c, info);
}
}
}
}
event smb_com_read_andx(c: connection, hdr: smb_hdr, fid: count)
{
smb_set_fid(c$id, hdr, fid);
}
event smb_com_read_andx_response(c: connection, hdr: smb_hdr, len: count)
{
smb_set_file_payload(c$id, hdr, len);
smb_log_cmd2(c, hdr);
}
event smb_com_write_andx(c: connection, hdr: smb_hdr, fid: count, len: count)
{
smb_set_fid(c$id, hdr, fid);
smb_set_file_payload(c$id, hdr, len);
}
event smb_com_write_andx_response(c: connection, hdr: smb_hdr)
{
smb_log_cmd2(c, hdr);
}
event connection_state_remove(c: connection)
{
delete smb_sessions[c$id];
}

View file

@ -106,7 +106,7 @@ int NetbiosSSN_Interpreter::ParseDatagram(const u_char* data, int len,
{
if ( smb_session )
{
smb_session->Deliver(is_query, len, data);
smb_session->Deliver(is_query, len, data, 0, 0);
return 0;
}
@ -129,7 +129,7 @@ int NetbiosSSN_Interpreter::ParseBroadcast(const u_char* data, int len,
if ( smb_session )
{
smb_session->Deliver(is_query, len, data);
smb_session->Deliver(is_query, len, data, 0, 0);
return 0;
}
@ -188,7 +188,7 @@ int NetbiosSSN_Interpreter::ParseSessionMsg(const u_char* data, int len,
if ( smb_session )
{
smb_session->Deliver(is_query, len, data);
smb_session->Deliver(is_query, len, data, 0, 0);
return 0;
}
else

View file

@ -11,6 +11,8 @@ namespace {
const bool DEBUG_smb_ipc = true;
}
#define SMB_MAX_LEN (1<<17)
#define BYTEORDER_SWAP16(n) ((256 * ((n) & 0xff)) + ((n) >> 8))
enum SMB_Command {
@ -135,10 +137,13 @@ void SMB_Session::set_andx(int is_orig, binpac::SMB::SMB_andx* andx)
andx_[ind] = andx;
}
void SMB_Session::Deliver(int is_orig, int len, const u_char* data)
void SMB_Session::Deliver(int is_orig, int len, const u_char* data,
double arg_first_time, double arg_last_time)
{
if ( len == 0 )
return;
first_time = arg_first_time;
last_time = arg_last_time;
try
{
@ -152,8 +157,14 @@ void SMB_Session::Deliver(int is_orig, int len, const u_char* data)
int next_command = hdr.command();
fprintf(stderr, "SMB command: %02x %s len %-7d dur %.6lf\n", next_command,
SMB_command_name[next_command], len,
last_time-first_time);
int ncmds = 0;
while ( data < data_end )
{
ncmds++;
SMB_Body body(data, data_end);
set_andx(is_orig, 0);
ParseMessage(is_orig, next_command, hdr, body);
@ -172,6 +183,7 @@ void SMB_Session::Deliver(int is_orig, int len, const u_char* data)
data = data_start + next;
}
fprintf(stderr, "ncmds %d\n", ncmds);
}
catch ( const binpac::Exception& e )
{
@ -566,7 +578,8 @@ int SMB_Session::ParseReadAndx(binpac::SMB::SMB_header const& hdr,
val_list* vl = new val_list;
vl->append(analyzer->BuildConnVal());
vl->append(BuildHeaderVal(hdr));
vl->append(new StringVal(""));
vl->append(new Val(req.fid(), TYPE_COUNT));
//vl->append(new StringVal(""));
analyzer->ConnectionEvent(smb_com_read_andx, vl);
}
@ -584,12 +597,13 @@ int SMB_Session::ParseReadAndxResponse(binpac::SMB::SMB_header const& hdr,
int data_count = resp.data_length();
const u_char* data = resp.data().begin();
if ( smb_com_read_andx )
if ( smb_com_read_andx_response )
{
val_list* vl = new val_list;
vl->append(analyzer->BuildConnVal());
vl->append(BuildHeaderVal(hdr));
vl->append(new StringVal(data_count, (const char*) data));
vl->append(new Val((resp.data_len_high()<<16)+(resp.data_len()), TYPE_COUNT));
//vl->append(new StringVal(data_count, (const char*) data));
analyzer->ConnectionEvent(smb_com_read_andx, vl);
}
@ -614,7 +628,9 @@ int SMB_Session::ParseWriteAndx(binpac::SMB::SMB_header const& hdr,
val_list* vl = new val_list;
vl->append(analyzer->BuildConnVal());
vl->append(BuildHeaderVal(hdr));
vl->append(new StringVal(data_count, (const char*) data));
vl->append(new Val(req.fid(), TYPE_COUNT));
vl->append(new Val((req.data_len_high()<<16)+(req.data_len()), TYPE_COUNT));
//vl->append(new StringVal(data_count, (const char*) data));
analyzer->ConnectionEvent(smb_com_write_andx, vl);
}
@ -631,14 +647,14 @@ int SMB_Session::ParseWriteAndxResponse(binpac::SMB::SMB_header const& hdr,
resp.Parse(body.data(), body.data() + body.length());
set_andx(0, resp.andx());
if ( smb_com_write_andx )
if ( smb_com_write_andx_response )
{
val_list* vl = new val_list;
vl->append(analyzer->BuildConnVal());
vl->append(BuildHeaderVal(hdr));
vl->append(new StringVal(""));
//vl->append(new StringVal(""));
analyzer->ConnectionEvent(smb_com_write_andx, vl);
analyzer->ConnectionEvent(smb_com_write_andx_response, vl);
}
return 0;
@ -1016,6 +1032,8 @@ Val* SMB_Session::BuildHeaderVal(binpac::SMB::SMB_header const& hdr)
r->Assign(5, new Val(hdr.pid(), TYPE_COUNT));
r->Assign(6, new Val(hdr.uid(), TYPE_COUNT));
r->Assign(7, new Val(hdr.mid(), TYPE_COUNT));
r->Assign(8, new Val(first_time, TYPE_TIME));
r->Assign(9, new Val(last_time, TYPE_TIME));
return r;
}
@ -1108,23 +1126,16 @@ Contents_SMB::Contents_SMB(Connection* conn, bool orig, SMB_Session* s)
: TCP_SupportAnalyzer(AnalyzerTag::Contents_SMB, conn, orig)
{
smb_session = s;
msg_buf = 0;
state = WAIT_FOR_HDR;
first_time = last_time = 0.0;
hdr_buf.Init(4,4);
msg_len = 0;
buf_len = 0;
buf_n = 0;
msg_type = 0;
}
void Contents_SMB::InitMsgBuf()
{
delete [] msg_buf;
msg_buf = new u_char[msg_len];
buf_len = msg_len;
buf_n = 0;
}
Contents_SMB::~Contents_SMB()
{
delete [] msg_buf;
}
void Contents_SMB::DeliverSMB(int len, const u_char* data)
@ -1132,93 +1143,68 @@ void Contents_SMB::DeliverSMB(int len, const u_char* data)
// Check the 4-byte header.
if ( strncmp((const char*) data, "\xffSMB", 4) )
{
Conn()->Weird(fmt("SMB-over-TCP header error: %02x%02x%02x%02x, \\x%02x%c%c%c",
dshdr[0], dshdr[1], dshdr[2], dshdr[3],
Conn()->Weird(fmt("SMB-over-TCP header error: %02x %05x, >>\\x%02x%c%c%c<<",
//dshdr[0], dshdr[1], dshdr[2], dshdr[3],
msg_type, msg_len,
data[0], data[1], data[2], data[3]));
SetSkip(1);
}
else
smb_session->Deliver(IsOrig(), len, data);
smb_session->Deliver(IsOrig(), len, data, first_time, last_time);
buf_n = 0;
msg_len = 0;
}
void Contents_SMB::DeliverStream(int len, const u_char* data, bool orig)
{
TCP_SupportAnalyzer::DeliverStream(len, data, orig);
if (Skipping())
return;
last_time = network_time;
while ( len > 0 )
{
if ( ! msg_len )
switch (state) {
case WAIT_FOR_HDR:
{
// Get the SMB-over-TCP header (4 bytes).
while ( buf_n < 4 && len > 0 )
if (first_time < 1e-3)
first_time = network_time;
bool got_hdr = hdr_buf.ConsumeChunk(data, len);
if (got_hdr)
{
dshdr[buf_n] = *data;
++buf_n; ++data; --len;
}
if ( buf_n < 4 )
return;
buf_n = 0;
for ( int i = 1; i < 4; ++i )
msg_len = ( msg_len << 8 ) + dshdr[i];
if ( dshdr[0] != 0 )
{
// Netbios header indicates this is NOT
// a session message ...
// 0x81 = session request
// 0x82 = positive response
// 0x83 = neg response
// 0x84 = retarget(?)
// 0x85 = keepalive
// Maybe we should just generate a Netbios
// event and die?
Conn()->Weird("SMB checked Netbios type and found != 0");
SetSkip(1);
return;
}
else if ( msg_len <= 4 )
{
Conn()->Weird("SMB message length error");
SetSkip(1);
return;
// We have the 4 bytes header now
const u_char *dummy = hdr_buf.GetBuf();
if (dummy[1] > 1)
Conn()->Weird(fmt("NetBIOS session flags > 1: %d", dummy[1]));
msg_len = 0;
msg_type = dummy[0];
for ( int i =1; i < 4; i++)
msg_len = ( msg_len << 8) + dummy[i];
msg_buf.Init(SMB_MAX_LEN, msg_len);
state = WAIT_FOR_DATA;
}
}
if ( buf_n == 0 && msg_len <= len )
break;
case WAIT_FOR_DATA:
{
// The fast lane:
// Keep msg_len -- it will be changed in DeliverSMB
int mlen = msg_len;
DeliverSMB(msg_len, data);
len -= mlen;
data += mlen;
}
bool got_all_data = msg_buf.ConsumeChunk(data, len);
if (got_all_data)
{
const u_char *dummy_p = msg_buf.GetBuf();
int dummy_len = (int) msg_buf.GetFill();
if (msg_type == 0x00 && dummy_len >= 4)
DeliverSMB(dummy_len, dummy_p);
else if (msg_type == 0x00)
Conn()->Weird(fmt("SMB too short: len=%d", msg_len));
else
{
if ( buf_len < msg_len )
InitMsgBuf();
while ( buf_n < msg_len && len > 0 )
{
msg_buf[buf_n] = *data;
++buf_n;
++data;
--len;
}
if ( buf_n < msg_len )
return;
DeliverSMB(msg_len, msg_buf);
Conn()->Weird(fmt("SMB other msg type: %x", msg_type));
state = WAIT_FOR_HDR;
first_time = 0.0;
hdr_buf.Init(4,4);
}
}
break;
} // end switch
} // end while
}
SMB_Analyzer::SMB_Analyzer(Connection* conn)

View file

@ -9,6 +9,7 @@
// Reference: http://www.snia.org/tech_activities/CIFS/CIFS-TR-1p00_FINAL.pdf
#include "TCP.h"
#include "RPC.h"
#include "DCE_RPC.h"
#include "smb_pac.h"
@ -44,7 +45,8 @@ public:
SMB_Session(Analyzer* analyzer);
~SMB_Session();
void Deliver(int is_orig, int len, const u_char* msg);
void Deliver(int is_orig, int len, const u_char* msg,
double first_time, double last_time);
static bool any_smb_event()
{
@ -170,6 +172,8 @@ protected:
bool smb_pipe_prot;
StringVal* transaction_name;
binpac::SMB::SMB_andx* andx_[2];
double first_time;
double last_time;
};
class Contents_SMB : public TCP_SupportAnalyzer {
@ -180,16 +184,21 @@ public:
virtual void DeliverStream(int len, const u_char* data, bool orig);
protected:
void InitMsgBuf();
typedef enum {
WAIT_FOR_HDR,
WAIT_FOR_DATA
} state_t;
void DeliverSMB(int len, const u_char* data);
SMB_Session* smb_session;
u_char dshdr[4];
u_char* msg_buf;
RPC_Reasm_Buffer hdr_buf; // Reassemlbes the NetBIOS length and glue
RPC_Reasm_Buffer msg_buf; // Reassembles the SMB message.
int msg_len;
int buf_n; // number of bytes in msg_buf
int buf_len; // size off msg_buf
int msg_type;
double first_time; // timestamp of first packet of current message
double last_time; // timestamp of last pakcet of current message
state_t state;
};
class SMB_Analyzer : public TCP_ApplicationAnalyzer {
@ -202,8 +211,9 @@ public:
static bool Available()
{
return SMB_Session::any_smb_event() ||
DCE_RPC_Session::any_dce_rpc_event();
return true;
//return SMB_Session::any_smb_event() ||
// DCE_RPC_Session::any_dce_rpc_event();
}
protected:

View file

@ -221,8 +221,10 @@ event smb_com_transaction2%(c: connection, hdr: smb_hdr, trans: smb_trans, data:
event smb_com_trans_mailslot%(c: connection, hdr: smb_hdr, trans: smb_trans, data: smb_trans_data, is_orig: bool%);
event smb_com_trans_rap%(c: connection, hdr: smb_hdr, trans: smb_trans, data: smb_trans_data, is_orig: bool%);
event smb_com_trans_pipe%(c: connection, hdr: smb_hdr, trans: smb_trans, data: smb_trans_data, is_orig: bool%);
event smb_com_read_andx%(c: connection, hdr: smb_hdr, data: string%);
event smb_com_write_andx%(c: connection, hdr: smb_hdr, data: string%);
event smb_com_read_andx%(c: connection, hdr: smb_hdr, fid: count%);
event smb_com_read_andx_response%(c: connection, hdr: smb_hdr, len: count%);
event smb_com_write_andx%(c: connection, hdr: smb_hdr, fid: count, len: count%);
event smb_com_write_andx_response%(c: connection, hdr: smb_hdr%);
event smb_get_dfs_referral%(c: connection, hdr: smb_hdr, max_referral_level: count, file_name: string%);
event smb_com_negotiate%(c: connection, hdr: smb_hdr%);
event smb_com_negotiate_response%(c: connection, hdr: smb_hdr, dialect_index: count%);

View file

@ -337,12 +337,12 @@ type SMB_read_andx_response = record {
reserved2 : uint16[4];
byte_count : uint16;
pad : padding[padding_length];
data : bytestring &length = data_length;
#data : bytestring &length = data_length;
# Chris: the length here is causing problems - could we be having
# issues with the packet format or is the data_length just not
# right. The problem is that the padding isn't always filled right,
# espeically when its not the first command in the packet.
#data : bytestring &restofdata;
data : bytestring &restofdata;
} &let {
data_length = data_len_high * 0x10000 + data_len;
padding_length = byte_count - data_length;
@ -353,7 +353,7 @@ type SMB_write_andx = record {
andx : SMB_andx;
fid : uint16;
offset : uint32;
reserved : uint32;
timeout : uint32;
write_mode : uint16;
remaining : uint16;
data_len_high : uint16;
@ -362,7 +362,8 @@ type SMB_write_andx = record {
rest_words : uint8[word_count * 2 - offsetof(rest_words) + 1];
byte_count : uint16;
pad : padding to data_offset - smb_header_length;
data : bytestring &length = data_length;
#data : bytestring &length = data_length;
data : bytestring &restofdata;
} &let {
data_length = data_len_high * 0x10000 + data_len;
} &byteorder = littleendian;