Hide keyboard shortcuts

Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

758

759

760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775

776

777

778

779

780

781

782

783

784

785

786

787

788

789

790

791

792

793

794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

816

817

818

819

820

821

822

823

824

825

826

827

828

829

830

831

832

833

834

835

836

837

838

839

840

841

842

843

844

845

846

847

848

849

850

851

852

853

854

855

856

857

858

859

860

861

862

863

864

865

866

867

868

869

870

871

872

873

874

875

876

877

878

879

880

881

882

883

884

885

886

887

888

889

890

891

892

893

894

895

896

897

898

899

900

901

902

903

904

905

906

907

908

909

910

911

912

913

914

915

916

917

918

919

920

921

922

923

924

925

926

927

928

929

930

931

932

933

934

935

936

937

938

939

940

941

942

943

944

945

946

947

948

949

950

951

952

953

954

955

956

957

958

959

960

961

962

963

964

965

966

967

968

969

970

971

972

973

974

975

976

977

978

979

980

981

982

983

984

985

986

987

988

989

990

991

992

993

994

995

996

997

998

999

1000

1001

1002

1003

1004

1005

1006

1007

1008

1009

1010

1011

1012

1013

1014

1015

1016

1017

1018

1019

1020

1021

1022

1023

1024

1025

1026

1027

1028

1029

1030

1031

1032

1033

1034

1035

1036

1037

1038

1039

1040

1041

1042

1043

1044

1045

1046

1047

1048

1049

1050

1051

1052

1053

1054

1055

1056

1057

1058

1059

1060

1061

1062

1063

1064

1065

1066

1067

1068

1069

1070

1071

1072

1073

1074

1075

1076

1077

1078

1079

1080

1081

1082

1083

1084

1085

1086

1087

1088

1089

1090

1091

1092

1093

1094

1095

1096

1097

1098

1099

1100

1101

1102

1103

1104

1105

1106

1107

1108

1109

1110

1111

1112

1113

1114

1115

1116

1117

1118

1119

1120

1121

1122

1123

1124

1125

1126

1127

1128

1129

1130

1131

1132

1133

1134

1135

1136

1137

1138

1139

1140

1141

1142

1143

1144

1145

1146

1147

1148

1149

1150

1151

1152

1153

1154

1155

1156

1157

1158

1159

1160

1161

1162

1163

1164

1165

1166

1167

1168

1169

1170

1171

1172

1173

1174

1175

1176

1177

1178

1179

1180

1181

1182

1183

1184

1185

1186

1187

1188

1189

1190

1191

1192

1193

1194

1195

1196

1197

1198

1199

1200

1201

1202

1203

1204

1205

1206

1207

1208

1209

1210

1211

1212

1213

1214

1215

1216

1217

1218

1219

1220

1221

1222

1223

1224

1225

1226

1227

1228

1229

1230

1231

1232

1233

1234

1235

1236

1237

1238

1239

1240

1241

1242

1243

1244

1245

1246

1247

1248

1249

1250

1251

1252

1253

1254

1255

1256

1257

1258

1259

1260

1261

1262

1263

1264

1265

1266

1267

1268

1269

1270

1271

1272

1273

1274

1275

1276

1277

1278

1279

1280

1281

1282

1283

1284

1285

1286

1287

1288

1289

1290

1291

1292

1293

1294

1295

1296

1297

1298

1299

1300

1301

1302

1303

1304

1305

1306

1307

1308

1309

1310

1311

1312

1313

1314

1315

1316

1317

1318

1319

1320

1321

1322

1323

1324

1325

1326

1327

1328

1329

1330

1331

1332

1333

1334

1335

1336

1337

1338

1339

1340

1341

1342

1343

1344

1345

1346

1347

1348

1349

1350

1351

1352

1353

1354

1355

1356

1357

1358

1359

1360

1361

1362

1363

1364

1365

1366

1367

1368

1369

1370

1371

1372

1373

1374

1375

1376

1377

1378

1379

1380

1381

1382

1383

1384

1385

1386

1387

1388

1389

1390

1391

1392

1393

1394

1395

1396

1397

1398

1399

1400

1401

1402

1403

1404

1405

1406

1407

1408

1409

1410

1411

1412

1413

1414

1415

1416

1417

1418

1419

1420

1421

1422

1423

1424

1425

1426

1427

1428

1429

1430

1431

1432

1433

1434

1435

1436

1437

1438

1439

1440

1441

1442

1443

1444

1445

1446

1447

1448

1449

1450

1451

1452

1453

1454

1455

1456

1457

1458

1459

1460

1461

1462

1463

1464

1465

1466

1467

1468

1469

1470

1471

1472

1473

1474

1475

1476

1477

1478

1479

1480

1481

1482

1483

1484

1485

1486

1487

1488

1489

1490

1491

1492

1493

1494

1495

1496

1497

1498

1499

1500

1501

1502

1503

1504

1505

1506

1507

1508

1509

1510

1511

1512

1513

1514

1515

1516

1517

1518

1519

1520

1521

1522

1523

1524

1525

1526

1527

1528

1529

1530

1531

1532

1533

1534

1535

1536

1537

1538

1539

1540

1541

1542

1543

1544

1545

1546

1547

1548

1549

1550

1551

1552

1553

1554

1555

1556

1557

1558

1559

1560

1561

1562

1563

1564

1565

1566

1567

1568

1569

1570

1571

1572

1573

1574

1575

1576

1577

1578

1579

1580

1581

1582

1583

1584

1585

1586

1587

1588

1589

1590

1591

1592

1593

1594

1595

1596

1597

1598

1599

1600

1601

1602

1603

1604

1605

1606

1607

1608

1609

1610

1611

1612

1613

1614

1615

1616

1617

1618

1619

1620

1621

1622

1623

1624

1625

1626

1627

1628

1629

1630

1631

1632

1633

1634

1635

1636

1637

1638

1639

1640

1641

1642

1643

1644

1645

1646

1647

1648

1649

1650

1651

1652

1653

1654

1655

1656

1657

1658

1659

1660

1661

1662

1663

1664

1665

1666

1667

1668

1669

1670

1671

1672

1673

1674

1675

1676

1677

1678

1679

1680

1681

1682

1683

1684

1685

1686

# SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. 

# 

# This software is provided under under a slightly modified version 

# of the Apache Software License. See the accompanying LICENSE file 

# for more information. 

# 

# Description: 

# Partial C706.pdf + [MS-RPCE] implementation 

# 

# Best way to learn how to use these calls is to grab the protocol standard 

# so you understand what the call does, and then read the test case located 

# at https://github.com/SecureAuthCorp/impacket/tree/master/tests/SMB_RPC 

# 

# ToDo:  

# [ ] Take out all the security provider stuff out of here (e.g. RPC_C_AUTHN_WINNT) 

# and put it elsewhere. This will make the coder cleaner and easier to add  

# more SSP (e.g. NETLOGON) 

#  

 

import logging 

import socket 

import sys 

from binascii import unhexlify 

from Cryptodome.Cipher import ARC4 

 

from impacket import ntlm, LOG 

from impacket.structure import Structure,pack,unpack 

from impacket.krb5 import kerberosv5, gssapi 

from impacket.uuid import uuidtup_to_bin, generate, stringver_to_bin, bin_to_uuidtup 

from impacket.dcerpc.v5.dtypes import UCHAR, ULONG, USHORT 

from impacket.dcerpc.v5.ndr import NDRSTRUCT 

from impacket import hresult_errors 

from threading import Thread 

 

# MS/RPC Constants 

MSRPC_REQUEST = 0x00 

MSRPC_PING = 0x01 

MSRPC_RESPONSE = 0x02 

MSRPC_FAULT = 0x03 

MSRPC_WORKING = 0x04 

MSRPC_NOCALL = 0x05 

MSRPC_REJECT = 0x06 

MSRPC_ACK = 0x07 

MSRPC_CL_CANCEL = 0x08 

MSRPC_FACK = 0x09 

MSRPC_CANCELACK = 0x0A 

MSRPC_BIND = 0x0B 

MSRPC_BINDACK = 0x0C 

MSRPC_BINDNAK = 0x0D 

MSRPC_ALTERCTX = 0x0E 

MSRPC_ALTERCTX_R= 0x0F 

MSRPC_AUTH3 = 0x10 

MSRPC_SHUTDOWN = 0x11 

MSRPC_CO_CANCEL = 0x12 

MSRPC_ORPHANED = 0x13 

 

# MS/RPC Packet Flags 

PFC_FIRST_FRAG = 0x01 

PFC_LAST_FRAG = 0x02 

 

# For PDU types bind, bind_ack, alter_context, and 

# alter_context_resp, this flag MUST be interpreted as PFC_SUPPORT_HEADER_SIGN 

MSRPC_SUPPORT_SIGN = 0x04 

 

#For the 

#remaining PDU types, this flag MUST be interpreted as PFC_PENDING_CANCEL. 

MSRPC_PENDING_CANCEL= 0x04 

 

PFC_RESERVED_1 = 0x08 

PFC_CONC_MPX = 0x10 

PFC_DID_NOT_EXECUTE = 0x20 

PFC_MAYBE = 0x40 

PFC_OBJECT_UUID = 0x80 

 

# Auth Types - Security Providers 

RPC_C_AUTHN_NONE = 0x00 

RPC_C_AUTHN_GSS_NEGOTIATE = 0x09 

RPC_C_AUTHN_WINNT = 0x0A 

RPC_C_AUTHN_GSS_SCHANNEL = 0x0E 

RPC_C_AUTHN_GSS_KERBEROS = 0x10 

RPC_C_AUTHN_NETLOGON = 0x44 

RPC_C_AUTHN_DEFAULT = 0xFF 

 

# Auth Levels 

RPC_C_AUTHN_LEVEL_NONE = 1 

RPC_C_AUTHN_LEVEL_CONNECT = 2 

RPC_C_AUTHN_LEVEL_CALL = 3 

RPC_C_AUTHN_LEVEL_PKT = 4 

RPC_C_AUTHN_LEVEL_PKT_INTEGRITY = 5 

RPC_C_AUTHN_LEVEL_PKT_PRIVACY = 6 

 

#Reasons for rejection of a context element, included in bind_ack result reason 

rpc_provider_reason = { 

0 : 'reason_not_specified', 

1 : 'abstract_syntax_not_supported', 

2 : 'proposed_transfer_syntaxes_not_supported', 

3 : 'local_limit_exceeded', 

4 : 'protocol_version_not_specified', 

8 : 'authentication_type_not_recognized', 

9 : 'invalid_checksum' 

} 

 

MSRPC_CONT_RESULT_ACCEPT = 0 

MSRPC_CONT_RESULT_USER_REJECT = 1 

MSRPC_CONT_RESULT_PROV_REJECT = 2 

 

#Results of a presentation context negotiation 

rpc_cont_def_result = { 

0 : 'acceptance', 

1 : 'user_rejection', 

2 : 'provider_rejection' 

} 

 

#status codes, references: 

#https://docs.microsoft.com/windows/desktop/Rpc/rpc-return-values 

#https://msdn.microsoft.com/library/default.asp?url=/library/en-us/randz/protocol/common_return_values.asp 

#winerror.h 

#https://www.opengroup.org/onlinepubs/9629399/apdxn.htm 

 

rpc_status_codes = { 

0x00000005 : 'rpc_s_access_denied', 

0x00000008 : 'Authentication type not recognized', 

0x000006D8 : 'rpc_fault_cant_perform', 

0x000006C6 : 'rpc_x_invalid_bound', # the arrays bound are invalid 

0x000006E4 : 'rpc_s_cannot_support: The requested operation is not supported.', # some operation is not supported 

0x000006F7 : 'rpc_x_bad_stub_data', # the stub data is invalid, doesn't match with the IDL definition 

0x1C010001 : 'nca_s_comm_failure', # unable to get response from server: 

0x1C010002 : 'nca_s_op_rng_error', # bad operation number in call 

0x1C010003 : 'nca_s_unk_if', # unknown interface 

0x1C010006 : 'nca_s_wrong_boot_time', # client passed server wrong server boot time 

0x1C010009 : 'nca_s_you_crashed', # a restarted server called back a client 

0x1C01000B : 'nca_s_proto_error', # someone messed up the protocol 

0x1C010013 : 'nca_s_out_args_too_big ', # output args too big 

0x1C010014 : 'nca_s_server_too_busy', # server is too busy to handle call 

0x1C010015 : 'nca_s_fault_string_too_long', # string argument longer than declared max len 

0x1C010017 : 'nca_s_unsupported_type ', # no implementation of generic operation for object 

0x1C000001 : 'nca_s_fault_int_div_by_zero', 

0x1C000002 : 'nca_s_fault_addr_error ', 

0x1C000003 : 'nca_s_fault_fp_div_zero', 

0x1C000004 : 'nca_s_fault_fp_underflow', 

0x1C000005 : 'nca_s_fault_fp_overflow', 

0x1C000006 : 'nca_s_fault_invalid_tag', 

0x1C000007 : 'nca_s_fault_invalid_bound ', 

0x1C000008 : 'nca_s_rpc_version_mismatch', 

0x1C000009 : 'nca_s_unspec_reject ', 

0x1C00000A : 'nca_s_bad_actid', 

0x1C00000B : 'nca_s_who_are_you_failed', 

0x1C00000C : 'nca_s_manager_not_entered ', 

0x1C00000D : 'nca_s_fault_cancel', 

0x1C00000E : 'nca_s_fault_ill_inst', 

0x1C00000F : 'nca_s_fault_fp_error', 

0x1C000010 : 'nca_s_fault_int_overflow', 

0x1C000012 : 'nca_s_fault_unspec', 

0x1C000013 : 'nca_s_fault_remote_comm_failure ', 

0x1C000014 : 'nca_s_fault_pipe_empty ', 

0x1C000015 : 'nca_s_fault_pipe_closed', 

0x1C000016 : 'nca_s_fault_pipe_order ', 

0x1C000017 : 'nca_s_fault_pipe_discipline', 

0x1C000018 : 'nca_s_fault_pipe_comm_error', 

0x1C000019 : 'nca_s_fault_pipe_memory', 

0x1C00001A : 'nca_s_fault_context_mismatch ', 

0x1C00001B : 'nca_s_fault_remote_no_memory ', 

0x1C00001C : 'nca_s_invalid_pres_context_id', 

0x1C00001D : 'nca_s_unsupported_authn_level', 

0x1C00001F : 'nca_s_invalid_checksum ', 

0x1C000020 : 'nca_s_invalid_crc', 

0x1C000021 : 'nca_s_fault_user_defined', 

0x1C000022 : 'nca_s_fault_tx_open_failed', 

0x1C000023 : 'nca_s_fault_codeset_conv_error', 

0x1C000024 : 'nca_s_fault_object_not_found ', 

0x1C000025 : 'nca_s_fault_no_client_stub', 

0x16c9a000 : "rpc_s_mod", 

0x16c9a001 : "rpc_s_op_rng_error", 

0x16c9a002 : "rpc_s_cant_create_socket", 

0x16c9a003 : "rpc_s_cant_bind_socket", 

0x16c9a004 : "rpc_s_not_in_call", 

0x16c9a005 : "rpc_s_no_port", 

0x16c9a006 : "rpc_s_wrong_boot_time", 

0x16c9a007 : "rpc_s_too_many_sockets", 

0x16c9a008 : "rpc_s_illegal_register", 

0x16c9a009 : "rpc_s_cant_recv", 

0x16c9a00a : "rpc_s_bad_pkt", 

0x16c9a00b : "rpc_s_unbound_handle", 

0x16c9a00c : "rpc_s_addr_in_use", 

0x16c9a00d : "rpc_s_in_args_too_big", 

0x16c9a00e : "rpc_s_string_too_long", 

0x16c9a00f : "rpc_s_too_many_objects", 

0x16c9a010 : "rpc_s_binding_has_no_auth", 

0x16c9a011 : "rpc_s_unknown_authn_service", 

0x16c9a012 : "rpc_s_no_memory", 

0x16c9a013 : "rpc_s_cant_nmalloc", 

0x16c9a014 : "rpc_s_call_faulted", 

0x16c9a015 : "rpc_s_call_failed", 

0x16c9a016 : "rpc_s_comm_failure", 

0x16c9a017 : "rpc_s_rpcd_comm_failure", 

0x16c9a018 : "rpc_s_illegal_family_rebind", 

0x16c9a019 : "rpc_s_invalid_handle", 

0x16c9a01a : "rpc_s_coding_error", 

0x16c9a01b : "rpc_s_object_not_found", 

0x16c9a01c : "rpc_s_cthread_not_found", 

0x16c9a01d : "rpc_s_invalid_binding", 

0x16c9a01e : "rpc_s_already_registered", 

0x16c9a01f : "rpc_s_endpoint_not_found", 

0x16c9a020 : "rpc_s_invalid_rpc_protseq", 

0x16c9a021 : "rpc_s_desc_not_registered", 

0x16c9a022 : "rpc_s_already_listening", 

0x16c9a023 : "rpc_s_no_protseqs", 

0x16c9a024 : "rpc_s_no_protseqs_registered", 

0x16c9a025 : "rpc_s_no_bindings", 

0x16c9a026 : "rpc_s_max_descs_exceeded", 

0x16c9a027 : "rpc_s_no_interfaces", 

0x16c9a028 : "rpc_s_invalid_timeout", 

0x16c9a029 : "rpc_s_cant_inq_socket", 

0x16c9a02a : "rpc_s_invalid_naf_id", 

0x16c9a02b : "rpc_s_inval_net_addr", 

0x16c9a02c : "rpc_s_unknown_if", 

0x16c9a02d : "rpc_s_unsupported_type", 

0x16c9a02e : "rpc_s_invalid_call_opt", 

0x16c9a02f : "rpc_s_no_fault", 

0x16c9a030 : "rpc_s_cancel_timeout", 

0x16c9a031 : "rpc_s_call_cancelled", 

0x16c9a032 : "rpc_s_invalid_call_handle", 

0x16c9a033 : "rpc_s_cannot_alloc_assoc", 

0x16c9a034 : "rpc_s_cannot_connect", 

0x16c9a035 : "rpc_s_connection_aborted", 

0x16c9a036 : "rpc_s_connection_closed", 

0x16c9a037 : "rpc_s_cannot_accept", 

0x16c9a038 : "rpc_s_assoc_grp_not_found", 

0x16c9a039 : "rpc_s_stub_interface_error", 

0x16c9a03a : "rpc_s_invalid_object", 

0x16c9a03b : "rpc_s_invalid_type", 

0x16c9a03c : "rpc_s_invalid_if_opnum", 

0x16c9a03d : "rpc_s_different_server_instance", 

0x16c9a03e : "rpc_s_protocol_error", 

0x16c9a03f : "rpc_s_cant_recvmsg", 

0x16c9a040 : "rpc_s_invalid_string_binding", 

0x16c9a041 : "rpc_s_connect_timed_out", 

0x16c9a042 : "rpc_s_connect_rejected", 

0x16c9a043 : "rpc_s_network_unreachable", 

0x16c9a044 : "rpc_s_connect_no_resources", 

0x16c9a045 : "rpc_s_rem_network_shutdown", 

0x16c9a046 : "rpc_s_too_many_rem_connects", 

0x16c9a047 : "rpc_s_no_rem_endpoint", 

0x16c9a048 : "rpc_s_rem_host_down", 

0x16c9a049 : "rpc_s_host_unreachable", 

0x16c9a04a : "rpc_s_access_control_info_inv", 

0x16c9a04b : "rpc_s_loc_connect_aborted", 

0x16c9a04c : "rpc_s_connect_closed_by_rem", 

0x16c9a04d : "rpc_s_rem_host_crashed", 

0x16c9a04e : "rpc_s_invalid_endpoint_format", 

0x16c9a04f : "rpc_s_unknown_status_code", 

0x16c9a050 : "rpc_s_unknown_mgr_type", 

0x16c9a051 : "rpc_s_assoc_creation_failed", 

0x16c9a052 : "rpc_s_assoc_grp_max_exceeded", 

0x16c9a053 : "rpc_s_assoc_grp_alloc_failed", 

0x16c9a054 : "rpc_s_sm_invalid_state", 

0x16c9a055 : "rpc_s_assoc_req_rejected", 

0x16c9a056 : "rpc_s_assoc_shutdown", 

0x16c9a057 : "rpc_s_tsyntaxes_unsupported", 

0x16c9a058 : "rpc_s_context_id_not_found", 

0x16c9a059 : "rpc_s_cant_listen_socket", 

0x16c9a05a : "rpc_s_no_addrs", 

0x16c9a05b : "rpc_s_cant_getpeername", 

0x16c9a05c : "rpc_s_cant_get_if_id", 

0x16c9a05d : "rpc_s_protseq_not_supported", 

0x16c9a05e : "rpc_s_call_orphaned", 

0x16c9a05f : "rpc_s_who_are_you_failed", 

0x16c9a060 : "rpc_s_unknown_reject", 

0x16c9a061 : "rpc_s_type_already_registered", 

0x16c9a062 : "rpc_s_stop_listening_disabled", 

0x16c9a063 : "rpc_s_invalid_arg", 

0x16c9a064 : "rpc_s_not_supported", 

0x16c9a065 : "rpc_s_wrong_kind_of_binding", 

0x16c9a066 : "rpc_s_authn_authz_mismatch", 

0x16c9a067 : "rpc_s_call_queued", 

0x16c9a068 : "rpc_s_cannot_set_nodelay", 

0x16c9a069 : "rpc_s_not_rpc_tower", 

0x16c9a06a : "rpc_s_invalid_rpc_protid", 

0x16c9a06b : "rpc_s_invalid_rpc_floor", 

0x16c9a06c : "rpc_s_call_timeout", 

0x16c9a06d : "rpc_s_mgmt_op_disallowed", 

0x16c9a06e : "rpc_s_manager_not_entered", 

0x16c9a06f : "rpc_s_calls_too_large_for_wk_ep", 

0x16c9a070 : "rpc_s_server_too_busy", 

0x16c9a071 : "rpc_s_prot_version_mismatch", 

0x16c9a072 : "rpc_s_rpc_prot_version_mismatch", 

0x16c9a073 : "rpc_s_ss_no_import_cursor", 

0x16c9a074 : "rpc_s_fault_addr_error", 

0x16c9a075 : "rpc_s_fault_context_mismatch", 

0x16c9a076 : "rpc_s_fault_fp_div_by_zero", 

0x16c9a077 : "rpc_s_fault_fp_error", 

0x16c9a078 : "rpc_s_fault_fp_overflow", 

0x16c9a079 : "rpc_s_fault_fp_underflow", 

0x16c9a07a : "rpc_s_fault_ill_inst", 

0x16c9a07b : "rpc_s_fault_int_div_by_zero", 

0x16c9a07c : "rpc_s_fault_int_overflow", 

0x16c9a07d : "rpc_s_fault_invalid_bound", 

0x16c9a07e : "rpc_s_fault_invalid_tag", 

0x16c9a07f : "rpc_s_fault_pipe_closed", 

0x16c9a080 : "rpc_s_fault_pipe_comm_error", 

0x16c9a081 : "rpc_s_fault_pipe_discipline", 

0x16c9a082 : "rpc_s_fault_pipe_empty", 

0x16c9a083 : "rpc_s_fault_pipe_memory", 

0x16c9a084 : "rpc_s_fault_pipe_order", 

0x16c9a085 : "rpc_s_fault_remote_comm_failure", 

0x16c9a086 : "rpc_s_fault_remote_no_memory", 

0x16c9a087 : "rpc_s_fault_unspec", 

0x16c9a088 : "uuid_s_bad_version", 

0x16c9a089 : "uuid_s_socket_failure", 

0x16c9a08a : "uuid_s_getconf_failure", 

0x16c9a08b : "uuid_s_no_address", 

0x16c9a08c : "uuid_s_overrun", 

0x16c9a08d : "uuid_s_internal_error", 

0x16c9a08e : "uuid_s_coding_error", 

0x16c9a08f : "uuid_s_invalid_string_uuid", 

0x16c9a090 : "uuid_s_no_memory", 

0x16c9a091 : "rpc_s_no_more_entries", 

0x16c9a092 : "rpc_s_unknown_ns_error", 

0x16c9a093 : "rpc_s_name_service_unavailable", 

0x16c9a094 : "rpc_s_incomplete_name", 

0x16c9a095 : "rpc_s_group_not_found", 

0x16c9a096 : "rpc_s_invalid_name_syntax", 

0x16c9a097 : "rpc_s_no_more_members", 

0x16c9a098 : "rpc_s_no_more_interfaces", 

0x16c9a099 : "rpc_s_invalid_name_service", 

0x16c9a09a : "rpc_s_no_name_mapping", 

0x16c9a09b : "rpc_s_profile_not_found", 

0x16c9a09c : "rpc_s_not_found", 

0x16c9a09d : "rpc_s_no_updates", 

0x16c9a09e : "rpc_s_update_failed", 

0x16c9a09f : "rpc_s_no_match_exported", 

0x16c9a0a0 : "rpc_s_entry_not_found", 

0x16c9a0a1 : "rpc_s_invalid_inquiry_context", 

0x16c9a0a2 : "rpc_s_interface_not_found", 

0x16c9a0a3 : "rpc_s_group_member_not_found", 

0x16c9a0a4 : "rpc_s_entry_already_exists", 

0x16c9a0a5 : "rpc_s_nsinit_failure", 

0x16c9a0a6 : "rpc_s_unsupported_name_syntax", 

0x16c9a0a7 : "rpc_s_no_more_elements", 

0x16c9a0a8 : "rpc_s_no_ns_permission", 

0x16c9a0a9 : "rpc_s_invalid_inquiry_type", 

0x16c9a0aa : "rpc_s_profile_element_not_found", 

0x16c9a0ab : "rpc_s_profile_element_replaced", 

0x16c9a0ac : "rpc_s_import_already_done", 

0x16c9a0ad : "rpc_s_database_busy", 

0x16c9a0ae : "rpc_s_invalid_import_context", 

0x16c9a0af : "rpc_s_uuid_set_not_found", 

0x16c9a0b0 : "rpc_s_uuid_member_not_found", 

0x16c9a0b1 : "rpc_s_no_interfaces_exported", 

0x16c9a0b2 : "rpc_s_tower_set_not_found", 

0x16c9a0b3 : "rpc_s_tower_member_not_found", 

0x16c9a0b4 : "rpc_s_obj_uuid_not_found", 

0x16c9a0b5 : "rpc_s_no_more_bindings", 

0x16c9a0b6 : "rpc_s_invalid_priority", 

0x16c9a0b7 : "rpc_s_not_rpc_entry", 

0x16c9a0b8 : "rpc_s_invalid_lookup_context", 

0x16c9a0b9 : "rpc_s_binding_vector_full", 

0x16c9a0ba : "rpc_s_cycle_detected", 

0x16c9a0bb : "rpc_s_nothing_to_export", 

0x16c9a0bc : "rpc_s_nothing_to_unexport", 

0x16c9a0bd : "rpc_s_invalid_vers_option", 

0x16c9a0be : "rpc_s_no_rpc_data", 

0x16c9a0bf : "rpc_s_mbr_picked", 

0x16c9a0c0 : "rpc_s_not_all_objs_unexported", 

0x16c9a0c1 : "rpc_s_no_entry_name", 

0x16c9a0c2 : "rpc_s_priority_group_done", 

0x16c9a0c3 : "rpc_s_partial_results", 

0x16c9a0c4 : "rpc_s_no_env_setup", 

0x16c9a0c5 : "twr_s_unknown_sa", 

0x16c9a0c6 : "twr_s_unknown_tower", 

0x16c9a0c7 : "twr_s_not_implemented", 

0x16c9a0c8 : "rpc_s_max_calls_too_small", 

0x16c9a0c9 : "rpc_s_cthread_create_failed", 

0x16c9a0ca : "rpc_s_cthread_pool_exists", 

0x16c9a0cb : "rpc_s_cthread_no_such_pool", 

0x16c9a0cc : "rpc_s_cthread_invoke_disabled", 

0x16c9a0cd : "ept_s_cant_perform_op", 

0x16c9a0ce : "ept_s_no_memory", 

0x16c9a0cf : "ept_s_database_invalid", 

0x16c9a0d0 : "ept_s_cant_create", 

0x16c9a0d1 : "ept_s_cant_access", 

0x16c9a0d2 : "ept_s_database_already_open", 

0x16c9a0d3 : "ept_s_invalid_entry", 

0x16c9a0d4 : "ept_s_update_failed", 

0x16c9a0d5 : "ept_s_invalid_context", 

0x16c9a0d6 : "ept_s_not_registered", 

0x16c9a0d7 : "ept_s_server_unavailable", 

0x16c9a0d8 : "rpc_s_underspecified_name", 

0x16c9a0d9 : "rpc_s_invalid_ns_handle", 

0x16c9a0da : "rpc_s_unknown_error", 

0x16c9a0db : "rpc_s_ss_char_trans_open_fail", 

0x16c9a0dc : "rpc_s_ss_char_trans_short_file", 

0x16c9a0dd : "rpc_s_ss_context_damaged", 

0x16c9a0de : "rpc_s_ss_in_null_context", 

0x16c9a0df : "rpc_s_socket_failure", 

0x16c9a0e0 : "rpc_s_unsupported_protect_level", 

0x16c9a0e1 : "rpc_s_invalid_checksum", 

0x16c9a0e2 : "rpc_s_invalid_credentials", 

0x16c9a0e3 : "rpc_s_credentials_too_large", 

0x16c9a0e4 : "rpc_s_call_id_not_found", 

0x16c9a0e5 : "rpc_s_key_id_not_found", 

0x16c9a0e6 : "rpc_s_auth_bad_integrity", 

0x16c9a0e7 : "rpc_s_auth_tkt_expired", 

0x16c9a0e8 : "rpc_s_auth_tkt_nyv", 

0x16c9a0e9 : "rpc_s_auth_repeat", 

0x16c9a0ea : "rpc_s_auth_not_us", 

0x16c9a0eb : "rpc_s_auth_badmatch", 

0x16c9a0ec : "rpc_s_auth_skew", 

0x16c9a0ed : "rpc_s_auth_badaddr", 

0x16c9a0ee : "rpc_s_auth_badversion", 

0x16c9a0ef : "rpc_s_auth_msg_type", 

0x16c9a0f0 : "rpc_s_auth_modified", 

0x16c9a0f1 : "rpc_s_auth_badorder", 

0x16c9a0f2 : "rpc_s_auth_badkeyver", 

0x16c9a0f3 : "rpc_s_auth_nokey", 

0x16c9a0f4 : "rpc_s_auth_mut_fail", 

0x16c9a0f5 : "rpc_s_auth_baddirection", 

0x16c9a0f6 : "rpc_s_auth_method", 

0x16c9a0f7 : "rpc_s_auth_badseq", 

0x16c9a0f8 : "rpc_s_auth_inapp_cksum", 

0x16c9a0f9 : "rpc_s_auth_field_toolong", 

0x16c9a0fa : "rpc_s_invalid_crc", 

0x16c9a0fb : "rpc_s_binding_incomplete", 

0x16c9a0fc : "rpc_s_key_func_not_allowed", 

0x16c9a0fd : "rpc_s_unknown_stub_rtl_if_vers", 

0x16c9a0fe : "rpc_s_unknown_ifspec_vers", 

0x16c9a0ff : "rpc_s_proto_unsupp_by_auth", 

0x16c9a100 : "rpc_s_authn_challenge_malformed", 

0x16c9a101 : "rpc_s_protect_level_mismatch", 

0x16c9a102 : "rpc_s_no_mepv", 

0x16c9a103 : "rpc_s_stub_protocol_error", 

0x16c9a104 : "rpc_s_class_version_mismatch", 

0x16c9a105 : "rpc_s_helper_not_running", 

0x16c9a106 : "rpc_s_helper_short_read", 

0x16c9a107 : "rpc_s_helper_catatonic", 

0x16c9a108 : "rpc_s_helper_aborted", 

0x16c9a109 : "rpc_s_not_in_kernel", 

0x16c9a10a : "rpc_s_helper_wrong_user", 

0x16c9a10b : "rpc_s_helper_overflow", 

0x16c9a10c : "rpc_s_dg_need_way_auth", 

0x16c9a10d : "rpc_s_unsupported_auth_subtype", 

0x16c9a10e : "rpc_s_wrong_pickle_type", 

0x16c9a10f : "rpc_s_not_listening", 

0x16c9a110 : "rpc_s_ss_bad_buffer", 

0x16c9a111 : "rpc_s_ss_bad_es_action", 

0x16c9a112 : "rpc_s_ss_wrong_es_version", 

0x16c9a113 : "rpc_s_fault_user_defined", 

0x16c9a114 : "rpc_s_ss_incompatible_codesets", 

0x16c9a115 : "rpc_s_tx_not_in_transaction", 

0x16c9a116 : "rpc_s_tx_open_failed", 

0x16c9a117 : "rpc_s_partial_credentials", 

0x16c9a118 : "rpc_s_ss_invalid_codeset_tag", 

0x16c9a119 : "rpc_s_mgmt_bad_type", 

0x16c9a11a : "rpc_s_ss_invalid_char_input", 

0x16c9a11b : "rpc_s_ss_short_conv_buffer", 

0x16c9a11c : "rpc_s_ss_iconv_error", 

0x16c9a11d : "rpc_s_ss_no_compat_codeset", 

0x16c9a11e : "rpc_s_ss_no_compat_charsets", 

0x16c9a11f : "dce_cs_c_ok", 

0x16c9a120 : "dce_cs_c_unknown", 

0x16c9a121 : "dce_cs_c_notfound", 

0x16c9a122 : "dce_cs_c_cannot_open_file", 

0x16c9a123 : "dce_cs_c_cannot_read_file", 

0x16c9a124 : "dce_cs_c_cannot_allocate_memory", 

0x16c9a125 : "rpc_s_ss_cleanup_failed", 

0x16c9a126 : "rpc_svc_desc_general", 

0x16c9a127 : "rpc_svc_desc_mutex", 

0x16c9a128 : "rpc_svc_desc_xmit", 

0x16c9a129 : "rpc_svc_desc_recv", 

0x16c9a12a : "rpc_svc_desc_dg_state", 

0x16c9a12b : "rpc_svc_desc_cancel", 

0x16c9a12c : "rpc_svc_desc_orphan", 

0x16c9a12d : "rpc_svc_desc_cn_state", 

0x16c9a12e : "rpc_svc_desc_cn_pkt", 

0x16c9a12f : "rpc_svc_desc_pkt_quotas", 

0x16c9a130 : "rpc_svc_desc_auth", 

0x16c9a131 : "rpc_svc_desc_source", 

0x16c9a132 : "rpc_svc_desc_stats", 

0x16c9a133 : "rpc_svc_desc_mem", 

0x16c9a134 : "rpc_svc_desc_mem_type", 

0x16c9a135 : "rpc_svc_desc_dg_pktlog", 

0x16c9a136 : "rpc_svc_desc_thread_id", 

0x16c9a137 : "rpc_svc_desc_timestamp", 

0x16c9a138 : "rpc_svc_desc_cn_errors", 

0x16c9a139 : "rpc_svc_desc_conv_thread", 

0x16c9a13a : "rpc_svc_desc_pid", 

0x16c9a13b : "rpc_svc_desc_atfork", 

0x16c9a13c : "rpc_svc_desc_cma_thread", 

0x16c9a13d : "rpc_svc_desc_inherit", 

0x16c9a13e : "rpc_svc_desc_dg_sockets", 

0x16c9a13f : "rpc_svc_desc_timer", 

0x16c9a140 : "rpc_svc_desc_threads", 

0x16c9a141 : "rpc_svc_desc_server_call", 

0x16c9a142 : "rpc_svc_desc_nsi", 

0x16c9a143 : "rpc_svc_desc_dg_pkt", 

0x16c9a144 : "rpc_m_cn_ill_state_trans_sa", 

0x16c9a145 : "rpc_m_cn_ill_state_trans_ca", 

0x16c9a146 : "rpc_m_cn_ill_state_trans_sg", 

0x16c9a147 : "rpc_m_cn_ill_state_trans_cg", 

0x16c9a148 : "rpc_m_cn_ill_state_trans_sr", 

0x16c9a149 : "rpc_m_cn_ill_state_trans_cr", 

0x16c9a14a : "rpc_m_bad_pkt_type", 

0x16c9a14b : "rpc_m_prot_mismatch", 

0x16c9a14c : "rpc_m_frag_toobig", 

0x16c9a14d : "rpc_m_unsupp_stub_rtl_if", 

0x16c9a14e : "rpc_m_unhandled_callstate", 

0x16c9a14f : "rpc_m_call_failed", 

0x16c9a150 : "rpc_m_call_failed_no_status", 

0x16c9a151 : "rpc_m_call_failed_errno", 

0x16c9a152 : "rpc_m_call_failed_s", 

0x16c9a153 : "rpc_m_call_failed_c", 

0x16c9a154 : "rpc_m_errmsg_toobig", 

0x16c9a155 : "rpc_m_invalid_srchattr", 

0x16c9a156 : "rpc_m_nts_not_found", 

0x16c9a157 : "rpc_m_invalid_accbytcnt", 

0x16c9a158 : "rpc_m_pre_v2_ifspec", 

0x16c9a159 : "rpc_m_unk_ifspec", 

0x16c9a15a : "rpc_m_recvbuf_toosmall", 

0x16c9a15b : "rpc_m_unalign_authtrl", 

0x16c9a15c : "rpc_m_unexpected_exc", 

0x16c9a15d : "rpc_m_no_stub_data", 

0x16c9a15e : "rpc_m_eventlist_full", 

0x16c9a15f : "rpc_m_unk_sock_type", 

0x16c9a160 : "rpc_m_unimp_call", 

0x16c9a161 : "rpc_m_invalid_seqnum", 

0x16c9a162 : "rpc_m_cant_create_uuid", 

0x16c9a163 : "rpc_m_pre_v2_ss", 

0x16c9a164 : "rpc_m_dgpkt_pool_corrupt", 

0x16c9a165 : "rpc_m_dgpkt_bad_free", 

0x16c9a166 : "rpc_m_lookaside_corrupt", 

0x16c9a167 : "rpc_m_alloc_fail", 

0x16c9a168 : "rpc_m_realloc_fail", 

0x16c9a169 : "rpc_m_cant_open_file", 

0x16c9a16a : "rpc_m_cant_read_addr", 

0x16c9a16b : "rpc_svc_desc_libidl", 

0x16c9a16c : "rpc_m_ctxrundown_nomem", 

0x16c9a16d : "rpc_m_ctxrundown_exc", 

0x16c9a16e : "rpc_s_fault_codeset_conv_error", 

0x16c9a16f : "rpc_s_no_call_active", 

0x16c9a170 : "rpc_s_cannot_support", 

0x16c9a171 : "rpc_s_no_context_available", 

} 

 

class DCERPCException(Exception): 

""" 

This is the exception every client should catch regardless of the underlying 

DCERPC Transport used. 

""" 

def __init__(self, error_string=None, error_code=None, packet=None): 

""" 

:param string error_string: A string you want to show explaining the exception. Otherwise the default ones will be used 

:param integer error_code: the error_code if we're using a dictionary with error's descriptions 

:param NDR packet: if successfully decoded, the NDR packet of the response call. This could probably have useful 

information 

""" 

Exception.__init__(self) 

self.packet = packet 

self.error_string = error_string 

if packet is not None: 

try: 

self.error_code = packet['ErrorCode'] 

except: 

self.error_code = error_code 

else: 

self.error_code = error_code 

 

def get_error_code( self ): 

return self.error_code 

 

def get_packet( self ): 

return self.packet 

 

def __str__( self ): 

key = self.error_code 

if self.error_string is not None: 

return self.error_string 

577 ↛ 581line 577 didn't jump to line 581, because the condition on line 577 was never false if key in rpc_status_codes: 

error_msg_short = rpc_status_codes[key] 

return 'DCERPC Runtime Error: code: 0x%x - %s ' % (self.error_code, error_msg_short) 

else: 

return 'DCERPC Runtime Error: unknown error code: 0x%x' % self.error_code 

 

# Context Item 

class CtxItem(Structure): 

structure = ( 

('ContextID','<H=0'), 

('TransItems','B=0'), 

('Pad','B=0'), 

('AbstractSyntax','20s=""'), 

('TransferSyntax','20s=""'), 

) 

 

class CtxItemResult(Structure): 

structure = ( 

('Result','<H=0'), 

('Reason','<H=0'), 

('TransferSyntax','20s=""'), 

) 

 

class SEC_TRAILER(Structure): 

commonHdr = ( 

('auth_type', 'B=10'), 

('auth_level','B=0'), 

('auth_pad_len','B=0'), 

('auth_rsvrd','B=0'), 

('auth_ctx_id','<L=747920'), 

) 

 

class MSRPCHeader(Structure): 

_SIZE = 16 

commonHdr = ( 

('ver_major','B=5'), # 0 

('ver_minor','B=0'), # 1 

('type','B=0'), # 2 

('flags','B=0'), # 3 

('representation','<L=0x10'), # 4 

('frag_len','<H=self._SIZE+len(auth_data)+(16 if (self["flags"] & 0x80) > 0 else 0)+len(pduData)+len(pad)+len(sec_trailer)'), # 8 

('auth_len','<H=len(auth_data)'), # 10 

('call_id','<L=1'), # 12 <-- Common up to here (including this) 

) 

 

structure = ( 

('dataLen','_-pduData','self["frag_len"]-self["auth_len"]-self._SIZE-(8 if self["auth_len"] > 0 else 0)'), 

('pduData',':'), 

('_pad', '_-pad','(4 - ((self._SIZE + (16 if (self["flags"] & 0x80) > 0 else 0) + len(self["pduData"])) & 3) & 3)'), 

('pad', ':'), 

('_sec_trailer', '_-sec_trailer', '8 if self["auth_len"] > 0 else 0'), 

('sec_trailer',':'), 

('auth_dataLen','_-auth_data','self["auth_len"]'), 

('auth_data',':'), 

) 

 

def __init__(self, data = None, alignment = 0): 

Structure.__init__(self,data, alignment) 

if data is None: 

self['ver_major'] = 5 

self['ver_minor'] = 0 

self['flags'] = PFC_FIRST_FRAG | PFC_LAST_FRAG 

self['type'] = MSRPC_REQUEST 

self.__frag_len_set = 0 

self['auth_len'] = 0 

self['pduData'] = b'' 

self['auth_data'] = b'' 

self['sec_trailer'] = b'' 

self['pad'] = b'' 

 

def get_header_size(self): 

return self._SIZE + (16 if (self["flags"] & PFC_OBJECT_UUID) > 0 else 0) 

 

def get_packet(self): 

if self['auth_data'] != b'': 

self['auth_len'] = len(self['auth_data']) 

# The sec_trailer structure MUST be 4-byte aligned with respect to  

# the beginning of the PDU. Padding octets MUST be used to align the  

# sec_trailer structure if its natural beginning is not already 4-byte aligned 

##self['pad'] = '\xAA' * (4 - ((self._SIZE + len(self['pduData'])) & 3) & 3) 

 

return self.getData() 

 

class MSRPCRequestHeader(MSRPCHeader): 

_SIZE = 24 

commonHdr = MSRPCHeader.commonHdr + ( 

('alloc_hint','<L=0'), # 16 

('ctx_id','<H=0'), # 20 

('op_num','<H=0'), # 22 

('_uuid','_-uuid','16 if self["flags"] & 0x80 > 0 else 0' ), # 22 

('uuid',':'), # 22 

) 

 

def __init__(self, data = None, alignment = 0): 

MSRPCHeader.__init__(self, data, alignment) 

672 ↛ exitline 672 didn't return from function '__init__', because the condition on line 672 was never false if data is None: 

self['type'] = MSRPC_REQUEST 

self['ctx_id'] = 0 

self['uuid'] = b'' 

 

class MSRPCRespHeader(MSRPCHeader): 

_SIZE = 24 

commonHdr = MSRPCHeader.commonHdr + ( 

('alloc_hint','<L=0'), # 16  

('ctx_id','<H=0'), # 20 

('cancel_count','<B=0'), # 22 

('padding','<B=0'), # 23 

) 

 

def __init__(self, aBuffer = None, alignment = 0): 

MSRPCHeader.__init__(self, aBuffer, alignment) 

688 ↛ 689line 688 didn't jump to line 689, because the condition on line 688 was never true if aBuffer is None: 

self['type'] = MSRPC_RESPONSE 

self['ctx_id'] = 0 

 

class MSRPCBind(Structure): 

_CTX_ITEM_LEN = len(CtxItem()) 

structure = ( 

('max_tfrag','<H=4280'), 

('max_rfrag','<H=4280'), 

('assoc_group','<L=0'), 

('ctx_num','B=0'), 

('Reserved','B=0'), 

('Reserved2','<H=0'), 

('_ctx_items', '_-ctx_items', 'self["ctx_num"]*self._CTX_ITEM_LEN'), 

('ctx_items',':'), 

) 

 

def __init__(self, data = None, alignment = 0): 

Structure.__init__(self, data, alignment) 

707 ↛ 713line 707 didn't jump to line 713, because the condition on line 707 was never false if data is None: 

self['max_tfrag'] = 4280 

self['max_rfrag'] = 4280 

self['assoc_group'] = 0 

self['ctx_num'] = 1 

self['ctx_items'] = b'' 

self.__ctx_items = [] 

 

def addCtxItem(self, item): 

self.__ctx_items.append(item) 

 

def getData(self): 

self['ctx_num'] = len(self.__ctx_items) 

for i in self.__ctx_items: 

self['ctx_items'] += i.getData() 

return Structure.getData(self) 

 

class MSRPCBindAck(MSRPCHeader): 

_SIZE = 26 # Up to SecondaryAddr 

_CTX_ITEM_LEN = len(CtxItemResult()) 

structure = ( 

('max_tfrag','<H=0'), 

('max_rfrag','<H=0'), 

('assoc_group','<L=0'), 

('SecondaryAddrLen','<H&SecondaryAddr'), 

('SecondaryAddr','z'), # Optional if SecondaryAddrLen == 0 

('PadLen','_-Pad','(4-((self["SecondaryAddrLen"]+self._SIZE) % 4))%4'), 

('Pad',':'), 

('ctx_num','B=0'), 

('Reserved','B=0'), 

('Reserved2','<H=0'), 

('_ctx_items','_-ctx_items','self["ctx_num"]*self._CTX_ITEM_LEN'), 

('ctx_items',':'), 

('_sec_trailer', '_-sec_trailer', '8 if self["auth_len"] > 0 else 0'), 

('sec_trailer',':'), 

('auth_dataLen','_-auth_data','self["auth_len"]'), 

('auth_data',':'), 

) 

def __init__(self, data = None, alignment = 0): 

self.__ctx_items = [] 

MSRPCHeader.__init__(self,data,alignment) 

748 ↛ 749line 748 didn't jump to line 749, because the condition on line 748 was never true if data is None: 

self['Pad'] = b'' 

self['ctx_items'] = b'' 

self['sec_trailer'] = b'' 

self['auth_data'] = b'' 

 

def getCtxItems(self): 

return self.__ctx_items 

 

def getCtxItem(self,index): 

return self.__ctx_items[index-1] 

 

def fromString(self, data): 

Structure.fromString(self,data) 

# Parse the ctx_items 

data = self['ctx_items'] 

for i in range(self['ctx_num']): 

item = CtxItemResult(data) 

self.__ctx_items.append(item) 

data = data[len(item):] 

 

class MSRPCBindNak(Structure): 

structure = ( 

('RejectedReason','<H=0'), 

('SupportedVersions',':'), 

) 

def __init__(self, data = None, alignment = 0): 

Structure.__init__(self,data,alignment) 

if data is None: 

self['SupportedVersions'] = b'' 

 

class DCERPC: 

# Standard NDR Representation 

NDRSyntax = uuidtup_to_bin(('8a885d04-1ceb-11c9-9fe8-08002b104860', '2.0')) 

# NDR 64 

NDR64Syntax = uuidtup_to_bin(('71710533-BEBA-4937-8319-B5DBEF9CCC36', '1.0')) 

transfer_syntax = NDRSyntax 

 

def __init__(self,transport): 

self._transport = transport 

self.set_ctx_id(0) 

self._max_user_frag = None 

self.set_default_max_fragment_size() 

self._ctx = None 

 

def get_rpc_transport(self): 

return self._transport 

 

def set_ctx_id(self, ctx_id): 

self._ctx = ctx_id 

 

def connect(self): 

return self._transport.connect() 

 

def disconnect(self): 

return self._transport.disconnect() 

 

def set_max_fragment_size(self, fragment_size): 

# -1 is default fragment size: 0 for v5, 1300 y pico for v4 

# 0 is don't fragment 

# other values are max fragment size 

809 ↛ 810line 809 didn't jump to line 810, because the condition on line 809 was never true if fragment_size == -1: 

self.set_default_max_fragment_size() 

else: 

self._max_user_frag = fragment_size 

 

def set_default_max_fragment_size(self): 

# default is 0: don'fragment. v4 will override this method 

self._max_user_frag = 0 

 

def send(self, data): 

raise RuntimeError ('virtual method. Not implemented in subclass') 

 

def recv(self): 

raise RuntimeError ('virtual method. Not implemented in subclass') 

 

def alter_ctx(self, newUID, bogus_binds=''): 

raise RuntimeError ('virtual method. Not implemented in subclass') 

 

def set_credentials(self, username, password, domain='', lmhash='', nthash='', aesKey='', TGT=None, TGS=None): 

pass 

 

def set_auth_level(self, auth_level): 

pass 

 

def set_auth_type(self, auth_type, callback=None): 

pass 

 

def get_idempotent(self): 

return 0 

 

def set_idempotent(self, flag): 

pass 

 

def call(self, function, body, uuid=None): 

843 ↛ 846line 843 didn't jump to line 846, because the condition on line 843 was never false if hasattr(body, 'getData'): 

return self.send(DCERPC_RawCall(function, body.getData(), uuid)) 

else: 

return self.send(DCERPC_RawCall(function, body, uuid)) 

 

def request(self, request, uuid=None, checkError=True): 

if self.transfer_syntax == self.NDR64Syntax: 

request.changeTransferSyntax(self.NDR64Syntax) 

isNDR64 = True 

else: 

isNDR64 = False 

 

self.call(request.opnum, request, uuid) 

answer = self.recv() 

 

__import__(request.__module__) 

module = sys.modules[request.__module__] 

respClass = getattr(module, request.__class__.__name__ + 'Response') 

 

if answer[-4:] != b'\x00\x00\x00\x00' and checkError is True: 

error_code = unpack('<L', answer[-4:])[0] 

if error_code in rpc_status_codes: 

# This is an error we can handle 

exception = DCERPCException(error_code = error_code) 

else: 

sessionErrorClass = getattr(module, 'DCERPCSessionError') 

try: 

# Try to unpack the answer, even if it is an error, it works most of the times 

response = respClass(answer, isNDR64 = isNDR64) 

except: 

# No luck :( 

exception = sessionErrorClass(error_code = error_code) 

else: 

exception = sessionErrorClass(packet = response, error_code = error_code) 

raise exception 

else: 

response = respClass(answer, isNDR64 = isNDR64) 

return response 

 

class DCERPC_v4(DCERPC): 

pass 

 

class DCERPC_v5(DCERPC): 

def __init__(self, transport): 

DCERPC.__init__(self, transport) 

self.__auth_level = RPC_C_AUTHN_LEVEL_NONE 

self.__auth_type = RPC_C_AUTHN_WINNT 

self.__auth_type_callback = None 

# Flags of the authenticated session. We will need them throughout the connection 

self.__auth_flags = 0 

self.__username = None 

self.__password = None 

self.__domain = '' 

self.__lmhash = '' 

self.__nthash = '' 

self.__aesKey = '' 

self.__TGT = None 

self.__TGS = None 

 

self.__clientSigningKey = b'' 

self.__serverSigningKey = b'' 

self.__clientSealingKey = b'' 

self.__clientSealingHandle = b'' 

self.__serverSealingKey = b'' 

self.__serverSealingHandle = b'' 

self.__sequence = 0 

 

self.transfer_syntax = uuidtup_to_bin(('8a885d04-1ceb-11c9-9fe8-08002b104860', '2.0')) 

self.__callid = 1 

self._ctx = 0 

self.__sessionKey = None 

self.__max_xmit_size = 0 

self.__flags = 0 

self.__cipher = None 

self.__confounder = b'' 

self.__gss = None 

 

def set_session_key(self, session_key): 

self.__sessionKey = session_key 

 

def get_session_key(self): 

return self.__sessionKey 

 

def set_auth_level(self, auth_level): 

self.__auth_level = auth_level 

 

def set_auth_type(self, auth_type, callback = None): 

self.__auth_type = auth_type 

self.__auth_type_callback = callback 

 

def get_auth_type(self): 

return self.__auth_type 

 

def set_max_tfrag(self, size): 

self.__max_xmit_size = size 

 

def get_credentials(self): 

return self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, self.__aesKey, self.__TGT, self.__TGS 

 

def set_credentials(self, username, password, domain = '', lmhash = '', nthash = '', aesKey = '', TGT = None, TGS = None): 

self.set_auth_level(RPC_C_AUTHN_LEVEL_CONNECT) 

self.__username = username 

self.__password = password 

self.__domain = domain 

self.__aesKey = aesKey 

self.__TGT = TGT 

self.__TGS = TGS 

if lmhash != '' or nthash != '': 

951 ↛ 952line 951 didn't jump to line 952, because the condition on line 951 was never true if len(lmhash) % 2: 

lmhash = '0%s' % lmhash 

953 ↛ 954line 953 didn't jump to line 954, because the condition on line 953 was never true if len(nthash) % 2: 

nthash = '0%s' % nthash 

try: # just in case they were converted already 

self.__lmhash = unhexlify(lmhash) 

self.__nthash = unhexlify(nthash) 

except: 

self.__lmhash = lmhash 

self.__nthash = nthash 

pass 

 

def bind(self, iface_uuid, alter = 0, bogus_binds = 0, transfer_syntax = ('8a885d04-1ceb-11c9-9fe8-08002b104860', '2.0')): 

bind = MSRPCBind() 

#item['TransferSyntax']['Version'] = 1 

ctx = self._ctx 

967 ↛ 968line 967 didn't jump to line 968, because the loop on line 967 never started for i in range(bogus_binds): 

item = CtxItem() 

item['ContextID'] = ctx 

item['TransItems'] = 1 

item['ContextID'] = ctx 

# We generate random UUIDs for bogus binds 

item['AbstractSyntax'] = generate() + stringver_to_bin('2.0') 

item['TransferSyntax'] = uuidtup_to_bin(transfer_syntax) 

bind.addCtxItem(item) 

self._ctx += 1 

ctx += 1 

 

# The true one :) 

item = CtxItem() 

item['AbstractSyntax'] = iface_uuid 

item['TransferSyntax'] = uuidtup_to_bin(transfer_syntax) 

item['ContextID'] = ctx 

item['TransItems'] = 1 

bind.addCtxItem(item) 

 

packet = MSRPCHeader() 

packet['type'] = MSRPC_BIND 

packet['pduData'] = bind.getData() 

packet['call_id'] = self.__callid 

 

if alter: 

packet['type'] = MSRPC_ALTERCTX 

 

if self.__auth_level != RPC_C_AUTHN_LEVEL_NONE: 

if (self.__username is None) or (self.__password is None): 

self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, self.__aesKey, self.__TGT, self.__TGS = self._transport.get_credentials() 

 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

auth = ntlm.getNTLMSSPType1('', '', signingRequired=True, 

use_ntlmv2=self._transport.doesSupportNTLMv2()) 

1002 ↛ 1003line 1002 didn't jump to line 1003, because the condition on line 1002 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

from impacket.dcerpc.v5 import nrpc 

auth = nrpc.getSSPType1(self.__username[:-1], self.__domain, signingRequired=True) 

1005 ↛ 1013line 1005 didn't jump to line 1013, because the condition on line 1005 was never false elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

self.__cipher, self.__sessionKey, auth = kerberosv5.getKerberosType1(self.__username, self.__password, 

self.__domain, self.__lmhash, 

self.__nthash, self.__aesKey, 

self.__TGT, self.__TGS, 

self._transport.getRemoteName(), 

self._transport.get_kdcHost()) 

else: 

raise DCERPCException('Unsupported auth_type 0x%x' % self.__auth_type) 

 

sec_trailer = SEC_TRAILER() 

sec_trailer['auth_type'] = self.__auth_type 

sec_trailer['auth_level'] = self.__auth_level 

sec_trailer['auth_ctx_id'] = self._ctx + 79231 

 

pad = (4 - (len(packet.get_packet()) % 4)) % 4 

1021 ↛ 1022line 1021 didn't jump to line 1022, because the condition on line 1021 was never true if pad != 0: 

packet['pduData'] += b'\xFF'*pad 

sec_trailer['auth_pad_len']=pad 

 

packet['sec_trailer'] = sec_trailer 

packet['auth_data'] = auth 

 

self._transport.send(packet.get_packet()) 

 

s = self._transport.recv() 

 

1032 ↛ 1035line 1032 didn't jump to line 1035, because the condition on line 1032 was never false if s != 0: 

resp = MSRPCHeader(s) 

else: 

return 0 #mmm why not None? 

 

1037 ↛ 1039line 1037 didn't jump to line 1039, because the condition on line 1037 was never false if resp['type'] == MSRPC_BINDACK or resp['type'] == MSRPC_ALTERCTX_R: 

bindResp = MSRPCBindAck(resp.getData()) 

elif resp['type'] == MSRPC_BINDNAK or resp['type'] == MSRPC_FAULT: 

if resp['type'] == MSRPC_FAULT: 

resp = MSRPCRespHeader(resp.getData()) 

status_code = unpack('<L', resp['pduData'][:4])[0] 

else: 

resp = MSRPCBindNak(resp['pduData']) 

status_code = resp['RejectedReason'] 

if status_code in rpc_status_codes: 

raise DCERPCException(error_code = status_code) 

elif status_code in rpc_provider_reason: 

raise DCERPCException("Bind context rejected: %s" % rpc_provider_reason[status_code]) 

else: 

raise DCERPCException('Unknown DCE RPC fault status code: %.8x' % status_code) 

else: 

raise DCERPCException('Unknown DCE RPC packet type received: %d' % resp['type']) 

 

# check ack results for each context, except for the bogus ones 

for ctx in range(bogus_binds+1,bindResp['ctx_num']+1): 

ctxItems = bindResp.getCtxItem(ctx) 

1058 ↛ 1059line 1058 didn't jump to line 1059, because the condition on line 1058 was never true if ctxItems['Result'] != 0: 

msg = "Bind context %d rejected: " % ctx 

msg += rpc_cont_def_result.get(ctxItems['Result'], 'Unknown DCE RPC context result code: %.4x' % ctxItems['Result']) 

msg += "; " 

reason = bindResp.getCtxItem(ctx)['Reason'] 

msg += rpc_provider_reason.get(reason, 'Unknown reason code: %.4x' % reason) 

if (ctxItems['Result'], reason) == (2, 1): # provider_rejection, abstract syntax not supported 

msg += " (this usually means the interface isn't listening on the given endpoint)" 

raise DCERPCException(msg) 

 

# Save the transfer syntax for later use 

self.transfer_syntax = ctxItems['TransferSyntax'] 

 

# The received transmit size becomes the client's receive size, and the received receive size becomes the client's transmit size. 

self.__max_xmit_size = bindResp['max_rfrag'] 

 

if self.__auth_level != RPC_C_AUTHN_LEVEL_NONE: 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

response, self.__sessionKey = ntlm.getNTLMSSPType3(auth, bindResp['auth_data'], self.__username, 

self.__password, self.__domain, self.__lmhash, 

self.__nthash, 

use_ntlmv2=self._transport.doesSupportNTLMv2()) 

self.__flags = response['flags'] 

1081 ↛ 1082line 1081 didn't jump to line 1082, because the condition on line 1081 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

response = None 

1083 ↛ 1088line 1083 didn't jump to line 1088, because the condition on line 1083 was never false elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

self.__cipher, self.__sessionKey, response = kerberosv5.getKerberosType3(self.__cipher, 

self.__sessionKey, 

bindResp['auth_data']) 

 

self.__sequence = 0 

 

1090 ↛ 1117line 1090 didn't jump to line 1117, because the condition on line 1090 was never false if self.__auth_level in (RPC_C_AUTHN_LEVEL_CONNECT, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY, RPC_C_AUTHN_LEVEL_PKT_PRIVACY): 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

1092 ↛ 1104line 1092 didn't jump to line 1104, because the condition on line 1092 was never false if self.__flags & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 

self.__clientSigningKey = ntlm.SIGNKEY(self.__flags, self.__sessionKey) 

self.__serverSigningKey = ntlm.SIGNKEY(self.__flags, self.__sessionKey,b"Server") 

self.__clientSealingKey = ntlm.SEALKEY(self.__flags, self.__sessionKey) 

self.__serverSealingKey = ntlm.SEALKEY(self.__flags, self.__sessionKey,b"Server") 

# Preparing the keys handle states 

cipher3 = ARC4.new(self.__clientSealingKey) 

self.__clientSealingHandle = cipher3.encrypt 

cipher4 = ARC4.new(self.__serverSealingKey) 

self.__serverSealingHandle = cipher4.encrypt 

else: 

# Same key for everything 

self.__clientSigningKey = self.__sessionKey 

self.__serverSigningKey = self.__sessionKey 

self.__clientSealingKey = self.__sessionKey 

self.__serverSealingKey = self.__sessionKey 

cipher = ARC4.new(self.__clientSigningKey) 

self.__clientSealingHandle = cipher.encrypt 

self.__serverSealingHandle = cipher.encrypt 

1111 ↛ 1112line 1111 didn't jump to line 1112, because the condition on line 1111 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

if self.__auth_level == RPC_C_AUTHN_LEVEL_PKT_INTEGRITY: 

self.__confounder = b'' 

else: 

self.__confounder = b'12345678' 

 

sec_trailer = SEC_TRAILER() 

sec_trailer['auth_type'] = self.__auth_type 

sec_trailer['auth_level'] = self.__auth_level 

sec_trailer['auth_ctx_id'] = self._ctx + 79231 

 

1122 ↛ 1150line 1122 didn't jump to line 1150, because the condition on line 1122 was never false if response is not None: 

if self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

alter_ctx = MSRPCHeader() 

alter_ctx['type'] = MSRPC_ALTERCTX 

alter_ctx['pduData'] = bind.getData() 

alter_ctx['sec_trailer'] = sec_trailer 

alter_ctx['auth_data'] = response 

self._transport.send(alter_ctx.get_packet(), forceWriteAndx = 1) 

self.__gss = gssapi.GSSAPI(self.__cipher) 

self.__sequence = 0 

self.recv() 

self.__sequence = 0 

else: 

auth3 = MSRPCHeader() 

auth3['type'] = MSRPC_AUTH3 

# pad (4 bytes): Can be set to any arbitrary value when set and MUST be  

# ignored on receipt. The pad field MUST be immediately followed by a  

# sec_trailer structure whose layout, location, and alignment are as  

# specified in section 2.2.2.11 

auth3['pduData'] = b' ' 

auth3['sec_trailer'] = sec_trailer 

auth3['auth_data'] = response.getData() 

 

# Use the same call_id 

self.__callid = resp['call_id'] 

auth3['call_id'] = self.__callid 

self._transport.send(auth3.get_packet(), forceWriteAndx = 1) 

 

self.__callid += 1 

 

return resp # means packet is signed, if verifier is wrong it fails 

 

def _transport_send(self, rpc_packet, forceWriteAndx = 0, forceRecv = 0): 

rpc_packet['ctx_id'] = self._ctx 

rpc_packet['sec_trailer'] = b'' 

rpc_packet['auth_data'] = b'' 

 

if self.__auth_level in [RPC_C_AUTHN_LEVEL_PKT_INTEGRITY, RPC_C_AUTHN_LEVEL_PKT_PRIVACY]: 

# Dummy verifier, just for the calculations 

sec_trailer = SEC_TRAILER() 

sec_trailer['auth_type'] = self.__auth_type 

sec_trailer['auth_level'] = self.__auth_level 

sec_trailer['auth_pad_len'] = 0 

sec_trailer['auth_ctx_id'] = self._ctx + 79231 

 

pad = (4 - (len(rpc_packet.get_packet()) % 4)) % 4 

if pad != 0: 

rpc_packet['pduData'] += b'\xBB'*pad 

sec_trailer['auth_pad_len']=pad 

 

rpc_packet['sec_trailer'] = sec_trailer.getData() 

rpc_packet['auth_data'] = b' '*16 

 

plain_data = rpc_packet['pduData'] 

if self.__auth_level == RPC_C_AUTHN_LEVEL_PKT_PRIVACY: 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

1178 ↛ 1189line 1178 didn't jump to line 1189, because the condition on line 1178 was never false if self.__flags & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 

# When NTLM2 is on, we sign the whole pdu, but encrypt just 

# the data, not the dcerpc header. Weird.. 

sealedMessage, signature = ntlm.SEAL(self.__flags, 

self.__clientSigningKey, 

self.__clientSealingKey, 

rpc_packet.get_packet()[:-16], 

plain_data, 

self.__sequence, 

self.__clientSealingHandle) 

else: 

sealedMessage, signature = ntlm.SEAL(self.__flags, 

self.__clientSigningKey, 

self.__clientSealingKey, 

plain_data, 

plain_data, 

self.__sequence, 

self.__clientSealingHandle) 

1196 ↛ 1197line 1196 didn't jump to line 1197, because the condition on line 1196 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

from impacket.dcerpc.v5 import nrpc 

sealedMessage, signature = nrpc.SEAL(plain_data, self.__confounder, self.__sequence, self.__sessionKey, False) 

1199 ↛ 1202line 1199 didn't jump to line 1202, because the condition on line 1199 was never false elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

sealedMessage, signature = self.__gss.GSS_Wrap(self.__sessionKey, plain_data, self.__sequence) 

 

rpc_packet['pduData'] = sealedMessage 

1203 ↛ 1229line 1203 didn't jump to line 1229, because the condition on line 1203 was never false elif self.__auth_level == RPC_C_AUTHN_LEVEL_PKT_INTEGRITY: 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

1205 ↛ 1214line 1205 didn't jump to line 1214, because the condition on line 1205 was never false if self.__flags & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 

# Interesting thing.. with NTLM2, what is is signed is the  

# whole PDU, not just the data 

signature = ntlm.SIGN(self.__flags, 

self.__clientSigningKey, 

rpc_packet.get_packet()[:-16], 

self.__sequence, 

self.__clientSealingHandle) 

else: 

signature = ntlm.SIGN(self.__flags, 

self.__clientSigningKey, 

plain_data, 

self.__sequence, 

self.__clientSealingHandle) 

1219 ↛ 1220line 1219 didn't jump to line 1220, because the condition on line 1219 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

from impacket.dcerpc.v5 import nrpc 

signature = nrpc.SIGN(plain_data, 

self.__confounder, 

self.__sequence, 

self.__sessionKey, 

False) 

1226 ↛ 1229line 1226 didn't jump to line 1229, because the condition on line 1226 was never false elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

signature = self.__gss.GSS_GetMIC(self.__sessionKey, plain_data, self.__sequence) 

 

rpc_packet['sec_trailer'] = sec_trailer.getData() 

rpc_packet['auth_data'] = signature 

 

self.__sequence += 1 

 

self._transport.send(rpc_packet.get_packet(), forceWriteAndx = forceWriteAndx, forceRecv = forceRecv) 

 

def send(self, data): 

1237 ↛ 1239line 1237 didn't jump to line 1239, because the condition on line 1237 was never true if isinstance(data, MSRPCHeader) is not True: 

# Must be an Impacket, transform to structure 

data = DCERPC_RawCall(data.OP_NUM, data.get_packet()) 

 

try: 

if data['uuid'] != b'': 

data['flags'] |= PFC_OBJECT_UUID 

except: 

# Structure doesn't have uuid 

pass 

data['ctx_id'] = self._ctx 

data['call_id'] = self.__callid 

data['alloc_hint'] = len(data['pduData']) 

# We should fragment PDUs if: 

# 1) Payload exceeds __max_xmit_size received during BIND response 

# 2) We'e explicitly fragmenting packets with lower values 

should_fragment = False 

 

# Let's decide what will drive fragmentation for this request 

if self._max_user_frag > 0: 

# User set a frag size, let's compare it with the max transmit size agreed when binding the interface 

fragment_size = min(self._max_user_frag, self.__max_xmit_size) 

else: 

fragment_size = self.__max_xmit_size 

 

# Sanity check. Fragmentation can't be too low, otherwise sec_trailer won't fit 

 

if self.__auth_level in [RPC_C_AUTHN_LEVEL_PKT_INTEGRITY, RPC_C_AUTHN_LEVEL_PKT_PRIVACY]: 

if fragment_size <= 8: 

# Minimum pdu fragment size is 8, important when doing PKT_INTEGRITY/PRIVACY. We need a minimum size of 8 

# (Kerberos) 

fragment_size = 8 

 

# ToDo: Better calculate the size needed. Now I'm setting a number that surely is enough for Kerberos and NTLM 

# ToDo: trailers, both for INTEGRITY and PRIVACY. This means we're not truly honoring the user's frag request. 

if len(data['pduData']) + 128 > fragment_size: 

should_fragment = True 

if fragment_size+128 > self.__max_xmit_size: 

fragment_size = self.__max_xmit_size - 128 

 

if should_fragment: 

packet = data['pduData'] 

offset = 0 

 

while 1: 

toSend = packet[offset:offset+fragment_size] 

if not toSend: 

break 

if offset == 0: 

data['flags'] |= PFC_FIRST_FRAG 

else: 

data['flags'] &= (~PFC_FIRST_FRAG) 

offset += len(toSend) 

if offset >= len(packet): 

data['flags'] |= PFC_LAST_FRAG 

else: 

data['flags'] &= (~PFC_LAST_FRAG) 

data['pduData'] = toSend 

self._transport_send(data, forceWriteAndx = 1, forceRecv =data['flags'] & PFC_LAST_FRAG) 

else: 

self._transport_send(data) 

self.__callid += 1 

 

def recv(self): 

finished = False 

forceRecv = 0 

retAnswer = b'' 

while not finished: 

# At least give me the MSRPCRespHeader, especially important for  

# TCP/UDP Transports 

response_data = self._transport.recv(forceRecv, count=MSRPCRespHeader._SIZE) 

response_header = MSRPCRespHeader(response_data) 

# Ok, there might be situation, especially with large packets, that  

# the transport layer didn't send us the full packet's contents 

# So we gotta check we received it all 

while len(response_data) < response_header['frag_len']: 

response_data += self._transport.recv(forceRecv, count=(response_header['frag_len']-len(response_data))) 

 

off = response_header.get_header_size() 

 

if response_header['type'] == MSRPC_FAULT and response_header['frag_len'] >= off+4: 

status_code = unpack("<L",response_data[off:off+4])[0] 

1319 ↛ 1321line 1319 didn't jump to line 1321, because the condition on line 1319 was never false if status_code in rpc_status_codes: 

raise DCERPCException(rpc_status_codes[status_code]) 

elif status_code & 0xffff in rpc_status_codes: 

raise DCERPCException(rpc_status_codes[status_code & 0xffff]) 

else: 

if status_code in hresult_errors.ERROR_MESSAGES: 

error_msg_short = hresult_errors.ERROR_MESSAGES[status_code][0] 

error_msg_verbose = hresult_errors.ERROR_MESSAGES[status_code][1] 

raise DCERPCException('%s - %s' % (error_msg_short, error_msg_verbose)) 

else: 

raise DCERPCException('Unknown DCE RPC fault status code: %.8x' % status_code) 

 

if response_header['flags'] & PFC_LAST_FRAG: 

# No need to reassembly DCERPC 

finished = True 

else: 

# Forcing Read Recv, we need more packets! 

forceRecv = 1 

 

answer = response_data[off:] 

auth_len = response_header['auth_len'] 

if auth_len: 

auth_len += 8 

auth_data = answer[-auth_len:] 

sec_trailer = SEC_TRAILER(data = auth_data) 

answer = answer[:-auth_len] 

 

if sec_trailer['auth_level'] == RPC_C_AUTHN_LEVEL_PKT_PRIVACY: 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

1348 ↛ 1359line 1348 didn't jump to line 1359, because the condition on line 1348 was never false if self.__flags & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 

# TODO: FIX THIS, it's not calculating the signature well 

# Since I'm not testing it we don't care... yet 

answer, signature = ntlm.SEAL(self.__flags, 

self.__serverSigningKey, 

self.__serverSealingKey, 

answer, 

answer, 

self.__sequence, 

self.__serverSealingHandle) 

else: 

answer, signature = ntlm.SEAL(self.__flags, 

self.__serverSigningKey, 

self.__serverSealingKey, 

answer, 

answer, 

self.__sequence, 

self.__serverSealingHandle) 

self.__sequence += 1 

1367 ↛ 1368line 1367 didn't jump to line 1368, because the condition on line 1367 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

from impacket.dcerpc.v5 import nrpc 

answer, cfounder = nrpc.UNSEAL(answer, 

auth_data[len(sec_trailer):], 

self.__sessionKey, 

False) 

self.__sequence += 1 

1374 ↛ 1412line 1374 didn't jump to line 1412, because the condition on line 1374 was never false elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

if self.__sequence > 0: 

answer, cfounder = self.__gss.GSS_Unwrap(self.__sessionKey, answer, self.__sequence, 

direction='init', authData=auth_data) 

 

1379 ↛ 1412line 1379 didn't jump to line 1412, because the condition on line 1379 was never false elif sec_trailer['auth_level'] == RPC_C_AUTHN_LEVEL_PKT_INTEGRITY: 

if self.__auth_type == RPC_C_AUTHN_WINNT: 

ntlmssp = auth_data[12:] 

1382 ↛ 1389line 1382 didn't jump to line 1389, because the condition on line 1382 was never false if self.__flags & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 

signature = ntlm.SIGN(self.__flags, 

self.__serverSigningKey, 

answer, 

self.__sequence, 

self.__serverSealingHandle) 

else: 

signature = ntlm.SIGN(self.__flags, 

self.__serverSigningKey, 

ntlmssp, 

self.__sequence, 

self.__serverSealingHandle) 

# Yes.. NTLM2 doesn't increment sequence when receiving 

# the packet :P 

self.__sequence += 1 

1397 ↛ 1398line 1397 didn't jump to line 1398, because the condition on line 1397 was never true elif self.__auth_type == RPC_C_AUTHN_NETLOGON: 

from impacket.dcerpc.v5 import nrpc 

ntlmssp = auth_data[12:] 

signature = nrpc.SIGN(ntlmssp, 

self.__confounder, 

self.__sequence, 

self.__sessionKey, 

False) 

self.__sequence += 1 

elif self.__auth_type == RPC_C_AUTHN_GSS_NEGOTIATE: 

# Do NOT increment the sequence number when Signing Kerberos 

#self.__sequence += 1 

pass 

 

 

if sec_trailer['auth_pad_len']: 

answer = answer[:-sec_trailer['auth_pad_len']] 

 

retAnswer += answer 

return retAnswer 

 

def alter_ctx(self, newUID, bogus_binds = 0): 

answer = self.__class__(self._transport) 

 

answer.set_credentials(self.__username, self.__password, self.__domain, self.__lmhash, self.__nthash, 

self.__aesKey, self.__TGT, self.__TGS) 

answer.set_auth_type(self.__auth_type) 

answer.set_auth_level(self.__auth_level) 

 

answer.set_ctx_id(self._ctx+1) 

answer.__callid = self.__callid 

answer.bind(newUID, alter = 1, bogus_binds = bogus_binds, transfer_syntax = bin_to_uuidtup(self.transfer_syntax)) 

return answer 

 

class DCERPC_RawCall(MSRPCRequestHeader): 

def __init__(self, op_num, data = b'', uuid=None): 

MSRPCRequestHeader.__init__(self) 

self['op_num'] = op_num 

self['pduData'] = data 

if uuid is not None: 

self['flags'] |= PFC_OBJECT_UUID 

self['uuid'] = uuid 

 

def setData(self, data): 

self['pduData'] = data 

 

# 2.2.6 Type Serialization Version 1 

class CommonHeader(NDRSTRUCT): 

structure = ( 

('Version', UCHAR), 

('Endianness', UCHAR), 

('CommonHeaderLength', USHORT), 

('Filler', ULONG), 

) 

def __init__(self, data = None,isNDR64 = False): 

NDRSTRUCT.__init__(self, data, isNDR64) 

1453 ↛ exitline 1453 didn't return from function '__init__', because the condition on line 1453 was never false if data is None: 

self['Version'] = 1 

self['Endianness'] = 0x10 

self['CommonHeaderLength'] = 8 

self['Filler'] = 0xcccccccc 

 

class PrivateHeader(NDRSTRUCT): 

structure = ( 

('ObjectBufferLength', ULONG), 

('Filler', ULONG), 

) 

def __init__(self, data = None,isNDR64 = False): 

NDRSTRUCT.__init__(self, data, isNDR64) 

1466 ↛ exitline 1466 didn't return from function '__init__', because the condition on line 1466 was never false if data is None: 

self['Filler'] = 0xcccccccc 

 

class TypeSerialization1(NDRSTRUCT): 

commonHdr = ( 

('CommonHeader', CommonHeader), 

('PrivateHeader', PrivateHeader), 

) 

def getData(self, soFar = 0): 

self['PrivateHeader']['ObjectBufferLength'] = len(NDRSTRUCT.getData(self, soFar)) + len( 

NDRSTRUCT.getDataReferents(self, soFar)) - len(self['CommonHeader']) - len(self['PrivateHeader']) 

return NDRSTRUCT.getData(self, soFar) 

 

class DCERPCServer(Thread): 

""" 

A minimalistic DCERPC Server, mainly used by the smbserver, for now. Might be useful 

for other purposes in the future, but we should do it way stronger. 

If you want to implement a DCE Interface Server, use this class as the base class 

""" 

def __init__(self): 

Thread.__init__(self) 

self._listenPort = 0 

self._listenAddress = '127.0.0.1' 

self._listenUUIDS = {} 

self._boundUUID = b'' 

self._sock = None 

self._clientSock = None 

self._callid = 1 

self._max_frag = None 

self._max_xmit_size = 4280 

self.__log = LOG 

self._sock = socket.socket() 

self._sock.bind((self._listenAddress,self._listenPort)) 

 

def log(self, msg, level=logging.INFO): 

self.__log.log(level,msg) 

 

def addCallbacks(self, ifaceUUID, secondaryAddr, callbacks): 

""" 

adds a call back to a UUID/opnum call 

 

:param uuid ifaceUUID: the interface UUID 

:param string secondaryAddr: the secondary address to answer as part of the bind request (e.g. \\\\PIPE\\\\srvsvc) 

:param dict callbacks: the callbacks for each opnum. Format is [opnum] = callback 

""" 

self._listenUUIDS[uuidtup_to_bin(ifaceUUID)] = {} 

self._listenUUIDS[uuidtup_to_bin(ifaceUUID)]['SecondaryAddr'] = secondaryAddr 

self._listenUUIDS[uuidtup_to_bin(ifaceUUID)]['CallBacks'] = callbacks 

self.log("Callback added for UUID %s V:%s" % ifaceUUID) 

 

def setListenPort(self, portNum): 

self._listenPort = portNum 

self._sock = socket.socket() 

self._sock.bind((self._listenAddress,self._listenPort)) 

 

def getListenPort(self): 

return self._sock.getsockname()[1] 

 

def recv(self): 

finished = False 

retAnswer = b'' 

response_data = b'' 

while not finished: 

# At least give me the MSRPCRespHeader, especially important for TCP/UDP Transports 

response_data = self._clientSock.recv(MSRPCRespHeader._SIZE) 

# No data?, connection might have closed 

if response_data == b'': 

return None 

response_header = MSRPCRespHeader(response_data) 

# Ok, there might be situation, especially with large packets,  

# that the transport layer didn't send us the full packet's contents 

# So we gotta check we received it all 

while len(response_data) < response_header['frag_len']: 

response_data += self._clientSock.recv(response_header['frag_len']-len(response_data)) 

response_header = MSRPCRespHeader(response_data) 

if response_header['flags'] & PFC_LAST_FRAG: 

# No need to reassembly DCERPC 

finished = True 

answer = response_header['pduData'] 

auth_len = response_header['auth_len'] 

if auth_len: 

auth_len += 8 

auth_data = answer[-auth_len:] 

sec_trailer = SEC_TRAILER(data = auth_data) 

answer = answer[:-auth_len] 

if sec_trailer['auth_pad_len']: 

answer = answer[:-sec_trailer['auth_pad_len']] 

 

retAnswer += answer 

return response_data 

 

def run(self): 

self._sock.listen(10) 

while True: 

self._clientSock, address = self._sock.accept() 

try: 

while True: 

data = self.recv() 

if data is None: 

# No data.. connection closed 

break 

answer = self.processRequest(data) 

if answer is not None: 

self.send(answer) 

except Exception: 

#import traceback 

#traceback.print_exc() 

pass 

self._clientSock.close() 

 

def send(self, data): 

max_frag = self._max_frag 

if len(data['pduData']) > self._max_xmit_size - 32: 

max_frag = self._max_xmit_size - 32 # XXX: 32 is a safe margin for auth data 

 

if self._max_frag: 

max_frag = min(max_frag, self._max_frag) 

if max_frag and len(data['pduData']) > 0: 

packet = data['pduData'] 

offset = 0 

while 1: 

toSend = packet[offset:offset+max_frag] 

if not toSend: 

break 

flags = 0 

if offset == 0: 

flags |= PFC_FIRST_FRAG 

offset += len(toSend) 

if offset == len(packet): 

flags |= PFC_LAST_FRAG 

data['flags'] = flags 

data['pduData'] = toSend 

self._clientSock.send(data.get_packet()) 

else: 

self._clientSock.send(data.get_packet()) 

self._callid += 1 

 

def bind(self,packet, bind): 

# Standard NDR Representation 

NDRSyntax = ('8a885d04-1ceb-11c9-9fe8-08002b104860', '2.0') 

resp = MSRPCBindAck() 

 

resp['type'] = MSRPC_BINDACK 

resp['flags'] = packet['flags'] 

resp['frag_len'] = 0 

resp['auth_len'] = 0 

resp['auth_data'] = b'' 

resp['call_id'] = packet['call_id'] 

resp['max_tfrag'] = bind['max_tfrag'] 

resp['max_rfrag'] = bind['max_rfrag'] 

resp['assoc_group'] = 0x1234 

resp['ctx_num'] = 0 

 

data = bind['ctx_items'] 

ctx_items = b'' 

resp['SecondaryAddrLen'] = 0 

for i in range(bind['ctx_num']): 

result = MSRPC_CONT_RESULT_USER_REJECT 

item = CtxItem(data) 

data = data[len(item):] 

 

# First we check the Transfer Syntax is NDR32, what we support 

if item['TransferSyntax'] == uuidtup_to_bin(NDRSyntax): 

# Now Check if the interface is what we listen 

reason = 1 # Default, Abstract Syntax not supported 

for j in self._listenUUIDS: 

if item['AbstractSyntax'] == j: 

# Match, we accept the bind request 

resp['SecondaryAddr'] = self._listenUUIDS[item['AbstractSyntax']]['SecondaryAddr'] 

resp['SecondaryAddrLen'] = len(resp['SecondaryAddr'])+1 

reason = 0 

self._boundUUID = j 

else: 

# Fail the bind request for this context 

reason = 2 # Transfer Syntax not supported 

if reason == 0: 

result = MSRPC_CONT_RESULT_ACCEPT 

if reason == 1: 

LOG.error('Bind request for an unsupported interface %s' % bin_to_uuidtup(item['AbstractSyntax'])) 

 

resp['ctx_num'] += 1 

itemResult = CtxItemResult() 

itemResult['Result'] = result 

itemResult['Reason'] = reason 

itemResult['TransferSyntax'] = uuidtup_to_bin(NDRSyntax) 

ctx_items += itemResult.getData() 

 

resp['Pad'] ='A'*((4-((resp["SecondaryAddrLen"]+MSRPCBindAck._SIZE) % 4))%4) 

resp['ctx_items'] = ctx_items 

resp['frag_len'] = len(resp.getData()) 

 

self._clientSock.send(resp.getData()) 

return None 

 

def processRequest(self,data): 

packet = MSRPCHeader(data) 

if packet['type'] == MSRPC_BIND: 

bind = MSRPCBind(packet['pduData']) 

self.bind(packet, bind) 

packet = None 

elif packet['type'] == MSRPC_REQUEST: 

request = MSRPCRequestHeader(data) 

response = MSRPCRespHeader(data) 

response['type'] = MSRPC_RESPONSE 

# Serve the opnum requested, if not, fails 

if request['op_num'] in self._listenUUIDS[self._boundUUID]['CallBacks']: 

# Call the function  

returnData = self._listenUUIDS[self._boundUUID]['CallBacks'][request['op_num']](request['pduData']) 

response['pduData'] = returnData 

else: 

LOG.error('Unsupported DCERPC opnum %d called for interface %s' % (request['op_num'], bin_to_uuidtup(self._boundUUID))) 

response['type'] = MSRPC_FAULT 

response['pduData'] = pack('<L',0x000006E4) 

response['frag_len'] = len(response) 

return response 

else: 

# Defaults to a fault 

packet = MSRPCRespHeader(data) 

packet['type'] = MSRPC_FAULT 

 

return packet