403Webshell
Server IP : 80.87.202.40  /  Your IP : 216.73.216.169
Web Server : Apache
System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64
User : bitrix ( 600)
PHP Version : 8.2.27
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : OFF |  Sudo : ON |  Pkexec : ON
Directory :  /usr/share/nmap/nselib/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/share/nmap/nselib/nbd.lua
local comm = require "comm"
local match = require "match"
local stdnse = require "stdnse"
local string = require "string"

_ENV = stdnse.module("nbd", stdnse.seeall)

---
-- An implementation of the Network Block Device protocol.
-- https://github.com/NetworkBlockDevice/nbd/blob/master/doc/proto.md
--
-- @author "Mak Kolybabi <mak@kolybabi.com>"
-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html

NBD = {
  magic = {
    init_passwd       = string.char(0x4E, 0x42, 0x44, 0x4d, 0x41, 0x47, 0x49, 0x43),
    cliserv_magic_old = string.char(0x00, 0x00, 0x42, 0x02, 0x81, 0x86, 0x12, 0x53),
    cliserv_magic_new = string.char(0x49, 0x48, 0x41, 0x56, 0x45, 0x4F, 0x50, 0x54),
    option            = string.char(0x00, 0x03, 0xE8, 0x89, 0x04, 0x55, 0x65, 0xA9),
    cmd_request       = string.char(0x25, 0x60, 0x95, 0x13),
    cmd_reply         = string.char(0x67, 0x44, 0x66, 0x98),
  },

  handshake_flags = {
    FIXED_NEWSTYLE = 0x0001,
    NO_ZEROES      = 0x0002,
  },

  client_flags = {
    C_FIXED_NEWSTYLE = 0x00000001,
    C_NO_ZEROES      = 0x00000002,
  },

  transmission_flags = {
    HAS_FLAGS         = 0x0001,
    READ_ONLY         = 0x0002,
    SEND_FLUSH        = 0x0004,
    SEND_FUA          = 0x0008,
    ROTATIONAL        = 0x0010,
    SEND_TRIM         = 0x0020,
    SEND_WRITE_ZEROES = 0x0040, -- WRITE_ZEROES Extension
    SEND_DF           = 0x0080, -- STRUCTURED_REPLY Extension
  },

  opt_req_types = {
    EXPORT_NAME      = 0x00000001,
    ABORT            = 0x00000002,
    LIST             = 0x00000003,
    PEEK_EXPORT      = 0x00000004, -- PEEK_EXPORT Extension
    STARTTLS         = 0x00000005,
    INFO             = 0x00000006, -- INFO Extension
    GO               = 0x00000007, -- INFO Extension
    STRUCTURED_REPLY = 0x00000008, -- STRUCTURED_REPLY Extension
    BLOCK_SIZE       = 0x00000009, -- INFO Extension
  },

  opt_rep_types = {
    ACK                 = 0x00000001,
    SERVER              = 0x00000002,
    INFO                = 0x00000003, -- INFO Extension
    ERR_UNSUP           = 0x80000001,
    ERR_POLICY          = 0x80000002,
    ERR_INVALID         = 0x80000003,
    ERR_PLATFORM        = 0x80000004,
    ERR_TLS_REQD        = 0x80000005,
    ERR_UNKNOWN         = 0x80000006, -- INFO Extension
    ERR_SHUTDOWN        = 0x80000007,
    ERR_BLOCK_SIZE_REQD = 0x80000008, -- INFO Extension
  },

  opt_rep_ext_types = {
    info = {
      EXPORT      = 0x0000,
      NAME        = 0x0001,
      DESCRIPTION = 0x0002,
      BLOCK_SIZE  = 0x0003,
    },
  },

  cmd_req_flags = {
    FUA     = 0x0001,
    NO_HOLE = 0x0002, -- WRITE_ZEROES Extension
    DF      = 0x0004, -- STRUCTURED_REPLY Extension
  },

  cmd_req_types = {
    READ         = 0x0000,
    WRITE        = 0x0001,
    DISC         = 0x0002,
    FLUSH        = 0x0003,
    TRIM         = 0x0004,
    CACHE        = 0x0005, -- XNBD custom request types
    WRITE_ZEROES = 0x0006, -- WRITE_ZEROES Extension
  },

  errors = {
    EPERM     = 0x00000001,
    EIO       = 0x00000005,
    ENOMEM    = 0x0000000C,
    EINVAL    = 0x00000016,
    ENOSPC    = 0x0000001C,
    EOVERFLOW = 0x0000004B,
    ESHUTDOWN = 0x0000006C,
  },
}

Comm = {
  --- Creates a new client instance.
  --
  -- @name Comm.new
  --
  -- @param host Table as received by the action method.
  -- @param port Table as received by the action method.
  --
  -- @return o Instance of Client.
  new = function(self, host, port)
    local o = {host = host, port = port, exports = {}}
    setmetatable(o, self)
    self.__index = self
    return o
  end,

  --- Connects to the NBD server.
  --
  -- @name Comm.connect
  --
  -- @return status true on success, false on failure.
  connect = function(self)
    -- NBD servers send a response when we connect. We are using
    -- tryssl here as a precaution since there are several
    -- implementations of the protocol and no reason it can't be
    -- wrapped. IANA has rejected assigning another port for NBD over
    -- TLS.
    local sd, err, proto, rep = comm.tryssl(self.host, self.port, "", {recv_before = true})
    if not sd then
      return false, err
    end

    -- The socket connected successfully over whichever protocol.
    -- Store the connection information.
    self.socket = sd
    self.protocol = {ssl_tls = (proto == "ssl")}

    if #rep < 8 then
      stdnse.debug1("Failed to receive first 64 bits of magic from server: %s", rep)
      self:close()
      return false
    end

    -- We may have received 8-100+ bytes of data, depending on timing. To make
    -- the code simpler, we will seed a buffer to be used by this object's
    -- receive function until empty.
    self.receive_buffer = rep:sub(9)
    rep = rep:sub(1, 8)

    if rep ~= NBD.magic.init_passwd then
      stdnse.debug1("First 64 bits from server don't match expected magic: %s", stdnse.tohex(rep, {separator = ":"}))
      self:close()
      return false
    end

    local status, rep = self:receive(8)
    if not status then
      stdnse.debug1("Failed to receive second 64 bits of magic from server: %s", rep)
      return false
    end

    if rep == NBD.magic.cliserv_magic_new then
      self.protocol.negotiation = "newstyle"
      return self:connect_new()
    end

    if rep == NBD.magic.cliserv_magic_old then
      self.protocol.negotiation = "oldstyle"
      return self:connect_old()
    end

    self.protocol.negotiation = "unrecognized"
    stdnse.debug1("Second 64 bits from server don't match any known protocol magic: %s", stdnse.tohex(rep, {separator = ":"}))

    self:close()

    return true
  end,

  --- Cycles the connection to the server.
  --
  -- @name Comm.reconnect
  --
  -- @return status true on success, false on failure.
  reconnect = function(self)
    self:close()
    return self:connect(self.connect_options)
  end,

  --- Attaches to an named share on the server.
  --
  -- @name Comm.attach
  --
  -- @return status true on success, false on failure.
  attach = function(self, name)
    assert(self.protocol.negotiation == "newstyle" or self.protocol.negotiation == "fixed newstyle")
    assert(type(name) == "string")

    local req = self:build_opt_req("EXPORT_NAME", {export_name = name})

    local status, err = self:send(req)
    if not status then
      stdnse.debug1("Failed to send attach request for '%s': %s", name, err)
      self:close()
      return
    end

    local status, size = self:receive(8)
    if not status then
      stdnse.debug1("Failed to receive response to attach request for '%s': %s", name, size)
      self:close()
      return
    end

    local size, pos = (">I8"):unpack(size)
    if pos ~= 9 then
      stdnse.debug1("Failed to unpack size of exported block device from server.")
      self:close()
      return false
    end

    local status, tflags = self:receive(2)
    if not status then
      stdnse.debug1("Failed to receive transmission flags from server while attaching to export: %s", tflags)
      self:close()
      return false
    end

    local tflags, pos = (">I2"):unpack(tflags)
    if pos ~= 3 then
      stdnse.debug1("Failed to unpack transmission flags from server.")
      self:close()
      return false
    end

    tflags = self:parse_transmission_flags(tflags)

    if self.protocol.zero_pad == "required" then
      local status, err = self:receive(124)
      if not status then
        stdnse.debug1("Failed to receive zero pad from server while attaching to export: %s", err)
        self:close()
        return false
      end
    end

    self.exports[name] = {
      size = size,
      tflags = tflags,
    }

    return true
  end,

  --- Sends data to the server
  --
  -- @name Comm.send
  --
  -- @param pkt String containing the bytes to send.
  --
  -- @return status true on success, false on failure.
  -- @return err string containing the error message on failure.
  send = function(self, data)
    assert(type(data) == "string")

    return self.socket:send(data)
  end,

  --- Receives data from the server.
  --
  -- @name Comm.receive
  --
  -- @param len Number of bytes to receive.
  --
  -- @return status True on success, false on failure.
  -- @return response String representing bytes received on success,
  --         string containing the error message on failure.
  receive = function(self, len)
    assert(type(len) == "number")

    -- Try to answer this request from the buffer.
    if #self.receive_buffer >= len then
      local rep = self.receive_buffer:sub(1, len)
      self.receive_buffer = self.receive_buffer:sub(len + 1)
      return true, rep
    end

    return self.socket:receive_buf(match.numbytes(len), true)
  end,

  --- Disconnects from the server.
  --
  -- @name Comm.close
  close = function(self)
    assert(self.socket)
    self.socket:close()
    self.socket = nil
  end,

  --- Continue in-progress newstyle handshake with server.
  --
  -- @name Comm.connect_new
  --
  -- @param len Number of bytes to receive.
  --
  -- @return status True on success, false on failure.
  -- @return response String representing bytes received on success,
  --         string containing the error message on failure.
  connect_new = function(self)
    local status, flags = self:receive(2)
    if not status then
      stdnse.debug1("Failed to receive handshake flags from server: %s", flags)
      self:close()
      return false
    end

    -- Receive and parse the handshake flags from the server, and use
    -- them to build the client flags.
    local hflags, pos = (">I2"):unpack(flags)
    if pos ~= 3 then
      stdnse.debug1("Failed to unpack handshake flags from server.")
      self:close()
      return false
    end

    local cflags = 0x0000

    if hflags & NBD.handshake_flags.FIXED_NEWSTYLE then
      cflags = cflags | NBD.client_flags.C_FIXED_NEWSTYLE
      self.protocol.negotiation = "fixed newstyle"
    end

    self.protocol.zero_pad = "required"
    if hflags & NBD.handshake_flags.NO_ZEROES then
      cflags = cflags | NBD.client_flags.C_NO_ZEROES
      self.protocol.zero_pad = "optional"
    end

    -- Send the client flags to the server.
    local req = (">I4"):pack(cflags)

    local status, err = self:send(req)
    if not status then
      stdnse.debug1("Failed to send client flags: %s", err)
      self:close()
      return false
    end

    return true
  end,

  --- Continue in-progress oldstyle handshake with server.
  --
  -- @name Comm.connect_old
  --
  -- @return response String representing bytes received on success,
  --         string containing the error message on failure.
  connect_old = function(self)
    local status, size = self:receive(8)
    if not status then
      stdnse.debug1("Failed to receive size of exported block device from server: %s", size)
      self:close()
      return false
    end

    local size, pos = (">I8"):unpack(size)
    if pos ~= 9 then
      stdnse.debug1("Failed to unpack size of exported block device from server.")
      self:close()
      return false
    end

    local status, hflags = self:receive(4)
    if not status then
      stdnse.debug1("Failed to receive handshake flags from server: %s", hflags)
      self:close()
      return false
    end

    local hflags, pos = (">I4"):unpack(hflags)
    if pos ~= 5 then
      stdnse.debug1("Failed to unpack handshake flags from server.")
      self:close()
      return false
    end

    local status, pad = self:receive(124)
    if not status then
      stdnse.debug1("Failed to receive zero pad from server: %s", pad)
      self:close()
      return false
    end

    self.exports["(default)"] = {
      size = size,
      hflags = hflags,
    }

    return true
  end,

  --- Receives an option reply.
  --
  -- @name Comm.receive_opt_rep
  --
  -- @return reply Table representing option reply on success, false
  --         on failure.
  receive_opt_rep = function(self)
    -- Receive the static header of the option.
    local status, hdr = self:receive(20)
    if not status then
      stdnse.debug1("Failed to receive option reply header: %s", hdr)
      return false
    end

    local len, pos = (">I4"):unpack(hdr, 17)
    if pos ~= 21 then
      stdnse.debug1("Failed to parse option reply header during receive.")
      return false
    end

    local magic = hdr:sub(1, 8)
    if magic ~= NBD.magic.option then
      stdnse.debug1("First 64 bits of option reply don't match expected magic: %s", stdnse.tohex(magic, {separator = ":"}))
      return false
    end

    if len == 0 then
      return self:parse_opt_rep(hdr)
    end

    -- Receive the variable body of the option.
    local status, body = self:receive(len)
    if not status then
      stdnse.debug1("Failed to receive option reply: %s", body)
      return false
    end

    return self:parse_opt_rep(hdr .. body)
  end,

  --- Builds an option request.
  --
  -- @name Comm.build_opt_req
  --
  -- @param name String naming the option type.
  -- @param options Table containing options.
  --
  -- @return req String representing the option request.
  build_opt_req = function(self, name, options)
    assert(type(name) == "string")

    if not options then
      options = {}
    end
    assert(type(options) == "table")

    local otype = NBD.opt_req_types[name]
    assert(otype)

    local payload = ""

    if name == "EXPORT_NAME" then
      assert(options.export_name)
      payload = options.export_name
    end

    return NBD.magic.cliserv_magic_new .. (">I4s4"):pack(otype, payload)
  end,

  --- Parses an option reply.
  --
  -- @name Comm.parse_opt_rep
  --
  -- @param buf String to be parsed.
  -- @param rep Table representing the fields of the reply that have
  --        already been parsed by the caller.
  --
  -- @return reply Table representing option reply on success, false
  --         on failure.
  parse_opt_rep = function(self, buf)
    assert(type(buf) == "string")

    if 20 - 1 > #buf then
      stdnse.debug1("Buffer is too short to be parsed as an option reply.")
      return false
    end

    local magic, otype, rtype, rlen, pos = (">c8I4I4I4"):unpack(buf)

    if magic ~= NBD.magic.option then
      stdnse.debug1("First 64 bits of option reply don't match expected magic: %s", stdnse.tohex(magic, {separator = ":"}))
      return false
    end

    local otype_name = find_key(NBD.opt_req_types, otype)
    local rtype_name = find_key(NBD.opt_rep_types, rtype)

    local rep = {
      otype      = otype,
      otype_name = otype_name,
      rtype      = rtype,
      rtype_name = rtype_name,
    }

    if pos + rlen - 1 > #buf then
      stdnse.debug1("Option reply payload length extends past end of buffer.")
      return false
    end

    if rtype_name == "ACK" then
      return rep
    end

    if rtype_name == "SERVER" then
      if rlen < 4 then
        stdnse.debug1("SERVER option reply payload length must be 4 or greater, but is %d.", rlen)
        return false
      end

      local nlen, pos = (">I4"):unpack(buf, pos)
      if pos + nlen - 1 > #buf then
        stdnse.debug1("SERVER option reply payload name length extends past end of buffer.")
        return false
      end

      -- An empty name represents the default export.
      local name = ""
      if nlen > 0 then
        name = buf:sub(pos, pos + nlen - 1)
        pos = pos + nlen
      end
      rep.export_name = name

      return rep
    end

    return rep
  end,

  --- Parses the transmission flags describing an export.
  --
  -- @name Comm.parse_transmission_flags
  --
  -- @param flags Transmission flags sent by server.
  --
  -- @return Table of parsed flags as keys.
  parse_transmission_flags = function(self, flags)
    assert(type(flags) == "number")

    -- This flag must always be set according to the standard.
    if (flags & NBD.transmission_flags.HAS_FLAGS) == 0 then
      stdnse.debug1("Transmission flags were not in a valid format, skipping.")
      return {}
    end

    local tbl = {}
    for k, v in pairs(NBD.transmission_flags) do
      if (flags & v) ~= 0 then
        tbl[k] = true
      end
    end

    return tbl
  end,
}

--- Finds a key corresponding with a value.
--
-- @name find_key
--
-- @param tbl Table in which to search.
-- @param val Value to search for.
--
-- @return key String on success, nil on failure
find_key = function(tbl, val)
  assert(type(tbl) == "table")
  assert(val ~= nil)

  for k, v in pairs(tbl) do
    if v == val then
      return k
    end
  end

  return nil
end

return _ENV;

Youez - 2016 - github.com/yon3zu
LinuXploit