mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-04-24 10:09:49 +02:00

Once the user has queried the list of services they can now use the `service_query` function to get more detail about a specific service.
374 lines
13 KiB
C
374 lines
13 KiB
C
/*!
|
|
* @file service.c
|
|
* @brief Definitions for service management functions
|
|
*/
|
|
#include "extapi.h"
|
|
#include "service.h"
|
|
|
|
#ifdef _WIN32
|
|
#include <Sddl.h>
|
|
|
|
typedef SC_HANDLE (WINAPI * POPENSCMANAGERA)( LPCSTR lpMachineName, LPCSTR lpDatabaseName, DWORD dwDesiredAccess );
|
|
typedef BOOL (WINAPI * PCLOSESERVICEHANDLE)( SC_HANDLE hSCObject );
|
|
typedef BOOL (WINAPI * PENUMSERVICESSTATUSEXA)(
|
|
SC_HANDLE hSCManager,
|
|
SC_ENUM_TYPE InfoLevel,
|
|
DWORD dwServiceType,
|
|
DWORD dwServiceState,
|
|
LPBYTE lpServices,
|
|
DWORD cbBufSize,
|
|
LPDWORD pcbBytesNeeded,
|
|
LPDWORD lpServicesReturned,
|
|
LPDWORD lpResumeHandle,
|
|
LPCSTR pszGroupName
|
|
);
|
|
typedef SC_HANDLE (WINAPI * POPENSERVICEA)( SC_HANDLE hSCManager, LPCSTR lpServiceName, DWORD dwDesiredAcces );
|
|
typedef BOOL (WINAPI * PQUERYSERVICEOBJECTSECURITY)(
|
|
SC_HANDLE hService,
|
|
SECURITY_INFORMATION dwSecurityInformation,
|
|
PSECURITY_DESCRIPTOR lpSecurityDescriptor,
|
|
DWORD cbBufSize,
|
|
LPDWORD pcbBytesNeeded
|
|
);
|
|
typedef BOOL (WINAPI * PQUERYSERVICECONFIGA)(
|
|
SC_HANDLE hService,
|
|
LPQUERY_SERVICE_CONFIGA lpServiceConfig,
|
|
DWORD dbBufSize,
|
|
LPDWORD pcbBytesNeeded
|
|
);
|
|
typedef BOOL (WINAPI * PCSDTSSDA)(
|
|
PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
DWORD RequestedStringSDRevision,
|
|
SECURITY_INFORMATION SecurityInformation,
|
|
LPCSTR *StringSecurityDescriptor,
|
|
PULONG StringSecurityDescriptorLen
|
|
);
|
|
|
|
VOID add_enumerated_service( Packet *pResponse, LPCSTR cpName, LPCSTR cpDisplayName, DWORD dwProcessId, DWORD dwStatus, BOOL bInteractive );
|
|
DWORD get_service_config( HMODULE hAdvapi32, SC_HANDLE scService, Packet *pResponse );
|
|
DWORD get_service_dacl( HMODULE hAdvapi32, SC_HANDLE scService, Packet *pResponse );
|
|
#endif
|
|
|
|
DWORD enumerate_services( Packet *response );
|
|
|
|
DWORD request_service_enum(Remote *remote, Packet *packet)
|
|
{
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
Packet * response = packet_create_response( packet );
|
|
|
|
do
|
|
{
|
|
if( !response ) {
|
|
dprintf( "Unable to create response packet" );
|
|
dwResult = ERROR_OUTOFMEMORY;
|
|
break;
|
|
}
|
|
|
|
dprintf( "Beginning service enumeration" );
|
|
dwResult = enumerate_services( response );
|
|
|
|
} while(0);
|
|
|
|
dprintf( "Transmitting response back to caller." );
|
|
if( response )
|
|
packet_transmit_response( dwResult, remote, response );
|
|
|
|
return dwResult;
|
|
}
|
|
|
|
DWORD request_service_query(Remote *remote, Packet *packet)
|
|
{
|
|
LPSTR lpServiceName = NULL;
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
Packet * response = packet_create_response( packet );
|
|
|
|
do
|
|
{
|
|
if( !response ) {
|
|
dprintf( "Unable to create response packet" );
|
|
dwResult = ERROR_OUTOFMEMORY;
|
|
break;
|
|
}
|
|
|
|
lpServiceName = packet_get_tlv_value_string( packet, TLV_TYPE_EXT_SERVICE_ENUM_NAME );
|
|
if( !lpServiceName )
|
|
BREAK_WITH_ERROR( "Missing service name parameter", ERROR_BAD_ARGUMENTS );
|
|
|
|
dprintf( "Beginning service enumeration" );
|
|
dwResult = query_service( lpServiceName, response );
|
|
|
|
} while(0);
|
|
|
|
dprintf( "Transmitting response back to caller." );
|
|
if( response )
|
|
packet_transmit_response( dwResult, remote, response );
|
|
|
|
return dwResult;
|
|
}
|
|
|
|
DWORD query_service( LPCSTR cpServiceName, Packet *pResponse )
|
|
{
|
|
#ifdef _WIN32
|
|
// currently we only support Windoze
|
|
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
HMODULE hAdvapi32 = NULL;
|
|
POPENSCMANAGERA pOpenSCManagerA = NULL;
|
|
PCLOSESERVICEHANDLE pCloseServiceHandle = NULL;
|
|
POPENSERVICEA pOpenServiceA = NULL;
|
|
SC_HANDLE scManager = NULL;
|
|
SC_HANDLE scService = NULL;
|
|
|
|
do
|
|
{
|
|
dprintf( "Loading advapi32.dll" );
|
|
if( (hAdvapi32 = LoadLibraryA( "advapi32.dll" )) == NULL)
|
|
BREAK_ON_ERROR( "Unable to load advapi32.dll" );
|
|
|
|
dprintf( "Searching for OpenSCManagerA" );
|
|
if( (pOpenSCManagerA = (POPENSCMANAGERA)GetProcAddress( hAdvapi32, "OpenSCManagerA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate OpenSCManagerA in advapi32.dll" );
|
|
|
|
dprintf( "Searching for CloseServiceHandle" );
|
|
if( (pCloseServiceHandle = (PCLOSESERVICEHANDLE)GetProcAddress( hAdvapi32, "CloseServiceHandle" )) == NULL )
|
|
dprintf( "Unable to locate CloseServiceHandle in advapi32.dll. Continuing anyway." );
|
|
|
|
dprintf( "Searching for OpenServiceA" );
|
|
if( (pOpenServiceA = (POPENSERVICEA)GetProcAddress( hAdvapi32, "OpenServiceA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate OpenServiceA in advapi32.dll." );
|
|
|
|
dprintf( "Opening the Service Control manager" );
|
|
if( (scManager = pOpenSCManagerA( NULL, SERVICES_ACTIVE_DATABASEA, SC_MANAGER_CONNECT|GENERIC_READ )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to open the service control manager" );
|
|
|
|
dprintf( "Opening the Service: %s", cpServiceName );
|
|
if( (scService = pOpenServiceA( scManager, cpServiceName, SC_MANAGER_CONNECT|GENERIC_READ )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to open the service: %s", cpServiceName );
|
|
|
|
get_service_config( hAdvapi32, scService, pResponse );
|
|
get_service_dacl( hAdvapi32, scService, pResponse );
|
|
|
|
} while(0);
|
|
|
|
if( scService && pCloseServiceHandle )
|
|
pCloseServiceHandle( scService );
|
|
|
|
if( scManager && pCloseServiceHandle )
|
|
pCloseServiceHandle( scManager );
|
|
|
|
if( hAdvapi32 )
|
|
FreeLibrary( hAdvapi32 );
|
|
|
|
return dwResult;
|
|
#else
|
|
return ERROR_NOT_SUPPORTED;
|
|
#endif
|
|
}
|
|
|
|
DWORD enumerate_services( Packet *pResponse )
|
|
{
|
|
#ifdef _WIN32
|
|
// currently we only support Windoze
|
|
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
HMODULE hAdvapi32 = NULL;
|
|
POPENSCMANAGERA pOpenSCManagerA = NULL;
|
|
PCLOSESERVICEHANDLE pCloseServiceHandle = NULL;
|
|
PENUMSERVICESSTATUSEXA pEnumServicesStatusExA = NULL;
|
|
SC_HANDLE scManager = NULL;
|
|
ENUM_SERVICE_STATUS_PROCESSA* pSsInfo = NULL;
|
|
DWORD dwBytesNeeded = 0;
|
|
DWORD dwServicesReturned = 0;
|
|
DWORD dwResumeHandle = 0;
|
|
DWORD dwServiceIndex = 0;
|
|
BOOL bResult;
|
|
|
|
do
|
|
{
|
|
dprintf( "Loading advapi32.dll" );
|
|
if( (hAdvapi32 = LoadLibraryA( "advapi32.dll" )) == NULL)
|
|
BREAK_ON_ERROR( "Unable to load advapi32.dll" );
|
|
|
|
dprintf( "Searching for OpenSCManagerA" );
|
|
if( (pOpenSCManagerA = (POPENSCMANAGERA)GetProcAddress( hAdvapi32, "OpenSCManagerA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate OpenSCManagerA in advapi32.dll" );
|
|
|
|
dprintf( "Searching for CloseServiceHandle" );
|
|
if( (pCloseServiceHandle = (PCLOSESERVICEHANDLE)GetProcAddress( hAdvapi32, "CloseServiceHandle" )) == NULL )
|
|
dprintf( "Unable to locate CloseServiceHandle in advapi32.dll. Continuing anyway." );
|
|
|
|
dprintf( "Searching for EnumServicesStatusExA" );
|
|
if( (pEnumServicesStatusExA = (PENUMSERVICESSTATUSEXA)GetProcAddress( hAdvapi32, "EnumServicesStatusExA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate EnumServicesStatusExA in advapi32.dll." );
|
|
|
|
// TODO: add support for other machine names so that this instance can query other machines on the network.
|
|
dprintf( "Opening the Service Control manager" );
|
|
if( (scManager = pOpenSCManagerA( NULL, SERVICES_ACTIVE_DATABASEA, SC_MANAGER_CONNECT|GENERIC_READ )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to open the service control manager" );
|
|
|
|
bResult = pEnumServicesStatusExA( scManager, SC_ENUM_PROCESS_INFO, SERVICE_WIN32, SERVICE_STATE_ALL, NULL, 0,
|
|
&dwBytesNeeded, &dwServicesReturned, &dwResumeHandle, NULL);
|
|
|
|
if( !bResult && dwBytesNeeded )
|
|
{
|
|
pSsInfo = (ENUM_SERVICE_STATUS_PROCESSA*)malloc( dwBytesNeeded );
|
|
|
|
if( !pSsInfo )
|
|
BREAK_ON_ERROR( "Out of memory" );
|
|
|
|
bResult = pEnumServicesStatusExA( scManager, SC_ENUM_PROCESS_INFO, SERVICE_WIN32, SERVICE_STATE_ALL, (LPBYTE)pSsInfo, dwBytesNeeded,
|
|
&dwBytesNeeded, &dwServicesReturned, &dwResumeHandle, NULL);
|
|
}
|
|
|
|
if( !bResult )
|
|
BREAK_ON_ERROR( "Failed to enumerate services" );
|
|
|
|
dprintf( "%s with %u entries returned", ( bResult ? "succeeded" : "failed"), dwServicesReturned );
|
|
|
|
for( dwServiceIndex = 0; dwServiceIndex < dwServicesReturned; ++dwServiceIndex )
|
|
{
|
|
add_enumerated_service( pResponse, pSsInfo[dwServiceIndex].lpServiceName, pSsInfo[dwServiceIndex].lpDisplayName,
|
|
pSsInfo[dwServiceIndex].ServiceStatusProcess.dwProcessId, pSsInfo[dwServiceIndex].ServiceStatusProcess.dwCurrentState,
|
|
pSsInfo[dwServiceIndex].ServiceStatusProcess.dwServiceType & SERVICE_INTERACTIVE_PROCESS );
|
|
}
|
|
|
|
} while(0);
|
|
|
|
if( pSsInfo )
|
|
free( pSsInfo );
|
|
|
|
if( scManager && pCloseServiceHandle )
|
|
pCloseServiceHandle( scManager );
|
|
|
|
if( hAdvapi32 )
|
|
FreeLibrary( hAdvapi32 );
|
|
|
|
return dwResult;
|
|
#else
|
|
return ERROR_NOT_SUPPORTED;
|
|
#endif
|
|
}
|
|
|
|
#ifdef _WIN32
|
|
VOID add_enumerated_service( Packet *pResponse, LPCSTR cpName, LPCSTR cpDisplayName, DWORD dwProcessId, DWORD dwStatus, BOOL bInteractive )
|
|
{
|
|
Tlv entries[5] = {0};
|
|
dprintf( "Adding Name: %s", cpName );
|
|
entries[0].header.type = TLV_TYPE_EXT_SERVICE_ENUM_NAME;
|
|
entries[0].header.length = (DWORD)strlen( cpName ) + 1;
|
|
entries[0].buffer = (PUCHAR)cpName;
|
|
|
|
dprintf( "Adding Display Name: %s", cpDisplayName );
|
|
entries[1].header.type = TLV_TYPE_EXT_SERVICE_ENUM_DISPLAYNAME;
|
|
entries[1].header.length = (DWORD)strlen( cpDisplayName ) + 1;
|
|
entries[1].buffer = (PUCHAR)cpDisplayName;
|
|
|
|
dprintf( "Adding PID: %u", dwProcessId );
|
|
dwProcessId = htonl( dwProcessId );
|
|
entries[2].header.type = TLV_TYPE_EXT_SERVICE_ENUM_PID;
|
|
entries[2].header.length = sizeof( DWORD );
|
|
entries[2].buffer = (PUCHAR)&dwProcessId;
|
|
|
|
dprintf( "Adding Status: %u", dwStatus );
|
|
dwStatus = htonl( dwStatus );
|
|
entries[3].header.type = TLV_TYPE_EXT_SERVICE_ENUM_STATUS;
|
|
entries[3].header.length = sizeof( DWORD );
|
|
entries[3].buffer = (PUCHAR)&dwStatus;
|
|
|
|
dprintf( "Adding Status: %s", (bInteractive ? "TRUE" : "FALSE" ) );
|
|
entries[4].header.type = TLV_TYPE_EXT_SERVICE_ENUM_INTERACTIVE;
|
|
entries[4].header.length = sizeof( BOOL );
|
|
entries[4].buffer = (PUCHAR)&bInteractive;
|
|
|
|
dprintf( "Adding group to response" );
|
|
packet_add_tlv_group( pResponse, TLV_TYPE_EXT_SERVICE_ENUM_GROUP, entries, 5 );
|
|
}
|
|
|
|
DWORD get_service_config( HMODULE hAdvapi32, SC_HANDLE scService, Packet *pResponse )
|
|
{
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
PQUERYSERVICECONFIGA pQueryServiceConfigA = NULL;
|
|
LPQUERY_SERVICE_CONFIGA lpServiceConfig = NULL;
|
|
DWORD cbBytesNeeded = 0;
|
|
|
|
do
|
|
{
|
|
dprintf( "Searching for QueryServiceConfigA" );
|
|
if( (pQueryServiceConfigA = (PQUERYSERVICECONFIGA)GetProcAddress( hAdvapi32, "QueryServiceConfigA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate QueryServiceConfigA in advapi32.dll." );
|
|
|
|
if( pQueryServiceConfigA( scService, NULL, 0, &cbBytesNeeded ) )
|
|
BREAK_ON_ERROR( "This query should have failed" );
|
|
|
|
if( GetLastError() != ERROR_INSUFFICIENT_BUFFER )
|
|
BREAK_ON_ERROR( "Unexpected error from QueryServiceConfigA" );
|
|
|
|
if( (lpServiceConfig = (LPQUERY_SERVICE_CONFIGA)malloc( cbBytesNeeded )) == NULL )
|
|
BREAK_ON_ERROR( "Out of memory" );
|
|
|
|
if( !pQueryServiceConfigA( scService, lpServiceConfig, cbBytesNeeded, &cbBytesNeeded ) )
|
|
BREAK_ON_ERROR( "QueryServiceConfigA failed" );
|
|
|
|
dprintf( "Start type: %u", lpServiceConfig->dwStartType );
|
|
packet_add_tlv_uint( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_STARTTYPE, lpServiceConfig->dwStartType );
|
|
packet_add_tlv_string( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_DISPLAYNAME, lpServiceConfig->lpDisplayName );
|
|
packet_add_tlv_string( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_STARTNAME, lpServiceConfig->lpServiceStartName );
|
|
packet_add_tlv_string( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_PATH, lpServiceConfig->lpBinaryPathName );
|
|
packet_add_tlv_string( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_LOADORDERGROUP, lpServiceConfig->lpLoadOrderGroup ? lpServiceConfig->lpLoadOrderGroup : "" );
|
|
packet_add_tlv_bool( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_INTERACTIVE, lpServiceConfig->dwServiceType & SERVICE_INTERACTIVE_PROCESS);
|
|
|
|
} while(0);
|
|
|
|
if( lpServiceConfig )
|
|
free( lpServiceConfig );
|
|
|
|
return dwResult;
|
|
}
|
|
|
|
DWORD get_service_dacl( HMODULE hAdvapi32, SC_HANDLE scService, Packet *pResponse )
|
|
{
|
|
DWORD dwResult = ERROR_SUCCESS;
|
|
DWORD dwBytesNeeded = 0;
|
|
PQUERYSERVICEOBJECTSECURITY pQueryServiceObjectSecurity = NULL;
|
|
PCSDTSSDA pCSDTSSDA = NULL;
|
|
PSECURITY_DESCRIPTOR pSecurityDescriptor = NULL;
|
|
LPSTR lpDaclString;
|
|
|
|
do
|
|
{
|
|
dprintf( "Searching for QueryServiceObjectSecurity" );
|
|
if( (pQueryServiceObjectSecurity = (PQUERYSERVICEOBJECTSECURITY)GetProcAddress( hAdvapi32, "QueryServiceObjectSecurity" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate QueryServiceObjectSecurity in advapi32.dll." );
|
|
|
|
dprintf( "Searching for ConvertSecurityDescriptorToStringSecurityDescriptorA" );
|
|
if( (pCSDTSSDA = (PCSDTSSDA)GetProcAddress( hAdvapi32, "ConvertSecurityDescriptorToStringSecurityDescriptorA" )) == NULL )
|
|
BREAK_ON_ERROR( "Unable to locate ConvertSecurityDescriptorToStringSecurityDescriptorA in advapi32.dll." );
|
|
|
|
if( pQueryServiceObjectSecurity( scService, DACL_SECURITY_INFORMATION, (PSECURITY_DESCRIPTOR)&pSecurityDescriptor, 0, &dwBytesNeeded ) )
|
|
BREAK_ON_ERROR( "Call should have failed" );
|
|
|
|
if( GetLastError() != ERROR_INSUFFICIENT_BUFFER )
|
|
BREAK_ON_ERROR( "Unexpected error getting security" );
|
|
|
|
if( (pSecurityDescriptor = (PSECURITY_DESCRIPTOR)malloc( dwBytesNeeded )) == NULL )
|
|
BREAK_WITH_ERROR( "Out of memory", ERROR_OUTOFMEMORY );
|
|
|
|
if( !pQueryServiceObjectSecurity( scService, DACL_SECURITY_INFORMATION, pSecurityDescriptor, dwBytesNeeded, &dwBytesNeeded ) )
|
|
BREAK_ON_ERROR( "Unable to query security information for DACL_SECURITY_INFORMATION" );
|
|
|
|
if( !pCSDTSSDA( pSecurityDescriptor, SDDL_REVISION_1, DACL_SECURITY_INFORMATION, &lpDaclString, NULL ) )
|
|
BREAK_ON_ERROR( "Unable to get DACL string" );
|
|
|
|
packet_add_tlv_string( pResponse, TLV_TYPE_EXT_SERVICE_QUERY_DACL, lpDaclString );
|
|
|
|
} while(0);
|
|
|
|
if( lpDaclString )
|
|
LocalFree( lpDaclString );
|
|
|
|
if( pSecurityDescriptor )
|
|
free( pSecurityDescriptor );
|
|
|
|
return dwResult;
|
|
}
|
|
#endif |