Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add microsoft spoofing check #3347

Draft
wants to merge 3 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
{
"id": "microsoft-spoofing-open-relay",
"name": "Microsoft Open Relay Spoofing Vulnerability",
"description": "This boefje checks the provided hostname is vulnerable to Microsoft Open Relay Spoofing Vulnerability.",
"consumes": [
"Hostname"
],
"environment_keys": [
"MICROSOFT_MAILSERVER_IP",
"RECIPIENT_EMAIL"
],
"scan_level": 2
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
import json
import logging
from ipaddress import ip_address
from os import getenv

import telnetlib

from boefjes.job_models import BoefjeMeta

SMTP_PORT = 25
TIMEOUT = 5
Comment on lines +10 to +11
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Allow configuration via schema/env



def run(boefje_meta: BoefjeMeta) -> list[tuple[set, bytes | str]]:
mailserver_ip = getenv("MICROSOFT_MAILSERVER_IP")
recipient_email = getenv("RECIPIENT_EMAIL")
hostname = boefje_meta.arguments["input"]["name"]

telnet = telnetlib.Telnet(mailserver_ip, SMTP_PORT)

telnet.read_until(b"220", timeout=TIMEOUT)
telnet.write(b"HELO example.com\r\n")
telnet.read_until(b"250", timeout=TIMEOUT)

mail_from = f"MAIL FROM:spoofed@{hostname}\r\n"
telnet.write(mail_from.encode())
telnet.read_until(b"250", timeout=TIMEOUT)

rcpt_to = f"RCPT TO:{recipient_email}\r\n"
telnet.write(rcpt_to.encode())
telnet.read_until(b"250", timeout=TIMEOUT)

telnet.write(b"DATA\r\n")
telnet.read_until(b"354", timeout=TIMEOUT) # 354 indicates that the server is ready to receive data

data = (
f"From:Spoofed Email <spoofed@{hostname}>\r\n"
f"To:My Name <{recipient_email}>\r\n"
f"Subject:Example Spoofing Mail\r\n"
"\r\n"
"Are you reading this mail? Then you are vulnerable to spoofing.\r\n"
"\r\n"
".\r\n"
)
telnet.write(data.encode())

response = telnet.read_until(b"250", timeout=TIMEOUT)
results = response.decode()

telnet.write(b"quit\r\n")
telnet.close()

return [(set(), json.dumps(results))]
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"title": "Arguments",
"type": "object",
"properties": {
"MICROSOFT_MAILSERVER_IP": {
"title": "Microsoft Mailserver IP",
"maxLength": 128,
"type": "string",
"description": "An IP address of the Microsoft mailserver to check for open relay spoofing vulnerability. Use hostname:mail.messaging.microsoft.com country:\"NL\" in Shodan to find a suitable IP address."
},
"RECIPIENT_EMAIL": {
"title": "Recipient Email",
"maxLength": 128,
"type": "string",
"description": "An email address to send a test email to check for open relay spoofing vulnerability."
}
},
"required": [
"MICROSOFT_MAILSERVER_IP",
"RECIPIENT_EMAIL"
]
}
Loading