Implement ICS/SCADA and IMAP Bait features
This commit is contained in:
@@ -1,8 +1,10 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
IMAPserver.
|
||||
Presents an IMAP4rev1 banner, captures LOGIN credentials (plaintext and
|
||||
AUTHENTICATE), then returns a NO response. Logs all commands as JSON.
|
||||
IMAP server (port 143/993).
|
||||
Presents an IMAP4rev1 banner, captures LOGIN credentials.
|
||||
Implements a basic IMAP state machine (NOT_AUTHENTICATED -> AUTHENTICATED -> SELECTED).
|
||||
Provides hardcoded bait emails containing AWS API keys to attackers.
|
||||
Logs commands as JSON.
|
||||
"""
|
||||
|
||||
import asyncio
|
||||
@@ -12,10 +14,14 @@ from decnet_logging import syslog_line, write_syslog_file, forward_syslog
|
||||
NODE_NAME = os.environ.get("NODE_NAME", "mailserver")
|
||||
SERVICE_NAME = "imap"
|
||||
LOG_TARGET = os.environ.get("LOG_TARGET", "")
|
||||
BANNER = f"* OK [{NODE_NAME}] IMAP4rev1 Service Ready\r\n"
|
||||
|
||||
IMAP_BANNER = os.environ.get("IMAP_BANNER", f"* OK [{NODE_NAME}] Dovecot ready.\r\n")
|
||||
|
||||
IMAP_USERS = os.environ.get("IMAP_USERS", "admin:admin123,root:toor")
|
||||
|
||||
_BAIT_EMAILS = [
|
||||
(1, "Date: Tue, 01 Nov 2023 10:00:00 +0000\r\nFrom: sysadmin@company.com\r\nSubject: AWS Credentials\r\n\r\nHere are the new AWS keys:\r\nAKIAIOSFODNN7EXAMPLE\r\nwJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY\r\n"),
|
||||
(2, "Date: Wed, 02 Nov 2023 11:30:00 +0000\r\nFrom: devops@company.com\r\nSubject: DB Password Reset\r\n\r\nThe production database password has been temporarily set to:\r\nProdDB_temp_2023!!\r\n"),
|
||||
]
|
||||
|
||||
def _log(event_type: str, severity: int = 6, **kwargs) -> None:
|
||||
line = syslog_line(SERVICE_NAME, NODE_NAME, event_type, severity, **kwargs)
|
||||
@@ -23,18 +29,24 @@ def _log(event_type: str, severity: int = 6, **kwargs) -> None:
|
||||
write_syslog_file(line)
|
||||
forward_syslog(line, LOG_TARGET)
|
||||
|
||||
|
||||
class IMAPProtocol(asyncio.Protocol):
|
||||
def __init__(self):
|
||||
self._transport = None
|
||||
self._peer = None
|
||||
self._buf = b""
|
||||
self._state = "NOT_AUTHENTICATED"
|
||||
self._valid_users = dict(u.split(":", 1) for u in IMAP_USERS.split(",") if ":" in u)
|
||||
|
||||
def connection_made(self, transport):
|
||||
self._transport = transport
|
||||
self._peer = transport.get_extra_info("peername", ("?", 0))
|
||||
_log("connect", src=self._peer[0], src_port=self._peer[1])
|
||||
transport.write(BANNER.encode())
|
||||
if IMAP_BANNER:
|
||||
if not IMAP_BANNER.endswith("\r\n"):
|
||||
padded_banner = IMAP_BANNER + "\r\n"
|
||||
else:
|
||||
padded_banner = IMAP_BANNER
|
||||
transport.write(padded_banner.encode())
|
||||
|
||||
def data_received(self, data):
|
||||
self._buf += data
|
||||
@@ -50,22 +62,60 @@ class IMAPProtocol(asyncio.Protocol):
|
||||
cmd = parts[1].upper() if len(parts) > 1 else ""
|
||||
args = parts[2] if len(parts) > 2 else ""
|
||||
|
||||
if cmd == "LOGIN":
|
||||
_log("command", src=self._peer[0], cmd=line[:128], state=self._state)
|
||||
|
||||
if cmd == "CAPABILITY":
|
||||
self._transport.write(b"* CAPABILITY IMAP4rev1 AUTH=PLAIN AUTH=LOGIN\r\n")
|
||||
self._transport.write(f"{tag} OK CAPABILITY completed\r\n".encode())
|
||||
|
||||
elif cmd == "LOGIN":
|
||||
if self._state != "NOT_AUTHENTICATED":
|
||||
self._transport.write(f"{tag} BAD Already authenticated\r\n".encode())
|
||||
return
|
||||
creds = args.split(None, 1)
|
||||
username = creds[0].strip('"') if creds else ""
|
||||
password = creds[1].strip('"') if len(creds) > 1 else ""
|
||||
_log("auth", src=self._peer[0], username=username, password=password)
|
||||
self._transport.write(f"{tag} NO [AUTHENTICATIONFAILED] Invalid credentials\r\n".encode())
|
||||
elif cmd == "CAPABILITY":
|
||||
self._transport.write(b"* CAPABILITY IMAP4rev1 AUTH=PLAIN AUTH=LOGIN\r\n")
|
||||
self._transport.write(f"{tag} OK CAPABILITY completed\r\n".encode())
|
||||
|
||||
if username in self._valid_users and self._valid_users[username] == password:
|
||||
self._state = "AUTHENTICATED"
|
||||
_log("auth", src=self._peer[0], username=username, password=password, status="success")
|
||||
self._transport.write(f"{tag} OK [CAPABILITY IMAP4rev1] Logged in\r\n".encode())
|
||||
else:
|
||||
_log("auth", src=self._peer[0], username=username, password=password, status="failed")
|
||||
self._transport.write(f"{tag} NO [AUTHENTICATIONFAILED] Authentication failed.\r\n".encode())
|
||||
|
||||
elif cmd == "SELECT" or cmd == "EXAMINE":
|
||||
if self._state == "NOT_AUTHENTICATED":
|
||||
self._transport.write(f"{tag} BAD Not authenticated\r\n".encode())
|
||||
return
|
||||
|
||||
self._state = "SELECTED"
|
||||
count = len(_BAIT_EMAILS)
|
||||
self._transport.write(f"* {count} EXISTS\r\n* 0 RECENT\r\n* OK [UIDVALIDITY 1] UIDs valid\r\n".encode())
|
||||
self._transport.write(f"{tag} OK [READ-WRITE] Select completed.\r\n".encode())
|
||||
|
||||
elif cmd == "FETCH":
|
||||
if self._state != "SELECTED":
|
||||
self._transport.write(f"{tag} BAD Not selected\r\n".encode())
|
||||
return
|
||||
|
||||
# rudimentary fetch match simply returning all if any match
|
||||
# an attacker usually sends "FETCH 1:* (BODY[])" or similar
|
||||
if "RFC822" in args.upper() or "BODY" in args.upper():
|
||||
for uid, content in _BAIT_EMAILS:
|
||||
content_encoded = content.encode()
|
||||
self._transport.write(f"* {uid} FETCH (RFC822 {{{len(content_encoded)}}}\r\n".encode())
|
||||
self._transport.write(content_encoded)
|
||||
self._transport.write(b")\r\n")
|
||||
self._transport.write(f"{tag} OK Fetch completed.\r\n".encode())
|
||||
|
||||
elif cmd == "LOGOUT":
|
||||
self._transport.write(b"* BYE IMAP4rev1 Server logging out\r\n")
|
||||
self._transport.write(f"{tag} OK LOGOUT completed\r\n".encode())
|
||||
self._transport.write(b"* BYE Logging out\r\n")
|
||||
self._transport.write(f"{tag} OK Logout completed.\r\n".encode())
|
||||
self._transport.close()
|
||||
|
||||
else:
|
||||
_log("command", src=self._peer[0], cmd=line[:128])
|
||||
self._transport.write(f"{tag} BAD Command not recognized\r\n".encode())
|
||||
self._transport.write(f"{tag} BAD Command not recognized or unsupported\r\n".encode())
|
||||
|
||||
def connection_lost(self, exc):
|
||||
_log("disconnect", src=self._peer[0] if self._peer else "?")
|
||||
|
||||
Reference in New Issue
Block a user