use serde_json::value::Value;
use serde::{Deserialize, Serialize};
use crate::objects::common::{
LdapObject,
Session,
AceTemplate,
Member,
SPNTarget,
LocalGroup,
Link,
DCRegistryData
};
use colored::Colorize;
use ldap3::SearchEntry;
use log::{info, debug, trace};
use regex::Regex;
use std::collections::HashMap;
use std::error::Error;
use crate::utils::date::{convert_timestamp,string_to_epoch};
use crate::enums::acl::parse_ntsecuritydescriptor;
use crate::enums::secdesc::LdapSid;
use crate::enums::sid::sid_maker;
use crate::enums::uacflags::get_flag;
use super::common::UserRight;
#[derive(Debug, Clone, Deserialize, Serialize, Default)]
pub struct Computer {
#[serde(rename = "Properties")]
properties: ComputerProperties,
#[serde(rename = "Aces")]
aces: Vec<AceTemplate>,
#[serde(rename = "ObjectIdentifier")]
object_identifier: String,
#[serde(rename = "IsDeleted")]
is_deleted: bool,
#[serde(rename = "IsACLProtected")]
is_acl_protected: bool,
#[serde(rename = "ContainedBy")]
contained_by: Option<Member>,
#[serde(rename = "PrimaryGroupSID")]
primary_group_sid: String,
#[serde(rename = "AllowedToDelegate")]
allowed_to_delegate: Vec<Member>,
#[serde(rename = "AllowedToAct")]
allowed_to_act: Vec<Member>,
#[serde(rename = "HasSIDHistory")]
has_sid_history: Vec<String>,
#[serde(rename = "DumpSMSAPassword")]
dump_smsa_password: Vec<Member>,
#[serde(rename = "Sessions")]
sessions: Session,
#[serde(rename = "PrivilegedSessions")]
privileged_sessions: Session,
#[serde(rename = "RegistrySessions")]
registry_sessions: Session,
#[serde(rename = "LocalGroups")]
local_groups: Vec<LocalGroup>,
#[serde(rename = "UserRights")]
users_rights: Vec<UserRight>,
#[serde(rename = "DCRegistryData")]
dcregistry_data: DCRegistryData,
#[serde(rename = "IsDC")]
is_dc: bool,
#[serde(rename = "UnconstrainedDelegation")]
unconstrained_delegation: bool,
#[serde(rename = "DomainSID")]
domain_sid: String,
#[serde(rename = "Status")]
status: Option<String>,
}
impl Computer {
pub fn new() -> Self {
Self { ..Default::default() }
}
pub fn properties(&self) -> &ComputerProperties {
&self.properties
}
pub fn object_identifier(&self) -> &String {
&self.object_identifier
}
pub fn allowed_to_act(&self) -> &Vec<Member> {
&self.allowed_to_act
}
pub fn allowed_to_act_mut(&mut self) -> &mut Vec<Member> {
&mut self.allowed_to_act
}
pub fn parse(
&mut self,
result: SearchEntry,
domain: &String,
dn_sid: &mut HashMap<String, String>,
sid_type: &mut HashMap<String, String>,
fqdn_sid: &mut HashMap<String, String>,
fqdn_ip: &mut HashMap<String, String>,
domain_sid: &String
) -> Result<(), Box<dyn Error>> {
let result_dn: String = result.dn.to_uppercase();
let result_attrs: HashMap<String, Vec<String>> = result.attrs;
let result_bin: HashMap<String, Vec<Vec<u8>>> = result.bin_attrs;
debug!("Parse computer: {}", result_dn);
for (key, value) in &result_attrs {
trace!(" {:?}:{:?}", key, value);
}
for (key, value) in &result_bin {
trace!(" {:?}:{:?}", key, value);
}
let mut computer = Computer::new();
self.properties.domain = domain.to_uppercase();
self.properties.distinguishedname = result_dn;
self.properties.enabled = true;
self.domain_sid = domain_sid.to_string();
let mut sid: String = "".to_owned();
let mut group_id: String = "".to_owned();
for (key, value) in &result_attrs {
match key.as_str() {
"name" => {
let name = &value[0];
let email = format!("{}.{}",name.to_owned(),domain);
self.properties.name = email.to_uppercase();
}
"sAMAccountName" => {
self.properties.samaccountname = value[0].to_owned();
}
"dNSHostName" => {
self.properties.name = value[0].to_uppercase();
}
"description" => {
self.properties.description = Some(value[0].to_owned());
}
"operatingSystem" => {
self.properties.operatingsystem = value[0].to_owned();
}
"lastLogon" => {
let lastlogon = &value[0].parse::<i64>().unwrap_or(0);
if lastlogon.is_positive() {
let epoch = convert_timestamp(*lastlogon);
self.properties.lastlogon = epoch;
}
}
"lastLogonTimestamp" => {
let lastlogontimestamp = &value[0].parse::<i64>().unwrap_or(0);
if lastlogontimestamp.is_positive() {
let epoch = convert_timestamp(*lastlogontimestamp);
self.properties.lastlogontimestamp = epoch;
}
}
"pwdLastSet" => {
let pwdlastset = &value[0].parse::<i64>().unwrap_or(0);
if pwdlastset.is_positive() {
let epoch = convert_timestamp(*pwdlastset);
self.properties.pwdlastset = epoch;
}
}
"whenCreated" => {
let epoch = string_to_epoch(&value[0])?;
if epoch.is_positive() {
self.properties.whencreated = epoch;
}
}
"servicePrincipalName" => {
let mut result: Vec<String> = Vec::new();
for value in &result_attrs["servicePrincipalName"] {
result.push(value.to_owned());
}
self.properties.serviceprincipalnames = result;
}
"userAccountControl" => {
let uac = &value[0].parse::<u32>().unwrap();
let uac_flags = get_flag(*uac);
for flag in uac_flags {
if flag.contains("AccountDisable") {
self.properties.enabled = false;
};
if flag.contains("TrustedForDelegation") {
self.properties.unconstraineddelegation = true;
self.unconstrained_delegation = true;
};
if flag.contains("TrustedToAuthForDelegation") {
self.properties.trustedtoauth = true;
};
if flag.contains("ServerTrustAccount") {
self.properties.is_dc = true;
self.is_dc = true;
}
}
}
"msDS-AllowedToDelegateTo" => {
let mut vec_members2: Vec<Member> = Vec::new();
for objet in value {
let mut member_allowed_to_delegate = Member::new();
let split = objet.split("/");
let fqdn = split.collect::<Vec<&str>>()[1];
let mut checker = false;
for member in &vec_members2 {
if member.object_identifier().contains(fqdn.to_uppercase().as_str()) {
checker = true;
}
}
if !checker {
*member_allowed_to_delegate.object_identifier_mut() = fqdn.to_uppercase().to_owned().to_uppercase();
*member_allowed_to_delegate.object_type_mut() = "Computer".to_owned();
vec_members2.push(member_allowed_to_delegate.to_owned());
}
}
self.allowed_to_delegate = vec_members2;
}
"ms-Mcs-AdmPwd" => {
info!(
"Your user can read LAPS password on {}: {}",
&result_attrs["name"][0].yellow().bold(),
&result_attrs["ms-Mcs-AdmPwd"][0].yellow().bold()
);
self.properties.haslaps = true;
}
"ms-Mcs-AdmPwdExpirationTime" => {
self.properties.haslaps = true;
}
"msLAPS-Password" => {
info!(
"Your user can read LAPS password on {}: {:?}",
&result_attrs["name"][0].yellow().bold(),
&value[0].yellow().bold()
);
self.properties.haslaps = true;
}
"msLAPS-EncryptedPassword" => {
info!(
"Your user can read uncrypted LAPS password on {} please check manually to decrypt it!",
&result_attrs["name"][0].yellow().bold()
);
self.properties.haslaps = true;
}
"msLAPS-PasswordExpirationTime" => {
self.properties.haslaps = true;
}
"primaryGroupID" => {
group_id = value[0].to_owned();
}
"IsDeleted" => {
self.is_deleted = true;
}
_ => {}
}
}
for (key, value) in &result_bin {
match key.as_str() {
"objectSid" => {
sid = sid_maker(LdapSid::parse(&value[0]).unwrap().1, domain);
self.object_identifier = sid.to_owned();
let re = Regex::new(r"^S-[0-9]{1}-[0-9]{1}-[0-9]{1,}-[0-9]{1,}-[0-9]{1,}-[0-9]{1,}").unwrap();
for domain_sid in re.captures_iter(&sid)
{
self.properties.domainsid = domain_sid[0].to_owned().to_string();
}
}
"nTSecurityDescriptor" => {
let entry_type = "Computer".to_string();
let relations_ace = parse_ntsecuritydescriptor(
&mut computer,
&value[0],
entry_type,
&result_attrs,
&result_bin,
&domain,
);
self.aces = relations_ace;
}
"msDS-AllowedToActOnBehalfOfOtherIdentity" => {
let entry_type = "Computer".to_string();
let relations_ace = parse_ntsecuritydescriptor(
&mut computer,
&value[0],
entry_type,
&result_attrs,
&result_bin,
&domain,
);
let mut vec_members_allowtoact: Vec<Member> = Vec::new();
let mut allowed_to_act = Member::new();
for delegated in relations_ace {
if delegated.right_name().to_string() == "GenericAll" {
*allowed_to_act.object_identifier_mut() = delegated.principal_sid().to_string();
vec_members_allowtoact.push(allowed_to_act.to_owned());
continue
}
}
self.allowed_to_act = vec_members_allowtoact;
}
_ => {}
}
}
#[allow(irrefutable_let_patterns)]
if let id = group_id {
let re = Regex::new(r"S-.*-")?;
if let Some(part1) = re.find(&sid) {
self.primary_group_sid = format!("{}{}", part1.as_str(), id);
} else {
eprintln!("[!] Regex did not match any part of the SID");
}
}
dn_sid.insert(
self.properties.distinguishedname.to_string(),
self.object_identifier.to_string(),
);
sid_type.insert(
self.object_identifier.to_string(),
"Computer".to_string(),
);
fqdn_sid.insert(
self.properties.name.to_string(),
self.object_identifier.to_string(),
);
fqdn_ip.insert(
self.properties.name.to_string(),
String::from(""),
);
Ok(())
}
}
impl LdapObject for Computer {
fn to_json(&self) -> Value {
serde_json::to_value(&self).unwrap()
}
fn get_object_identifier(&self) -> &String {
&self.object_identifier
}
fn get_is_acl_protected(&self) -> &bool {
&self.is_acl_protected
}
fn get_aces(&self) -> &Vec<AceTemplate> {
&self.aces
}
fn get_spntargets(&self) -> &Vec<SPNTarget> {
panic!("Not used by current object.");
}
fn get_allowed_to_delegate(&self) -> &Vec<Member> {
&self.allowed_to_delegate
}
fn get_links(&self) -> &Vec<Link> {
panic!("Not used by current object.");
}
fn get_contained_by(&self) -> &Option<Member> {
&self.contained_by
}
fn get_child_objects(&self) -> &Vec<Member> {
panic!("Not used by current object.");
}
fn get_haslaps(&self) -> &bool {
&self.properties.haslaps
}
fn get_aces_mut(&mut self) -> &mut Vec<AceTemplate> {
&mut self.aces
}
fn get_spntargets_mut(&mut self) -> &mut Vec<SPNTarget> {
panic!("Not used by current object.");
}
fn get_allowed_to_delegate_mut(&mut self) -> &mut Vec<Member> {
&mut self.allowed_to_delegate
}
fn set_is_acl_protected(&mut self, is_acl_protected: bool) {
self.is_acl_protected = is_acl_protected;
self.properties.isaclprotected = is_acl_protected;
}
fn set_aces(&mut self, aces: Vec<AceTemplate>) {
self.aces = aces;
}
fn set_spntargets(&mut self, _spn_targets: Vec<SPNTarget>) {
}
fn set_allowed_to_delegate(&mut self, allowed_to_delegate: Vec<Member>) {
self.allowed_to_delegate = allowed_to_delegate;
}
fn set_links(&mut self, _links: Vec<Link>) {
}
fn set_contained_by(&mut self, contained_by: Option<Member>) {
self.contained_by = contained_by;
}
fn set_child_objects(&mut self, _child_objects: Vec<Member>) {
}
}
#[derive(Debug, Clone, Serialize, Deserialize, Default)]
pub struct ComputerProperties {
domain: String,
name: String,
distinguishedname: String,
domainsid: String,
isaclprotected: bool,
highvalue: bool,
samaccountname: String,
haslaps: bool,
description: Option<String>,
whencreated: i64,
enabled: bool,
unconstraineddelegation: bool,
trustedtoauth: bool,
lastlogon: i64,
lastlogontimestamp: i64,
pwdlastset: i64,
serviceprincipalnames: Vec<String>,
operatingsystem: String,
sidhistory: Vec<String>,
#[serde(skip_serializing)]
is_dc: bool
}
impl ComputerProperties {
pub fn name(&self) -> &String {
&self.name
}
pub fn unconstraineddelegation(&self) -> &bool {
&self.unconstraineddelegation
}
pub fn enabled(&self) -> &bool {
&self.enabled
}
pub fn get_is_dc(&self) -> &bool {
&self.is_dc
}
}