rusthound_ce/objects/
ntauthstore.rs1use serde_json::value::Value;
2use serde::{Deserialize, Serialize};
3use ldap3::SearchEntry;
4use log::{debug, trace};
5use std::collections::HashMap;
6use std::error::Error;
7
8use crate::objects::common::{LdapObject, AceTemplate, SPNTarget, Link, Member};
9use crate::enums::{decode_guid_le, parse_ntsecuritydescriptor};
10use crate::utils::date::string_to_epoch;
11use crate::utils::crypto::calculate_sha1;
12
13#[derive(Debug, Clone, Deserialize, Serialize, Default)]
15pub struct NtAuthStore {
16 #[serde(rename = "Properties")]
17 properties: NtAuthStoreProperties,
18 #[serde(rename = "DomainSID")]
19 domain_sid: String,
20 #[serde(rename = "Aces")]
21 aces: Vec<AceTemplate>,
22 #[serde(rename = "ObjectIdentifier")]
23 object_identifier: String,
24 #[serde(rename = "IsDeleted")]
25 is_deleted: bool,
26 #[serde(rename = "IsACLProtected")]
27 is_acl_protected: bool,
28 #[serde(rename = "ContainedBy")]
29 contained_by: Option<Member>,
30}
31
32impl NtAuthStore {
33 pub fn new() -> Self {
35 Self { ..Default::default() }
36 }
37
38 pub fn parse(
40 &mut self,
41 result: SearchEntry,
42 domain: &str,
43 dn_sid: &mut HashMap<String, String>,
44 sid_type: &mut HashMap<String, String>,
45 domain_sid: &str
46 ) -> Result<(), Box<dyn Error>> {
47 let result_dn: String = result.dn.to_uppercase();
48 let result_attrs: HashMap<String, Vec<String>> = result.attrs;
49 let result_bin: HashMap<String, Vec<Vec<u8>>> = result.bin_attrs;
50
51 debug!("Parse NtAuthStore: {result_dn}");
53
54 for (key, value) in &result_attrs {
56 trace!(" {key:?}:{value:?}");
57 }
58 for (key, value) in &result_bin {
60 trace!(" {key:?}:{value:?}");
61 }
62
63 self.properties.domain = domain.to_uppercase();
65 self.properties.distinguishedname = result_dn;
66 self.properties.domainsid = domain_sid.to_string();
67 self.domain_sid = domain_sid.to_string();
68
69 for (key, value) in &result_attrs {
71 match key.as_str() {
72 "name" => {
73 let name = format!("{}@{}", &value[0], domain);
74 self.properties.name = name.to_uppercase();
75 }
76 "description" => {
77 self.properties.description = value.first().map(|s| s.to_owned());
78 }
79 "whenCreated" => {
80 let epoch = string_to_epoch(&value[0])?;
81 if epoch.is_positive() {
82 self.properties.whencreated = epoch;
83 }
84 }
85 "IsDeleted" => {
86 self.is_deleted = true;
87 }
88 _ => {}
89 }
90 }
91
92 for (key, value) in &result_bin {
94 match key.as_str() {
95 "objectGUID" => {
96 self.object_identifier = decode_guid_le(&value[0]).to_owned();
98 }
99 "nTSecurityDescriptor" => {
100 let relations_ace = parse_ntsecuritydescriptor(
102 self,
103 &value[0],
104 "NtAuthStore",
105 &result_attrs,
106 &result_bin,
107 domain,
108 );
109 self.aces = relations_ace;
110 }
111 "cACertificate" => {
112 self.properties.certthumbprints = vec![calculate_sha1(&value[0])];
114 }
115 _ => {}
116 }
117 }
118
119 if self.object_identifier != "SID" {
121 dn_sid.insert(
122 self.properties.distinguishedname.to_string(),
123 self.object_identifier.to_string()
124 );
125 sid_type.insert(
127 self.object_identifier.to_string(),
128 "NtAuthStore".to_string()
129 );
130 }
131
132 Ok(())
135 }
136}
137
138impl LdapObject for NtAuthStore {
139 fn to_json(&self) -> Value {
141 serde_json::to_value(self).unwrap()
142 }
143
144 fn get_object_identifier(&self) -> &String {
146 &self.object_identifier
147 }
148 fn get_is_acl_protected(&self) -> &bool {
149 &self.is_acl_protected
150 }
151 fn get_aces(&self) -> &Vec<AceTemplate> {
152 &self.aces
153 }
154 fn get_spntargets(&self) -> &Vec<SPNTarget> {
155 panic!("Not used by current object.");
156 }
157 fn get_allowed_to_delegate(&self) -> &Vec<Member> {
158 panic!("Not used by current object.");
159 }
160 fn get_links(&self) -> &Vec<Link> {
161 panic!("Not used by current object.");
162 }
163 fn get_contained_by(&self) -> &Option<Member> {
164 &self.contained_by
165 }
166 fn get_child_objects(&self) -> &Vec<Member> {
167 panic!("Not used by current object.");
168 }
169 fn get_haslaps(&self) -> &bool {
170 &false
171 }
172
173 fn get_aces_mut(&mut self) -> &mut Vec<AceTemplate> {
175 &mut self.aces
176 }
177 fn get_spntargets_mut(&mut self) -> &mut Vec<SPNTarget> {
178 panic!("Not used by current object.");
179 }
180 fn get_allowed_to_delegate_mut(&mut self) -> &mut Vec<Member> {
181 panic!("Not used by current object.");
182 }
183
184 fn set_is_acl_protected(&mut self, is_acl_protected: bool) {
186 self.is_acl_protected = is_acl_protected;
187 self.properties.isaclprotected = is_acl_protected;
188 }
189 fn set_aces(&mut self, aces: Vec<AceTemplate>) {
190 self.aces = aces;
191 }
192 fn set_spntargets(&mut self, _spn_targets: Vec<SPNTarget>) {
193 }
195 fn set_allowed_to_delegate(&mut self, _allowed_to_delegate: Vec<Member>) {
196 }
198 fn set_links(&mut self, _links: Vec<Link>) {
199 }
201 fn set_contained_by(&mut self, contained_by: Option<Member>) {
202 self.contained_by = contained_by;
203 }
204 fn set_child_objects(&mut self, _child_objects: Vec<Member>) {
205 }
207}
208
209
210#[derive(Debug, Clone, Deserialize, Serialize, Default)]
212pub struct NtAuthStoreProperties {
213 domain: String,
214 name: String,
215 distinguishedname: String,
216 domainsid: String,
217 isaclprotected: bool,
218 certthumbprints: Vec<String>,
219 description: Option<String>,
220 whencreated: i64,
221}