mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-22 02:21:36 +01:00
update
This commit is contained in:
parent
f56db3480f
commit
2c1acb743c
@ -29,6 +29,10 @@
|
|||||||
- `X-Spam-Level`
|
- `X-Spam-Level`
|
||||||
- `X-Spam-Flag`
|
- `X-Spam-Flag`
|
||||||
- `X-Spam-Report`
|
- `X-Spam-Report`
|
||||||
|
- `ARC-Authentication-Results`
|
||||||
|
- `X-MSFBL`
|
||||||
|
- `X-Ovh-Spam-Reason`
|
||||||
|
- `X-VR-SPAMSCORE`
|
||||||
- and more...
|
- and more...
|
||||||
|
|
||||||
Most of these headers are not fully documented, therefore the script is unable to pinpoint all the details, but at least it collects all I could find on them.
|
Most of these headers are not fully documented, therefore the script is unable to pinpoint all the details, but at least it collects all I could find on them.
|
||||||
|
@ -687,10 +687,11 @@ class SMTPHeadersAnalysis:
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
def __init__(self, logger, resolve):
|
def __init__(self, logger, resolve, decode_all):
|
||||||
self.text = ''
|
self.text = ''
|
||||||
self.results = {}
|
self.results = {}
|
||||||
self.resolve = resolve
|
self.resolve = resolve
|
||||||
|
self.decode_all = decode_all
|
||||||
self.logger = logger
|
self.logger = logger
|
||||||
self.received_path = None
|
self.received_path = None
|
||||||
|
|
||||||
@ -857,7 +858,11 @@ Results will be unsound. Make sure you have pasted your headers with correct spa
|
|||||||
self.results['X-Forefront-Antispam-Report'] = self.testForefrontAntiSpamReport()
|
self.results['X-Forefront-Antispam-Report'] = self.testForefrontAntiSpamReport()
|
||||||
self.results['X-Microsoft-Antispam-Mailbox-Delivery'] = self.testAntispamMailboxDelivery()
|
self.results['X-Microsoft-Antispam-Mailbox-Delivery'] = self.testAntispamMailboxDelivery()
|
||||||
self.results['X-Microsoft-Antispam Bulk Mail'] = self.testMicrosoftAntiSpam()
|
self.results['X-Microsoft-Antispam Bulk Mail'] = self.testMicrosoftAntiSpam()
|
||||||
#self.results['X-Microsoft-Antispam-Message-Info'] = self.testMicrosoftAntiSpamMessageInfo()
|
|
||||||
|
if self.decode_all:
|
||||||
|
self.results['X-Microsoft-Antispam-Message-Info'] = self.testMicrosoftAntiSpamMessageInfo()
|
||||||
|
self.results['Decoded Mail-encoded header values'] = self.testDecodeEncodedHeaders()
|
||||||
|
|
||||||
self.results['End-to-End Latency - Message Delivery Time'] = self.testTransportEndToEndLatency()
|
self.results['End-to-End Latency - Message Delivery Time'] = self.testTransportEndToEndLatency()
|
||||||
self.results['X-MS-Oob-TLC-OOBClassifiers'] = self.testTLCOObClasifiers()
|
self.results['X-MS-Oob-TLC-OOBClassifiers'] = self.testTLCOObClasifiers()
|
||||||
self.results['MS Defender ATP Message Properties'] = self.testATPMessageProperties()
|
self.results['MS Defender ATP Message Properties'] = self.testATPMessageProperties()
|
||||||
@ -909,6 +914,35 @@ Results will be unsound. Make sure you have pasted your headers with correct spa
|
|||||||
break
|
break
|
||||||
return chr(sum(ord(c) for c in pair) - key - offset)
|
return chr(sum(ord(c) for c in pair) - key - offset)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def hexdump(data, addr = 0, num = 0):
|
||||||
|
s = ''
|
||||||
|
n = 0
|
||||||
|
lines = []
|
||||||
|
if num == 0: num = len(data)
|
||||||
|
|
||||||
|
if len(data) == 0:
|
||||||
|
return '<empty>'
|
||||||
|
|
||||||
|
for i in range(0, num, 16):
|
||||||
|
line = ''
|
||||||
|
line += '%04x | ' % (addr + i)
|
||||||
|
n += 16
|
||||||
|
|
||||||
|
for j in range(n-16, n):
|
||||||
|
if j >= len(data): break
|
||||||
|
line += '%02x ' % (data[j] & 0xff)
|
||||||
|
|
||||||
|
line += ' ' * (3 * 16 + 7 - len(line)) + ' | '
|
||||||
|
|
||||||
|
for j in range(n-16, n):
|
||||||
|
if j >= len(data): break
|
||||||
|
c = data[j] if not (data[j] < 0x20 or data[j] > 0x7e) else '.'
|
||||||
|
line += '%c' % c
|
||||||
|
|
||||||
|
lines.append(line)
|
||||||
|
return '\n'.join(lines)
|
||||||
|
|
||||||
def testOvhSpamScore(self):
|
def testOvhSpamScore(self):
|
||||||
(num, header, value) = self.getHeader('X-VR-SPAMSCORE')
|
(num, header, value) = self.getHeader('X-VR-SPAMSCORE')
|
||||||
if num == -1: return []
|
if num == -1: return []
|
||||||
@ -1046,7 +1080,7 @@ Results will be unsound. Make sure you have pasted your headers with correct spa
|
|||||||
pos = value.lower().find(dodgy)
|
pos = value.lower().find(dodgy)
|
||||||
ctx = re.sub(r'(' + re.escape(dodgy) + r')', self.logger.colored(r'\1', 'red'), value, flags=re.I)
|
ctx = re.sub(r'(' + re.escape(dodgy) + r')', self.logger.colored(r'\1', 'red'), value, flags=re.I)
|
||||||
|
|
||||||
if len(ctx) > 120:
|
if len(ctx) > 1024:
|
||||||
a = pos-40
|
a = pos-40
|
||||||
b = -10 + pos + len(dodgy) + 30
|
b = -10 + pos + len(dodgy) + 30
|
||||||
|
|
||||||
@ -1056,7 +1090,7 @@ Results will be unsound. Make sure you have pasted your headers with correct spa
|
|||||||
ctx = value[a:b]
|
ctx = value[a:b]
|
||||||
|
|
||||||
tmp += f'\t Keyword: {dodgy}\n'
|
tmp += f'\t Keyword: {dodgy}\n'
|
||||||
tmp += f'\t {self.logger.colored("Value", "magenta")}: {ctx}\n\n'
|
tmp += f'\t {self.logger.colored("Value", "magenta")}:\n\n{ctx}\n\n'
|
||||||
shown.add(header)
|
shown.add(header)
|
||||||
break
|
break
|
||||||
|
|
||||||
@ -1697,6 +1731,43 @@ More information:
|
|||||||
'analysis' : result
|
'analysis' : result
|
||||||
}
|
}
|
||||||
|
|
||||||
|
def testDecodeEncodedHeaders(self):
|
||||||
|
result = ''
|
||||||
|
tmp = ''
|
||||||
|
found = False
|
||||||
|
num0 = 0
|
||||||
|
shown = set()
|
||||||
|
|
||||||
|
for (num, header, value) in self.headers:
|
||||||
|
v = SMTPHeadersAnalysis.flattenLine(value)
|
||||||
|
if '=?us-ascii?Q?' in v:
|
||||||
|
num0 += 1
|
||||||
|
|
||||||
|
value_decoded = emailheader.decode_header(value)[0][0].decode()
|
||||||
|
hhh = self.logger.colored(header, 'magenta')
|
||||||
|
tmp += f'\t({num0:02}) Header: {hhh}\n'
|
||||||
|
tmp += f'\t Value:\n\n'
|
||||||
|
tmp += value_decoded + '\n\n'
|
||||||
|
|
||||||
|
tmp += f'\t Base64 decoded Hexdump:\n\n'
|
||||||
|
tmp += SMTPHeadersAnalysis.hexdump(base64.b64decode(value_decoded))
|
||||||
|
tmp += '\n\n\n'
|
||||||
|
|
||||||
|
shown.add(header)
|
||||||
|
|
||||||
|
if len(tmp) > 0:
|
||||||
|
result = '- Decoded headers:\n\n'
|
||||||
|
result += tmp + '\n'
|
||||||
|
|
||||||
|
if len(result) == 0:
|
||||||
|
return []
|
||||||
|
|
||||||
|
return {
|
||||||
|
'header' : header,
|
||||||
|
'value': '...',
|
||||||
|
'analysis' : result
|
||||||
|
}
|
||||||
|
|
||||||
def testMicrosoftAntiSpamMessageInfo(self):
|
def testMicrosoftAntiSpamMessageInfo(self):
|
||||||
(num, header, value) = self.getHeader('X-Microsoft-Antispam-Message-Info')
|
(num, header, value) = self.getHeader('X-Microsoft-Antispam-Message-Info')
|
||||||
if num == -1: return []
|
if num == -1: return []
|
||||||
@ -1705,6 +1776,10 @@ More information:
|
|||||||
result = '- Base64 encoded & encrypted Antispam Message Info:\n\n'
|
result = '- Base64 encoded & encrypted Antispam Message Info:\n\n'
|
||||||
result += value
|
result += value
|
||||||
|
|
||||||
|
tmp += f'\n\n\t- Base64 decoded Hexdump:\n\n'
|
||||||
|
tmp += SMTPHeadersAnalysis.hexdump(base64.b64decode(value))
|
||||||
|
tmp += '\n\n\n'
|
||||||
|
|
||||||
if len(result) == 0:
|
if len(result) == 0:
|
||||||
return []
|
return []
|
||||||
|
|
||||||
@ -2033,6 +2108,7 @@ def opts(argv):
|
|||||||
|
|
||||||
tst = o.add_argument_group('Tests')
|
tst = o.add_argument_group('Tests')
|
||||||
tst.add_argument('-r', '--resolve', default=False, action='store_true', help='Resolve IPv4 addresses / Domain names.')
|
tst.add_argument('-r', '--resolve', default=False, action='store_true', help='Resolve IPv4 addresses / Domain names.')
|
||||||
|
tst.add_argument('-D', '--decode-all', default=False, action='store_true', help='Decode all =?us-ascii?Q? mail encoded messages and print their contents.')
|
||||||
|
|
||||||
args = o.parse_args()
|
args = o.parse_args()
|
||||||
|
|
||||||
@ -2105,7 +2181,7 @@ def main(argv):
|
|||||||
with open(args.infile) as f:
|
with open(args.infile) as f:
|
||||||
text = f.read()
|
text = f.read()
|
||||||
|
|
||||||
an = SMTPHeadersAnalysis(logger, args.resolve)
|
an = SMTPHeadersAnalysis(logger, args.resolve, args.decode_all)
|
||||||
out = an.parse(text)
|
out = an.parse(text)
|
||||||
|
|
||||||
output = printOutput(out)
|
output = printOutput(out)
|
||||||
|
Loading…
Reference in New Issue
Block a user