local dns = require "dns" local ipOps = require "ipOps" local nmap = require "nmap" local stdnse = require "stdnse" local string = require "string" local table = require "table" description = [[ Maps IP addresses to autonomous system (AS) numbers. The script works by sending DNS TXT queries to a DNS server which in turn queries a third-party service provided by Team Cymru (https://www.team-cymru.org/Services/ip-to-asn.html) using an in-addr.arpa style zone set up especially for use by Nmap. The responses to these queries contain both Origin and Peer ASNs and their descriptions, displayed along with the BGP Prefix and Country Code. The script caches results to reduce the number of queries and should perform a single query for all scanned targets in a BGP Prefix present in Team Cymru's database. Be aware that any targets against which this script is run will be sent to and potentially recorded by one or more DNS servers and Team Cymru. In addition your IP address will be sent along with the ASN to a DNS server (your default DNS server, or whichever one you specified with the dns script argument). ]] --- -- @usage -- nmap --script asn-query [--script-args dns=] -- @args dns The address of a recursive nameserver to use (optional). -- @output -- Host script results: -- | asn-query: -- | BGP: 64.13.128.0/21 | Country: US -- | Origin AS: 10565 SVCOLO-AS - Silicon Valley Colocation, Inc. -- | Peer AS: 3561 6461 -- | BGP: 64.13.128.0/18 | Country: US -- | Origin AS: 10565 SVCOLO-AS - Silicon Valley Colocation, Inc. -- |_ Peer AS: 174 2914 6461 author = "jah, Michael Pattrick" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "external", "safe"} local mutex = nmap.mutex( "ASN" ) if not nmap.registry.asn then nmap.registry.asn = {} nmap.registry.asn.cache = {} nmap.registry.asn.descr = {} end --- -- This script will run for any non-private IP address. hostrule = function( host ) return not ipOps.isPrivate( host.ip ) end --- -- Cached results are checked before sending a query for the target and extracting the -- relevant information from the response. Mutual exclusion is used so that results can be -- cached and so a single thread will be active at any time. -- @param host Host table. -- @return Formatted answers or nil on errors. action = function( host ) mutex "lock" local output, records, combined_records = {}, {}, {} -- check for cached data local in_cache, cache_data = check_cache( host.ip ) if in_cache and type( cache_data ) == "table" then combined_records = cache_data elseif in_cache and type( cache_data ) == "string" and cache_data ~= "Unknown Error" then output = cache_data end if not in_cache then local dname = dns.reverse( host.ip ) local zone_repl, IPv = "%.in%-addr%.arpa", 4 if host.ip:match( ":" ) then zone_repl, IPv = "%.ip6%.arpa", 6 end --- -- Team Cymru zones for rDNS-like queries. The zones are as follows: -- * nmap.asn.cymru.com for IPv4 to Origin AS lookup. -- * peer-nmap.asn.cymru.com for IPv4 to Peer AS lookup. -- * nmap6.asn.cymru.com for IPv6 to Origin AS lookup. -- @class table -- @name cymru local cymru = { [4] = { ".nmap.asn.cymru.com", ".peer-nmap.asn.cymru.com" }, [6] = { ".nmap6.asn.cymru.com" } } -- perform queries for each applicable zone for _, zone in ipairs( cymru[IPv] ) do local asn_type = ( zone:match( "peer" ) and "Peer" ) or "Origin" -- replace arpa with cymru zone local temp = dname dname = dname:gsub( zone_repl, zone ) -- send query local success, response = ip_to_asn( dname ) if not success then records = {} output = ( type( response ) == "string" and response ) or output break end -- recognize and organise fields from response local success = result_recog( response, asn_type, records, host.ip ) -- un-replace arpa zone dname = temp end -- combine records into unique BGP, cache and format for output combined_records = process_answers( records, output, host.ip ) end -- if not in_cache mutex "done" return nice_output( output, combined_records ) end -- action --- -- Checks whether the target IP address is within any BGP prefixes for which a query has -- already been performed and returns a pointer to the HOST SCRIPT RESULT displaying the applicable answers. -- @param ip String representing the target IP address. -- @return Boolean true if there are cached answers for the supplied target, otherwise -- false. -- @return Table containing a string for each answer or nil if there are none. function check_cache( ip ) local ret = {} -- collect any applicable answers for _, cache_entry in ipairs( nmap.registry.asn.cache ) do if ipOps.ip_in_range( ip, cache_entry.cache_bgp ) then ret[#ret+1] = cache_entry end end if #ret < 1 then return false, nil end -- /0 signals that we want to kill this thread (all threads in fact) if #ret == 1 and type( ret[1].cache_bgp ) == "string" and ret[1].cache_bgp:match( "/0" ) then return true, nil end -- should return pointer unless there are more than one unique pointer local dirty, last_ip = false for _, entry in ipairs( ret ) do if last_ip and last_ip ~= entry.pointer then dirty = true; break end last_ip = entry.pointer end if not dirty then return true, ( "See the result for %s" ):format( last_ip ) else return true, ret end return false, nil end --- -- Performs an IP address to ASN lookup. See http://www.team-cymru.org/Services/ip-to-asn.html#dns. -- @param query String - PTR-like DNS query. -- @return Boolean true for a successful DNS query resulting in an answer, otherwise false. -- @return Table of answers or a string error message. function ip_to_asn( query ) if type( query ) ~= "string" or query == "" then return false, nil end -- error codes from dns.lua that we want to display. local err_code = {} err_code[3] = "No Such Name" -- dns query options local options = {} options.dtype = "TXT" options.retAll = true options.sendCount = 1 if type( nmap.registry.args.dns ) == "string" and nmap.registry.args.dns ~= "" then options.host = nmap.registry.args.dns options.port = 53 end -- send the query local status, decoded_response = dns.query( query, options) if not status then stdnse.debug1("Error from dns.query(): %s", decoded_response ) end return status, decoded_response end --- -- Extracts fields from the supplied DNS answer sections and generates a records entry for each. -- @param answers Table containing string DNS answers. -- @param asn_type String denoting whether the query is for Origin or Peer ASN. -- @param recs Table of existing recognized answers to which to add (refer to the records table inside action. -- @return Boolean true if successful otherwise false. function result_recog( answers, asn_type, recs, discoverer_ip ) if type( answers ) ~= "table" or #answers == 0 then return false end for _, answer in ipairs( answers ) do local t = {} t.pointer = discoverer_ip -- break the answer up into fields and strip whitespace local fields = { answer:match( ("([^|]*)|" ):rep(3) ) } for i, field in ipairs( fields ) do fields[i] = field:gsub( "^%s*(.-)%s*$", "%1" ) end -- assign fields with labels to table t.cache_bgp = fields[2] t.asn_type = asn_type t.asn = { asn_type .. " AS: " .. fields[1] } t.bgp = "BGP: " .. fields[2] if fields[3] ~= "" then t.co = "Country: " .. fields[3] end recs[#recs+1] = t -- lookup AS descriptions for Origin AS numbers local asn_descr = nmap.registry.asn.descr local u = {} if asn_type == "Origin" then for num in fields[1]:gmatch( "%d+" ) do if not asn_descr[num] then asn_descr[num] = asn_description( num ) end u[#u+1] = ( "%s AS: %s%s%s" ):format( asn_type, num, ( asn_descr[num] ~= "" and " - " ) or "", asn_descr[num] ) end t.asn = { table.concat(u, "\n " ) } end end return true end --- -- Performs an AS Number to AS Description lookup. -- @param asn String AS number. -- @return String description or "". function asn_description( asn ) if type( asn ) ~= "string" or asn == "" then return "" end -- dns query options local options = {} options.dtype = "TXT" options.sendCount = 1 if type( nmap.registry.args.dns ) == "string" and nmap.registry.args.dns ~= "" then options.host = nmap.registry.args.dns options.port = 53 end -- send query local query = ( "AS%s.asn.cymru.com" ):format( asn ) local status, decoded_response = dns.query( query, options ) if not status then return "" end return decoded_response:match( "|%s*([^|$]+)%s*$" ) or "" end --- -- Processes records which are recognized DNS answers by combining them into unique BGPs before caching -- them in the registry and returning combined_records. If there aren't any records (No Such Name message -- or DNS failure) we signal this fact to other threads by using the cache and return with an empty table. -- @param records Table of recognized answers (may be empty). -- @param output String non-answer message or an empty table. -- @param ip String host.ip. -- @return Table containing combined records for the target (or an empty table). function process_answers( records, output, ip ) local combined_records = {} -- if records empty and no error message (output) then assume catastrophic dns failure and have all threads fail without trying. if #records == 0 and type( output ) ~= "string" then nmap.registry.asn.cache = { {["cache_bgp"] = "0/0"}, {["cache_bgp"] = "::/0"} } return {} end if #records == 0 and type( output ) == "string" then table.insert( nmap.registry.asn.cache, { ["pointer"] = ip, ["cache_bgp"] = get_assignment( ip, ( ip:match(":") and 48 ) or 29 ) } ) return {} end if type( records ) ~= "table" or #records == 0 then return {} end -- combine fields for unique BGP for _, record in ipairs( records ) do if not combined_records[record.cache_bgp] then combined_records[record.cache_bgp] = record elseif combined_records[record.cache_bgp].asn_type ~= record.asn_type then -- origin before peer. if record.asn_type == "Origin" then combined_records[record.cache_bgp].asn = { table.unpack( record.asn ), table.unpack( combined_records[record.cache_bgp].asn ) } else combined_records[record.cache_bgp].asn = { table.unpack( combined_records[record.cache_bgp].asn ), table.unpack( record.asn ) } end end end -- cache combined records for _, rec in pairs( combined_records ) do table.insert( nmap.registry.asn.cache, rec ) end return combined_records end --- -- Calculates the prefix length for the given IP address range. -- @param range String representing an IP address range. -- @return Number - prefix length of the range. function get_prefix_length( range ) if type( range ) ~= "string" or range == "" then return nil end local first, last, err = ipOps.get_ips_from_range( range ) if err then return nil end first = ipOps.ip_to_bin( first ):reverse() last = ipOps.ip_to_bin( last ):reverse() local hostbits = 0 for pos = 1, # first , 1 do if first:sub( pos, pos ) == "0" and last:sub( pos, pos ) == "1" then hostbits = hostbits + 1 else break end end return ( # first - hostbits ) end --- -- Given an IP address and a prefix length, returns a string representing a -- valid IP address assignment (size is not checked) which contains the -- supplied IP address. For example, with -- ip = "192.168.1.187" and -- prefix = 24 the return value will be -- "192.168.1.1-192.168.1.255" -- @param ip String representing an IP address. -- @param prefix String or number representing a prefix length. Should be of the same address family as ip. -- @return String representing a range of addresses from the first to the last hosts (or nil in case of an error). -- @return nil or error message in case of an error. function get_assignment( ip, prefix ) local some_ip, err = ipOps.ip_to_bin( ip ) if err then return nil, err end prefix = tonumber( prefix ) if not prefix or ( prefix < 0 ) or ( prefix > # some_ip ) then return nil, "Error in get_assignment: Invalid prefix length." end local hostbits = string.sub( some_ip, prefix + 1 ) hostbits = string.gsub( hostbits, "1", "0" ) local first = string.sub( some_ip, 1, prefix ) .. hostbits local last err = {} first, err[#err+1] = ipOps.bin_to_ip( first ) last, err[#err+1] = ipOps.get_last_ip( ip, prefix ) if #err > 0 then return nil, table.concat( err, " " ) end return first .. "-" .. last end --- -- Decides what to output based on the content of the supplied parameters and formats it for return by action. -- @param output String non-answer message to be returned as is or an empty table. -- @param combined_records Table containing combined records. -- @return Formatted nice output string. function nice_output( output, combined_records ) -- return a string message if type( output ) == "string" and output ~= "" then return output end -- return nothing (dns failure) if type( output ) ~= "table" then return nil end -- format each combined_record for output for _, rec in pairs( combined_records ) do local r = {} if rec.bgp then r[#r+1] = rec.bgp end if rec.co then r[#r+1] = rec.co end if rec.asn then output[#output+1] = ( "%s\n %s" ):format( table.concat( r, " | " ), table.concat( rec.asn, "\n " ) ) end end -- return nothing if #output == 0 then return nil end -- sort BGP asc. and combine BGP when ASN info is duplicated local first, second table.sort( output, function(a,b) return (get_prefix_length(a) or 0) > (get_prefix_length(b) or 0) end ) for i=1,#output,1 do for j=1,#output,1 do -- does everything after the first pipe match for i ~= j? if i ~= j and output[i]:match( "[^|]+|([^$]+$)" ) == output[j]:match( "[^|]+|([^$]+$)" ) then first = output[i]:match( "([%x%d:%.]+/%d+)%s|" ) -- the lastmost BGP before the pipe in i. second = output[j]:match( "([%x%d:%.]+/%d+)" ) -- first BGP in j -- add in the new BGP from j and delete j if first and second then output[i] = output[i]:gsub( first, ("%s and %s"):format( first, second ) ) output[j] = "" end end end end -- return combined and formatted answers return "\n" .. table.concat( output, "\n" ) end