⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 testjoin.c

📁 samba最新软件
💻 C
📖 第 1 页 / 共 2 页
字号:
/*    Unix SMB/CIFS implementation.   utility code to join/leave a domain   Copyright (C) Andrew Tridgell 2004      This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 3 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program.  If not, see <http://www.gnu.org/licenses/>.*//*  this code is used by other torture modules to join/leave a domain  as either a member, bdc or thru a trust relationship*/#include "includes.h"#include "torture/torture.h"#include "system/time.h"#include "lib/crypto/crypto.h"#include "libnet/libnet.h"#include "lib/cmdline/popt_common.h"#include "lib/ldb/include/ldb.h"#include "librpc/gen_ndr/ndr_samr_c.h"#include "libcli/auth/libcli_auth.h"#include "torture/rpc/rpc.h"#include "libcli/security/security.h"#include "param/param.h"struct test_join {	struct dcerpc_pipe *p;	struct policy_handle user_handle;	struct libnet_JoinDomain *libnet_r;	struct dom_sid *dom_sid;	const char *dom_netbios_name;	const char *dom_dns_name;	struct dom_sid *user_sid;	struct GUID user_guid;	const char *netbios_name;};static NTSTATUS DeleteUser_byname(struct dcerpc_pipe *p, TALLOC_CTX *mem_ctx, 				  struct policy_handle *handle, const char *name){	NTSTATUS status;	struct samr_DeleteUser d;	struct policy_handle user_handle;	uint32_t rid;	struct samr_LookupNames n;	struct lsa_String sname;	struct samr_OpenUser r;	sname.string = name;	n.in.domain_handle = handle;	n.in.num_names = 1;	n.in.names = &sname;	status = dcerpc_samr_LookupNames(p, mem_ctx, &n);	if (NT_STATUS_IS_OK(status)) {		rid = n.out.rids.ids[0];	} else {		return status;	}	r.in.domain_handle = handle;	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;	r.in.rid = rid;	r.out.user_handle = &user_handle;	status = dcerpc_samr_OpenUser(p, mem_ctx, &r);	if (!NT_STATUS_IS_OK(status)) {		printf("OpenUser(%s) failed - %s\n", name, nt_errstr(status));		return status;	}	d.in.user_handle = &user_handle;	d.out.user_handle = &user_handle;	status = dcerpc_samr_DeleteUser(p, mem_ctx, &d);	if (!NT_STATUS_IS_OK(status)) {		return status;	}	return NT_STATUS_OK;}/*  create a test user in the domain  an opaque pointer is returned. Pass it to torture_leave_domain()   when finished*/struct test_join *torture_create_testuser(struct torture_context *torture,					  const char *username, 					  const char *domain,					  uint16_t acct_type,					  const char **random_password){	NTSTATUS status;	struct samr_Connect c;	struct samr_CreateUser2 r;	struct samr_OpenDomain o;	struct samr_LookupDomain l;	struct samr_GetUserPwInfo pwp;	struct samr_SetUserInfo s;	union samr_UserInfo u;	struct policy_handle handle;	struct policy_handle domain_handle;	uint32_t access_granted;	uint32_t rid;	DATA_BLOB session_key;	struct lsa_String name;		int policy_min_pw_len = 0;	struct test_join *join;	char *random_pw;	const char *dc_binding = torture_setting_string(torture, "dc_binding", NULL);	join = talloc(NULL, struct test_join);	if (join == NULL) {		return NULL;	}	ZERO_STRUCTP(join);	printf("Connecting to SAMR\n");		if (dc_binding) {		status = dcerpc_pipe_connect(join,					     &join->p,					     dc_binding,					     &ndr_table_samr,					     cmdline_credentials, NULL, torture->lp_ctx);					     	} else {		status = torture_rpc_connection(torture, 						&join->p, 						&ndr_table_samr);	}	if (!NT_STATUS_IS_OK(status)) {		return NULL;	}	c.in.system_name = NULL;	c.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;	c.out.connect_handle = &handle;	status = dcerpc_samr_Connect(join->p, join, &c);	if (!NT_STATUS_IS_OK(status)) {		const char *errstr = nt_errstr(status);		if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT)) {			errstr = dcerpc_errstr(join, join->p->last_fault_code);		}		printf("samr_Connect failed - %s\n", errstr);		return NULL;	}	printf("Opening domain %s\n", domain);	name.string = domain;	l.in.connect_handle = &handle;	l.in.domain_name = &name;	status = dcerpc_samr_LookupDomain(join->p, join, &l);	if (!NT_STATUS_IS_OK(status)) {		printf("LookupDomain failed - %s\n", nt_errstr(status));		goto failed;	}	talloc_steal(join, l.out.sid);	join->dom_sid = l.out.sid;	join->dom_netbios_name = talloc_strdup(join, domain);	if (!join->dom_netbios_name) goto failed;	o.in.connect_handle = &handle;	o.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;	o.in.sid = l.out.sid;	o.out.domain_handle = &domain_handle;	status = dcerpc_samr_OpenDomain(join->p, join, &o);	if (!NT_STATUS_IS_OK(status)) {		printf("OpenDomain failed - %s\n", nt_errstr(status));		goto failed;	}	printf("Creating account %s\n", username);again:	name.string = username;	r.in.domain_handle = &domain_handle;	r.in.account_name = &name;	r.in.acct_flags = acct_type;	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;	r.out.user_handle = &join->user_handle;	r.out.access_granted = &access_granted;	r.out.rid = &rid;	status = dcerpc_samr_CreateUser2(join->p, join, &r);	if (NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) {		status = DeleteUser_byname(join->p, join, &domain_handle, name.string);		if (NT_STATUS_IS_OK(status)) {			goto again;		}	}	if (!NT_STATUS_IS_OK(status)) {		printf("CreateUser2 failed - %s\n", nt_errstr(status));		goto failed;	}	join->user_sid = dom_sid_add_rid(join, join->dom_sid, rid);	pwp.in.user_handle = &join->user_handle;	status = dcerpc_samr_GetUserPwInfo(join->p, join, &pwp);	if (NT_STATUS_IS_OK(status)) {		policy_min_pw_len = pwp.out.info.min_password_length;	}	random_pw = generate_random_str(join, MAX(8, policy_min_pw_len));	printf("Setting account password '%s'\n", random_pw);	ZERO_STRUCT(u);	s.in.user_handle = &join->user_handle;	s.in.info = &u;	s.in.level = 24;	encode_pw_buffer(u.info24.password.data, random_pw, STR_UNICODE);	u.info24.pw_len = strlen(random_pw);	status = dcerpc_fetch_session_key(join->p, &session_key);	if (!NT_STATUS_IS_OK(status)) {		printf("SetUserInfo level %u - no session key - %s\n",		       s.in.level, nt_errstr(status));		torture_leave_domain(join);		goto failed;	}	arcfour_crypt_blob(u.info24.password.data, 516, &session_key);	status = dcerpc_samr_SetUserInfo(join->p, join, &s);	if (!NT_STATUS_IS_OK(status)) {		printf("SetUserInfo failed - %s\n", nt_errstr(status));		goto failed;	}	ZERO_STRUCT(u);	s.in.user_handle = &join->user_handle;	s.in.info = &u;	s.in.level = 21;	u.info21.acct_flags = acct_type | ACB_PWNOEXP;	u.info21.fields_present = SAMR_FIELD_ACCT_FLAGS | SAMR_FIELD_DESCRIPTION | SAMR_FIELD_COMMENT | SAMR_FIELD_FULL_NAME;	u.info21.comment.string = talloc_asprintf(join, 						  "Tortured by Samba4: %s", 						  timestring(join, time(NULL)));		u.info21.full_name.string = talloc_asprintf(join, 						    "Torture account for Samba4: %s", 						    timestring(join, time(NULL)));		u.info21.description.string = talloc_asprintf(join, 					 "Samba4 torture account created by host %s: %s", 					 lp_netbios_name(torture->lp_ctx), 					 timestring(join, time(NULL)));	printf("Resetting ACB flags, force pw change time\n");	status = dcerpc_samr_SetUserInfo(join->p, join, &s);	if (!NT_STATUS_IS_OK(status)) {		printf("SetUserInfo failed - %s\n", nt_errstr(status));		goto failed;	}	if (random_password) {		*random_password = random_pw;	}	return join;failed:	torture_leave_domain(join);	return NULL;}_PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,					       const char *machine_name, 				      uint32_t acct_flags,				      struct cli_credentials **machine_credentials){	NTSTATUS status;	struct libnet_context *libnet_ctx;	struct libnet_JoinDomain *libnet_r;	struct test_join *tj;	struct samr_SetUserInfo s;	union samr_UserInfo u;		tj = talloc(tctx, struct test_join);	if (!tj) return NULL;	libnet_r = talloc(tj, struct libnet_JoinDomain);	if (!libnet_r) {		talloc_free(tj);		return NULL;	}		libnet_ctx = libnet_context_init(tctx->ev, tctx->lp_ctx);		if (!libnet_ctx) {		talloc_free(tj);		return NULL;	}		tj->libnet_r = libnet_r;			libnet_ctx->cred = cmdline_credentials;	libnet_r->in.binding = torture_setting_string(tctx, "binding", NULL);	if (!libnet_r->in.binding) {		libnet_r->in.binding = talloc_asprintf(libnet_r, "ncacn_np:%s", torture_setting_string(tctx, "host", NULL));	}	libnet_r->in.level = LIBNET_JOINDOMAIN_SPECIFIED;	libnet_r->in.netbios_name = machine_name;	libnet_r->in.account_name = talloc_asprintf(libnet_r, "%s$", machine_name);	if (!libnet_r->in.account_name) {		talloc_free(tj);		return NULL;	}		libnet_r->in.acct_type = acct_flags;	libnet_r->in.recreate_account = true;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -