2012-06-29 05:18:28 +00:00
# -*- coding: binary -*-
2011-05-12 20:03:55 +00:00
require 'rex/proto/ntlm/constants'
require 'rex/proto/ntlm/crypt'
require 'rex/proto/ntlm/base'
require 'rex/proto/ntlm/message'
2011-07-19 21:51:13 +00:00
require 'rex/proto/ntlm/utils'
2011-03-27 20:14:56 +00:00
module Msf
###
#
2011-07-19 21:51:13 +00:00
# This mixins will only provide the options name and description when a protocol want to use ntlm features from lib/rex/proto/ntlm .
# Unfortunatly other mixin's still have to make direct call from lib/rex/proto/ntlm
2011-03-27 20:14:56 +00:00
# cause some protocol like SMB are implemented in lib/rex/proto/ while others like mssql are implemented in lib/msf/core/exploit
#
###
module Exploit::NTLM
NTLM_CONST = :: Rex :: Proto :: NTLM :: Constants
NTLM_CRYPT = :: Rex :: Proto :: NTLM :: Crypt
NTLM_UTILS = :: Rex :: Proto :: NTLM :: Utils
NTLM_BASE = :: Rex :: Proto :: NTLM :: Base
NTLM_MESSAGE = :: Rex :: Proto :: NTLM :: Message
module Client
def initialize ( info = { } )
super
register_advanced_options (
[
#
# UseNTLMv2 forces NTLMv2 instead of NTLM2_session behavior when the 'Negotiate NTLM2' flag is set
#
2011-04-03 21:06:50 +00:00
OptBool . new ( 'NTLM::UseNTLMv2' , [ true , " Use NTLMv2 instead of NTLM2_session when \' Negotiate NTLM2 \' key is true " , true ] ) ,
2011-03-27 20:14:56 +00:00
#
# UseNTLM2_session forces the use of NTLMV2 session keys instead of NTLMv1, emulating the default of Windows 2000+
#
OptBool . new ( 'NTLM::UseNTLM2_session' , [ true , 'Activate the \'Negotiate NTLM2 key\' flag, forcing the use of a NTLMv2_session' , true ] ) ,
#
# SendLM has no effect when NTLM_UseNTLM2_session = true, NTLM_UseNTLMv2 = false or NTLM_SendNTLM = false
#
OptBool . new ( 'NTLM::SendLM' , [ true , " Always send the LANMAN response (except when NTLMv2_session is specified) " , true ] ) ,
#
# UseLMKey is valid when NTLM_SendLM = true, NTLM_SendNTLM = true, or NTLM_UseNTLM2_session = false
#
OptBool . new ( 'NTLM::UseLMKey' , [ true , " Activate the \' Negotiate Lan Manager Key \' flag, using the LM key when the LM response is sent " , false ] ) ,
#
# SendNTLM allows the NTLM response to be excluded, emulating Win9x behavior (don't change unless you are testing)
#
OptBool . new ( 'NTLM::SendNTLM' , [ true , 'Activate the \'Negotiate NTLM key\' flag, indicating the use of NTLM responses' , true ] ) ,
#
2011-07-19 21:51:13 +00:00
# SendSPN will send an avp of type 9/SPN in the ntlmv2 client blob, this is mandatory on windows seven / 2008 r2 if
2011-03-27 20:14:56 +00:00
# Microsoft network server : Server SPN target name validation level is set to <Required from client> or we get an STATUS_ACCESS_DENIED
#
OptBool . new ( 'NTLM::SendSPN' , [ true , 'Send an avp of type SPN in the ntlmv2 client Blob, this allow authentification on windows Seven/2008r2 when SPN is required' , true ] ) ,
] , Msf :: Exploit :: NTLM :: Client )
end
end
= begin
module Server
def initialize ( info = { } )
super
register_options (
[
] , Msf :: Exploit :: NTLM :: Server )
end
end
= end
end
end
2011-07-19 21:51:13 +00:00