Module: Msf::Util::WindowsCryptoHelpers

Included in:
Post::Windows::Priv, Msf::Util::WindowsRegistry::Security
Defined in:
lib/msf/util/windows_crypto_helpers.rb

Instance Method Summary collapse

Instance Method Details

#add_parity(byte_str) ⇒ Object



287
288
289
290
291
292
293
294
295
# File 'lib/msf/util/windows_crypto_helpers.rb', line 287

def add_parity(byte_str)
  byte_str.map do |byte|
    if byte.to_s(2).count('1').odd?
      (byte << 1) & 0b11111110
    else
      (byte << 1) | 0b00000001
    end
  end
end

#aes128_cts_hmac_sha1_96(raw_secret, salt) ⇒ String?

Parameters:

  • raw_secret (String)

    The data to encrypt

  • salt (String)

    The salt used by the encryption algorithm

Returns:

  • (String, nil)

    The encrypted data



403
404
405
# File 'lib/msf/util/windows_crypto_helpers.rb', line 403

def aes128_cts_hmac_sha1_96(raw_secret, salt)
  aes_cts_hmac_sha1_96('128-CBC', raw_secret, salt)
end

#aes256_cts_hmac_sha1_96(raw_secret, salt) ⇒ String?

Parameters:

  • raw_secret (String)

    The data to encrypt

  • salt (String)

    The salt used by the encryption algorithm

Returns:

  • (String, nil)

    The encrypted data



413
414
415
# File 'lib/msf/util/windows_crypto_helpers.rb', line 413

def aes256_cts_hmac_sha1_96(raw_secret, salt)
  aes_cts_hmac_sha1_96('256-CBC', raw_secret, salt)
end

#aes_cts_hmac_sha1_96(algorithm, raw_secret, salt) ⇒ String?

Parameters:

  • algorithm (String)

    The AES algorithm to use (e.g. ‘128-CBC` or `256-CBC`)

  • raw_secret (String)

    The data to encrypt

  • key (String)

    The salt used by the encryption algorithm

Returns:

  • (String, nil)

    The encrypted data



377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
# File 'lib/msf/util/windows_crypto_helpers.rb', line 377

def aes_cts_hmac_sha1_96(algorithm, raw_secret, salt)
  iterations = 4096
  cipher = OpenSSL::Cipher::AES.new(algorithm)
  key = OpenSSL::PKCS5.pbkdf2_hmac_sha1(raw_secret, salt, iterations, cipher.key_len)
  plaintext = "kerberos\x7B\x9B\x5B\x2B\x93\x13\x2B\x93".b
  rnd_seed = ''.b
  loop do
    cipher.reset
    cipher.encrypt
    cipher.iv = "\x00".b * 16
    cipher.key = key
    ciphertext = cipher.update(plaintext)
    rnd_seed += ciphertext
    break unless rnd_seed.size < cipher.key_len

    plaintext = ciphertext
  end
  rnd_seed
end

#convert_des_56_to_64(kstr) ⇒ String

Converts DES 56 key to DES 64 key

See [2.2.11.1.2 Encrypting a 64-Bit Block with a 7-Byte Key](docs.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/ebdb15df-8d0d-4347-9d62-082e6eccac40)

Parameters:

  • kstr (String)

    The key to convert

Returns:

  • (String)

    The converted key



14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# File 'lib/msf/util/windows_crypto_helpers.rb', line 14

def convert_des_56_to_64(kstr)
  des_odd_parity = [
    1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14,
    16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31,
    32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47,
    49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62,
    64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79,
    81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94,
    97, 97, 98, 98,100,100,103,103,104,104,107,107,109,109,110,110,
    112,112,115,115,117,117,118,118,121,121,122,122,124,124,127,127,
    128,128,131,131,133,133,134,134,137,137,138,138,140,140,143,143,
    145,145,146,146,148,148,151,151,152,152,155,155,157,157,158,158,
    161,161,162,162,164,164,167,167,168,168,171,171,173,173,174,174,
    176,176,179,179,181,181,182,182,185,185,186,186,188,188,191,191,
    193,193,194,194,196,196,199,199,200,200,203,203,205,205,206,206,
    208,208,211,211,213,213,214,214,217,217,218,218,220,220,223,223,
    224,224,227,227,229,229,230,230,233,233,234,234,236,236,239,239,
    241,241,242,242,244,244,247,247,248,248,251,251,253,253,254,254
  ]

  key = []
  str = kstr.unpack("C*")

  key[0] = str[0] >> 1
  key[1] = ((str[0] & 0x01) << 6) | (str[1] >> 2)
  key[2] = ((str[1] & 0x03) << 5) | (str[2] >> 3)
  key[3] = ((str[2] & 0x07) << 4) | (str[3] >> 4)
  key[4] = ((str[3] & 0x0F) << 3) | (str[4] >> 5)
  key[5] = ((str[4] & 0x1F) << 2) | (str[5] >> 6)
  key[6] = ((str[5] & 0x3F) << 1) | (str[6] >> 7)
  key[7] = str[6] & 0x7F

  0.upto(7) do |i|
    key[i] = ( key[i] << 1)
    key[i] = des_odd_parity[key[i]]
  end
  return key.pack("C*")
end

#decrypt_aes(edata, key, iv) ⇒ String?

Decrypt a cipher using AES in CBC mode. The key length is deduced from ‘key` argument length. The supported key length are 16, 24 and 32. Also, it will take care of padding the last block if the cipher length is not modulo 16.

Parameters:

  • edata (String)

    The cipher to decrypt

  • key (String)

    The key used to decrypt

  • iv (String)

    The IV

Returns:

  • (String, nil)

    The decrypted plaintext or nil if the key size is not supported



239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
# File 'lib/msf/util/windows_crypto_helpers.rb', line 239

def decrypt_aes(edata, key, iv)
  cipher_str = case key.length
  when 16
    'aes-128-cbc'
  when 24
    'aes-192-cbc'
  when 32
    'aes-256-cbc'
  else
    elog("decrypt_aes: Unknown key length (#{key.length} bytes)")
    return
  end
  aes = OpenSSL::Cipher.new(cipher_str)
  aes.decrypt
  aes.key = key
  aes.padding = 0
  aes.iv = iv

  decrypted = ''
  (0...edata.length).step(aes.block_size) do |i|
    block_str = edata[i, aes.block_size]
    # Pad buffer with \x00 if needed
    if block_str.length < aes.block_size
      block_str << "\x00".b * (aes.block_size - block_str.length)
    end
    decrypted << aes.update(block_str)
  end

  return decrypted
end

#decrypt_hash(edata, key, iv) ⇒ String?

Decrypt encrypted cached entry from HKLMSecurityCacheNL$XX

Parameters:

  • edata (String)

    The encrypted hash entry to decrypt

  • key (String)

    The key used to decrypt

  • iv (String)

    The IV

Returns:

  • (String, nil)

    The decrypted plaintext or nil if the key size is not supported



276
277
278
279
280
281
282
283
284
285
# File 'lib/msf/util/windows_crypto_helpers.rb', line 276

def decrypt_hash(edata, key, iv)
  rc4key = OpenSSL::HMAC.digest(OpenSSL::Digest.new('md5'), key, iv)
  rc4 = OpenSSL::Cipher.new('rc4')
  rc4.decrypt
  rc4.key = rc4key
  decrypted = rc4.update(edata)
  decrypted << rc4.final

  return decrypted
end

#decrypt_lsa_data(policy_secret, lsa_key) ⇒ String

Decrypts LSA encrypted data

Parameters:

  • policy_secret (String)

    The encrypted data stored in the registry

  • lsa_key (String)

    The LSA key

Returns:

  • (String)

    The decrypted data



93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
# File 'lib/msf/util/windows_crypto_helpers.rb', line 93

def decrypt_lsa_data(policy_secret, lsa_key)

  sha256x = Digest::SHA256.new()
  sha256x << lsa_key
  1000.times do
    sha256x << policy_secret[28,32]
  end

  aes = OpenSSL::Cipher.new("aes-256-cbc")
  aes.decrypt
  aes.key = sha256x.digest

  # vprint_status("digest #{sha256x.digest.unpack("H*")[0]}")

  decrypted_data = ''

  (60...policy_secret.length).step(16) do |i|
    aes.reset
    aes.padding = 0
    aes.iv = "\x00" * 16
    decrypted_data << aes.update(policy_secret[i,16])
  end

  return decrypted_data
end

#decrypt_secret_data(secret, key) ⇒ String

Decrypts “Secret” encrypted data

Ruby implementation of SystemFunction005. The original python code has been taken from Credump

Parameters:

  • secret (String)

    The secret to decrypt

  • key (String)

    The key to decrypt the secret

Returns:

  • (String)

    The decrypted data



61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
# File 'lib/msf/util/windows_crypto_helpers.rb', line 61

def decrypt_secret_data(secret, key)

  j = 0
  decrypted_data = ''

  for i in (0...secret.length).step(8)
    enc_block = secret[i..i+7]
    block_key = key[j..j+6]
    des_key = convert_des_56_to_64(block_key)
    d1 = OpenSSL::Cipher.new('des-ecb')
    d1.decrypt
    d1.padding = 0
    d1.key = des_key
    d1o = d1.update(enc_block)
    d1o << d1.final
    decrypted_data += d1o
    j += 7
    if (key[j..j+7].length < 7 )
      j = key[j..j+7].length
    end
  end
  dec_data_len = decrypted_data[0,4].unpack('L<').first

  return decrypted_data[8, dec_data_len]

end

#decrypt_user_hash(rid, hboot_key, enc_hash, pass, default) ⇒ String

This decrypt an encrypted NT or LM hash. See [2.2.11.1.1 Encrypting an NT or LM Hash Value with a Specified Key](docs.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/a5252e8c-25e7-4616-a375-55ced086b19b)

Parameters:

  • rid (String)

    The user RID

  • hboot_key (String)

    The hashedBootKey

  • enc_hash (String)

    The encrypted hash

  • pass (String)

    The password used for revision 1 hashes

  • default (String)

    The default hash to return if something goes wrong

Returns:

  • (String)

    The decrypted NT or LM hash



144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
# File 'lib/msf/util/windows_crypto_helpers.rb', line 144

def decrypt_user_hash(rid, hboot_key, enc_hash, pass, default)
  revision = enc_hash[2, 2]&.unpack('v')&.first

  case revision
  when 1
    return default if enc_hash.length < 20

    md5 = Digest::MD5.new
    md5.update(hboot_key[0, 16] + [rid].pack('V') + pass)

    rc4 = OpenSSL::Cipher.new('rc4')
    rc4.decrypt
    rc4.key = md5.digest
    okey = rc4.update(enc_hash[4, 16])
  when 2
    return default if enc_hash.length < 40

    aes = OpenSSL::Cipher.new('aes-128-cbc')
    aes.decrypt
    aes.key = hboot_key[0, 16]
    aes.padding = 0
    aes.iv = enc_hash[8, 16]
    okey = aes.update(enc_hash[24, 16]) # we need only 16 bytes
  else
    elog("decrypt_user_hash: Unknown user hash revision: #{revision}, returning default")
    return default
  end

  des_k1, des_k2 = rid_to_key(rid)

  d1 = OpenSSL::Cipher.new('des-ecb')
  d1.decrypt
  d1.padding = 0
  d1.key = des_k1

  d2 = OpenSSL::Cipher.new('des-ecb')
  d2.decrypt
  d2.padding = 0
  d2.key = des_k2

  d1o = d1.update(okey[0, 8])
  d1o << d1.final

  d2o = d2.update(okey[8, 8])
  d1o << d2.final
  d1o + d2o
end

#decrypt_user_key(hboot_key, user_v, rid) ⇒ Array

Decrypts the user V key value and return the NT amd LM hashes. The V value can be found under the HKEY_LOCAL_MACHINESAMSAMDomainsAccountUsers<RID> registry key.

Parameters:

  • hboot_key (String)

    The hashedBootKey

  • user_v (String)

    The user V value

  • rid (String)

    The user RID

Returns:

  • (Array)

    Array with the first and second element containing the NT and LM hashes respectively



200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
# File 'lib/msf/util/windows_crypto_helpers.rb', line 200

def decrypt_user_key(hboot_key, user_v, rid)
  sam_lmpass = "LMPASSWORD\x00"
  sam_ntpass = "NTPASSWORD\x00"
  sam_empty_lm = ['aad3b435b51404eeaad3b435b51404ee'].pack('H*')
  sam_empty_nt = ['31d6cfe0d16ae931b73c59d7e0c089c0'].pack('H*')

  # TODO: use a proper structure for V data, instead of unpacking directly
  hashlm_off = user_v[0x9c, 4]&.unpack('V')&.first
  hashlm_len = user_v[0xa0, 4]&.unpack('V')&.first
  if hashlm_off && hashlm_len
    hashlm_enc = user_v[hashlm_off + 0xcc, hashlm_len]
    hashlm = decrypt_user_hash(rid, hboot_key, hashlm_enc, sam_lmpass, sam_empty_lm)
  else
    elog('decrypt_user_key: Unable to extract LM hash, using empty LM hash instead')
    hashlm = sam_empty_lm
  end

  hashnt_off = user_v[0xa8, 4]&.unpack('V')&.first
  hashnt_len = user_v[0xac, 4]&.unpack('V')&.first
  if hashnt_off && hashnt_len
    hashnt_enc = user_v[hashnt_off + 0xcc, hashnt_len]
    hashnt = decrypt_user_hash(rid, hboot_key, hashnt_enc, sam_ntpass, sam_empty_nt)
  else
    elog('decrypt_user_key: Unable to extract NT hash, using empty NT hash instead')
    hashnt = sam_empty_nt
  end

  [hashnt, hashlm]
end

#des_cbc_md5(raw_secret, salt) ⇒ String?

Parameters:

  • raw_secret (String)

    The data to encrypt

  • key (String)

    The salt used by the encryption algorithm

Returns:

  • (String, nil)

    The encrypted data



335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
# File 'lib/msf/util/windows_crypto_helpers.rb', line 335

def des_cbc_md5(raw_secret, salt)
  odd = true
  tmp_byte_str = [0, 0, 0, 0, 0, 0, 0, 0]
  plaintext = raw_secret + salt
  plaintext += "\x00".b * (8 - (plaintext.size % 8))
  plaintext.bytes.each_slice(8) do |block|
    tmp_56 = block.map { |byte| byte & 0b01111111 }
    if !odd
      # rubocop:disable Style/FormatString
      tmp_56_str = tmp_56.map { |byte| '%07b' % byte }.join
      # rubocop:enable Style/FormatString
      tmp_56_str.reverse!
      tmp_56 = tmp_56_str.bytes.each_slice(7).map do |bits7|
        bits7.map(&:chr).join.to_i(2)
      end
    end
    odd = !odd
    tmp_byte_str = tmp_byte_str.zip(tmp_56).map { |a, b| a ^ b }
  end
  tempkey = add_parity(tmp_byte_str).map(&:chr).join
  if weak_des_key?(tempkey)
    tempkey[7] = (tempkey[7].ord ^ 0xF0).chr
  end
  cipher = OpenSSL::Cipher.new('DES-CBC')
  cipher.encrypt
  cipher.iv = tempkey
  cipher.key = tempkey
  chekcsumkey = cipher.update(plaintext)[-8..-1]
  chekcsumkey = fix_parity(chekcsumkey.bytes).map(&:chr).join
  if weak_des_key?(chekcsumkey)
    chekcsumkey[7] = (chekcsumkey[7].ord ^ 0xF0).chr
  end
  chekcsumkey.unpack('H*')[0]
end

#fix_parity(byte_str) ⇒ Object



297
298
299
300
301
302
303
304
305
306
# File 'lib/msf/util/windows_crypto_helpers.rb', line 297

def fix_parity(byte_str)
  byte_str.map do |byte|
    t = byte.to_s(2).rjust(8, '0')
    if t[0, 7].count('1').odd?
      ("#{t[0, 7]}0").to_i(2).chr
    else
      ("#{t[0, 7]}1").to_i(2).chr
    end
  end
end

#rc4_hmac(raw_secret, salt = nil) ⇒ String?

Parameters:

  • raw_secret (String)

    The data to encrypt

  • salt (String) (defaults to: nil)

    The salt used by the encryption algorithm

Returns:

  • (String, nil)

    The encrypted data



423
424
425
# File 'lib/msf/util/windows_crypto_helpers.rb', line 423

def rc4_hmac(raw_secret, salt = nil)
  Rex::Proto::Kerberos::Crypto::Rc4Hmac.new.string_to_key(raw_secret, salt)
end

#rid_to_key(rid) ⇒ Array

Derive DES Key1 and Key2 from user RID.

Parameters:

  • rid (String)

    The user RID

Returns:

  • (Array)

    A two element array containing Key1 and Key2, in this order



123
124
125
126
127
128
129
130
131
132
133
# File 'lib/msf/util/windows_crypto_helpers.rb', line 123

def rid_to_key(rid)
  # See [2.2.11.1.3 Deriving Key1 and Key2 from a Little-Endian, Unsigned Integer Key](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/b1b0094f-2546-431f-b06d-582158a9f2bb)
  s1 = [rid].pack('V')
  s1 << s1[0, 3]

  s2b = [rid].pack('V').unpack('C4')
  s2 = [s2b[3], s2b[0], s2b[1], s2b[2]].pack('C4')
  s2 << s2[0, 3]

  [convert_des_56_to_64(s1), convert_des_56_to_64(s2)]
end

#weak_des_key?(key) ⇒ Boolean

Returns:

  • (Boolean)


308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
# File 'lib/msf/util/windows_crypto_helpers.rb', line 308

def weak_des_key?(key)
  [
    "\x01\x01\x01\x01\x01\x01\x01\x01",
    "\xFE\xFE\xFE\xFE\xFE\xFE\xFE\xFE",
    "\x1F\x1F\x1F\x1F\x0E\x0E\x0E\x0E",
    "\xE0\xE0\xE0\xE0\xF1\xF1\xF1\xF1",
    "\x01\xFE\x01\xFE\x01\xFE\x01\xFE",
    "\xFE\x01\xFE\x01\xFE\x01\xFE\x01",
    "\x1F\xE0\x1F\xE0\x0E\xF1\x0E\xF1",
    "\xE0\x1F\xE0\x1F\xF1\x0E\xF1\x0E",
    "\x01\xE0\x01\xE0\x01\xF1\x01\xF1",
    "\xE0\x01\xE0\x01\xF1\x01\xF1\x01",
    "\x1F\xFE\x1F\xFE\x0E\xFE\x0E\xFE",
    "\xFE\x1F\xFE\x1F\xFE\x0E\xFE\x0E",
    "\x01\x1F\x01\x1F\x01\x0E\x01\x0E",
    "\x1F\x01\x1F\x01\x0E\x01\x0E\x01",
    "\xE0\xFE\xE0\xFE\xF1\xFE\xF1\xFE",
    "\xFE\xE0\xFE\xE0\xFE\xF1\xFE\xF1"
  ].include?(key)
end