SmbRelay3 – SMB/HTTP to SMB replay attacks

来源:互联网 发布:百度云不能连接网络 编辑:程序博客网 时间:2024/04/29 09:07

 

Server Message Block normally provides shared access to files, printers, serial ports, and miscellaneous communications between nodes on a Windows network. So, you know how important it is! At the same time, it is VERY insecure. If you are able to force remote users to connect to your system via HTTP or SMB, theorically then, the network belongs to you. SmbRelay3 will let you do all of that!

Infact, SMBRelay3 is one of the first public tools that helps you perform the following attacks:
* HTTP to SMB: Negotiate authentication with an HTTP client and relay credentials to another smb host.
* SMB to SMB: Negotiate authentication with an SMB computer and relay credentials to another windows computer.
* IMAP to SMB: Negotiate authentication with an email IMAP client and relay credentials to another host.
* POP3 to SMB: Negotiate authentication with an email POP3 client and relay credentials to another host.
* SMTP to SMB: Negotiate authentication with an email SMTP client SMB computer and relay credentials.
* Psexec Module: If you already know username and password you can get a shell to the remote computer. This psexec like tool works under win32 and linux as does not use Microsoft API.
* Fake interface:Under linux, a new port 445 binding is done under a different IP address. All packets sent to that interface will be replayed to the previously authenticated system.

SMBrelay3 uses SMB, HTTP POP3 and IMAP protocols to exploit weak NTLM Challenges with replay attacks. Now, a good thing about this application is that it also includes an small SMB library for creating crafted messages. It is able to relay both HTTP and SMB authentication. If the incoming connection has ‘Administrative privileges’ on the client computer, you automatically get a shell! Since it is an open source application, you have all its source at your disposal! It basically makes use of these SMB queries:

SMBCLOSE, SERVICEOPERATION, READANDX, WRITEANDX, FINDFIRST2, SESSIONSETUPANDX, TREECONNETANDX, NTCREATEANDX

Now, the only bad thing about this application is that MS08-068 has effectively restricted its exploitation to the local system only. But, as long as the system is not patched, you sure can use it. Or still better, you can still replay credentials to other domain servers or use different protocols.

So, if you want to download it download it here.

原创粉丝点击