try to understand key in ntlm

This commit is contained in:
speyrefitte
2015-03-03 18:27:45 +01:00
parent a7058f1c54
commit 98494d0e73
2 changed files with 241 additions and 35 deletions

View File

@@ -123,11 +123,13 @@ def encodeDERTRequest(negoTypes):
def decodeDERTRequest(s):
"""
@summary: Decode the stream as
@param s: {Stream}
@param s: ([{Stream}], {str} pubKeyAuth)
"""
tRequest = decoder.decode(s.getvalue(), asn1Spec=TSRequest())[0]
return decoder.decode(s.getvalue(), asn1Spec=TSRequest())[0]
def getNegoTokens(tRequest):
negoData = tRequest.getComponentByName("negoTokens")
return [Stream(negoData.getComponentByPosition(i).getComponentByPosition(0).asOctets()) for i in range(len(negoData))]
result = [Stream(negoData.getComponentByPosition(i).getComponentByPosition(0).asOctets()) for i in range(len(negoData))]
return result
def getPubKeyAuth(tRequest):
return tRequest.getComponentByName("pubKeyAuth").asOctets()

View File

@@ -24,6 +24,7 @@
import hashlib, hmac
import rdpy.security.pyDes as pyDes
import rdpy.security.rc4 as rc4
from rdpy.security.rsa_wrapper import random
from rdpy.core.type import CompositeType, CallableValue, String, UInt8, UInt16Le, UInt24Le, UInt32Le, sizeof
@@ -76,6 +77,14 @@ class Negotiate(object):
NTLMSSP_REQUEST_TARGET = 0x00000004
NTLM_NEGOTIATE_OEM = 0x00000002
NTLMSSP_NEGOTIATE_UNICODE = 0x00000001
def getPayLoadField(message, length, bufferOffset):
if length == 0:
return None
offset = sizeof(message) - sizeof(message.Payload)
start = bufferOffset - offset
end = start + length
return message.Payload.value[start:end]
class Version(CompositeType):
"""
@@ -150,20 +159,10 @@ class ChallengeMessage(CompositeType):
self.Payload = String()
def getTargetName(self):
if self.TargetNameLen.value == 0:
return None
offset = sizeof(self) - sizeof(self.Payload)
start = self.TargetNameBufferOffset.value - offset
end = start + self.TargetNameLen.value
return self.Payload.value[start:end]
return getPayLoadField(self, self.TargetNameLen.value, self.TargetNameBufferOffset.value)
def getTargetInfo(self):
if self.TargetInfoLen.value == 0:
return None
offset = sizeof(self) - sizeof(self.Payload)
start = self.TargetInfoBufferOffset.value - offset
end = start + self.TargetInfoLen.value - 4
return self.Payload.value[start:end]
return getPayLoadField(self, self.TargetInfoLen.value - 4, self.TargetInfoBufferOffset.value)
class AuthenticateMessage(CompositeType):
"""
@@ -206,20 +205,19 @@ class AuthenticateMessage(CompositeType):
self.Payload = String()
def getUserName(self):
if self.UserNameLen.value == 0:
return None
offset = sizeof(self) - sizeof(self.Payload)
start = self.UserNameBufferOffset.value - offset
end = start + self.UserNameLen.value
return self.Payload.value[start:end]
return getPayLoadField(self, self.UserNameLen.value, self.UserNameBufferOffset.value)
def getDomainName(self):
if self.DomainNameLen.value == 0:
return None
offset = sizeof(self) - sizeof(self.Payload)
start = self.DomainNameBufferOffset.value - offset
end = start + self.DomainNameLen.value
return self.Payload.value[start:end]
return getPayLoadField(self, self.DomainNameLen.value, self.DomainNameBufferOffset.value)
def getLmChallengeResponse(self):
return getPayLoadField(self, self.LmChallengeResponseLen.value, self.LmChallengeResponseBufferOffset.value)
def getNtChallengeResponse(self):
return getPayLoadField(self, self.NtChallengeResponseLen.value, self.NtChallengeResponseBufferOffset.value)
def getEncryptedRandomSession(self):
return getPayLoadField(self, self.EncryptedRandomSessionLen.value, self.EncryptedRandomSessionBufferOffset.value)
def expandDesKey(key):
"""
@@ -281,6 +279,25 @@ def Z(m):
@return: \x00 * m
"""
return "\x00" * m
def RC4K(key, plaintext):
"""
@summary: Context free of rc4 encoding
@param key: {str} key
@param plaintext: {str} plaintext
@return {str} encrypted text
"""
return rc4.crypt(rc4.RC4Key(key), plaintext)
def KXKEY(SessionBaseKey, LmChallengeResponse, ServerChallenge):
"""
@summary: Key eXchange Key
@param SessionBaseKey: {str} computed by NTLMv1Anthentication or NTLMv2Authenticate function
@param LmChallengeResponse : {str} computed by NTLMv1Anthentication or NTLMv2Authenticate function
@param ServerChallenge : {str} Server chanllenge come from ChallengeMessage
@see: https://msdn.microsoft.com/en-us/library/cc236710.aspx
"""
return HMAC_MD5(SessionBaseKey, ServerChallenge + LmChallengeResponse[:8])
def NTOWFv1(Passwd, User, UserDom):
"""
@@ -328,7 +345,7 @@ def NTOWFv2(Passwd, User, UserDom):
def LMOWFv2(Passwd, User, UserDom):
return NTOWFv2(Passwd, User, UserDom)
def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverName):
def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverName, Time = "\x00" * 8, ClientChallenge = None):
"""
@summary: process NTLMv2 Authenticate hash
@see: https://msdn.microsoft.com/en-us/library/cc236700.aspx
@@ -336,10 +353,11 @@ def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverN
ResponseKeyNT = NTOWFv2(password, user, domain)
ResponseKeyLM = LMOWFv2(password, user, domain)
Responserversion = "\0x01"
HiResponserversion = "0x01"
Time = "\x00" * 8
ClientChallenge = random(64)
Responserversion = "\x01"
HiResponserversion = "\x01"
#Time = "\x00" * 8
if ClientChallenge is None:
ClientChallenge = random(64)
temp = Responserversion + HiResponserversion + Z(6) + Time + ClientChallenge + Z(4) + serverName + Z(4)
NTProofStr = HMAC_MD5(ResponseKeyNT, serverChallenge + temp)
@@ -392,4 +410,190 @@ def createAuthenticationMessage(method, challengeResponse, domain, user, passwor
message.Payload.value += SessionBaseKey
offset += len(SessionBaseKey)
return message
return message
cssp_1 = [
0x30, 0x2f, 0xa0, 0x03, 0x02, 0x01, 0x02, 0xa1,
0x28, 0x30, 0x26, 0x30, 0x24, 0xa0, 0x22, 0x04,
0x20, 0x4e, 0x54, 0x4c, 0x4d, 0x53, 0x53, 0x50,
0x00, 0x01, 0x00, 0x00, 0x00, 0x35, 0x82, 0x08,
0x60, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00 ]
cssp_2 = [
0x30, 0x82, 0x01, 0x09, 0xa0, 0x03, 0x02, 0x01,
0x02, 0xa1, 0x82, 0x01, 0x00, 0x30, 0x81, 0xfd,
0x30, 0x81, 0xfa, 0xa0, 0x81, 0xf7, 0x04, 0x81,
0xf4, 0x4e, 0x54, 0x4c, 0x4d, 0x53, 0x53, 0x50,
0x00, 0x02, 0x00, 0x00, 0x00, 0x0e, 0x00, 0x0e,
0x00, 0x38, 0x00, 0x00, 0x00, 0x35, 0x82, 0x89,
0x62, 0x73, 0xc7, 0x43, 0xa9, 0xe7, 0xfc, 0xbb,
0xfc, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0xae, 0x00, 0xae, 0x00, 0x46, 0x00, 0x00,
0x00, 0x06, 0x01, 0xb1, 0x1d, 0x00, 0x00, 0x00,
0x0f, 0x53, 0x00, 0x49, 0x00, 0x52, 0x00, 0x41,
0x00, 0x44, 0x00, 0x45, 0x00, 0x4c, 0x00, 0x02,
0x00, 0x0e, 0x00, 0x53, 0x00, 0x49, 0x00, 0x52,
0x00, 0x41, 0x00, 0x44, 0x00, 0x45, 0x00, 0x4c,
0x00, 0x01, 0x00, 0x16, 0x00, 0x57, 0x00, 0x41,
0x00, 0x56, 0x00, 0x2d, 0x00, 0x47, 0x00, 0x4c,
0x00, 0x57, 0x00, 0x2d, 0x00, 0x30, 0x00, 0x30,
0x00, 0x39, 0x00, 0x04, 0x00, 0x1a, 0x00, 0x53,
0x00, 0x69, 0x00, 0x72, 0x00, 0x61, 0x00, 0x64,
0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c,
0x00, 0x6f, 0x00, 0x63, 0x00, 0x61, 0x00, 0x6c,
0x00, 0x03, 0x00, 0x32, 0x00, 0x77, 0x00, 0x61,
0x00, 0x76, 0x00, 0x2d, 0x00, 0x67, 0x00, 0x6c,
0x00, 0x77, 0x00, 0x2d, 0x00, 0x30, 0x00, 0x30,
0x00, 0x39, 0x00, 0x2e, 0x00, 0x53, 0x00, 0x69,
0x00, 0x72, 0x00, 0x61, 0x00, 0x64, 0x00, 0x65,
0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f,
0x00, 0x63, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x05,
0x00, 0x1a, 0x00, 0x53, 0x00, 0x69, 0x00, 0x72,
0x00, 0x61, 0x00, 0x64, 0x00, 0x65, 0x00, 0x6c,
0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f, 0x00, 0x63,
0x00, 0x61, 0x00, 0x6c, 0x00, 0x07, 0x00, 0x08,
0x00, 0x56, 0x93, 0x34, 0x32, 0xc7, 0x55, 0xd0,
0x01, 0x00, 0x00, 0x00, 0x00 ]
cssp_3 = [
0x30, 0x82, 0x02, 0x0f, 0xa0, 0x03, 0x02, 0x01,
0x02, 0xa1, 0x82, 0x01, 0x62, 0x30, 0x82, 0x01,
0x5e, 0x30, 0x82, 0x01, 0x5a, 0xa0, 0x82, 0x01,
0x56, 0x04, 0x82, 0x01, 0x52, 0x4e, 0x54, 0x4c,
0x4d, 0x53, 0x53, 0x50, 0x00, 0x03, 0x00, 0x00,
0x00, 0x18, 0x00, 0x18, 0x00, 0x50, 0x00, 0x00,
0x00, 0xda, 0x00, 0xda, 0x00, 0x68, 0x00, 0x00,
0x00, 0x08, 0x00, 0x08, 0x00, 0x40, 0x00, 0x00,
0x00, 0x08, 0x00, 0x08, 0x00, 0x48, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x50, 0x00, 0x00,
0x00, 0x10, 0x00, 0x10, 0x00, 0x42, 0x01, 0x00,
0x00, 0x35, 0x82, 0x08, 0x60, 0x63, 0x00, 0x6f,
0x00, 0x63, 0x00, 0x6f, 0x00, 0x74, 0x00, 0x6f,
0x00, 0x74, 0x00, 0x6f, 0x00, 0x1a, 0x8a, 0xc2,
0xbc, 0x64, 0xda, 0xc0, 0x28, 0x9b, 0xa8, 0x14,
0x08, 0x51, 0x6d, 0xd6, 0xb8, 0x29, 0x09, 0xd2,
0x99, 0x19, 0x33, 0x70, 0x9e, 0x51, 0xa0, 0x6e,
0xc5, 0x39, 0x47, 0xf3, 0x9e, 0x96, 0x6a, 0xc3,
0xfc, 0xb2, 0xeb, 0xc7, 0xe0, 0x01, 0x01, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x45, 0x08,
0x32, 0xc7, 0x55, 0xd0, 0x01, 0x29, 0x09, 0xd2,
0x99, 0x19, 0x33, 0x70, 0x9e, 0x00, 0x00, 0x00,
0x00, 0x02, 0x00, 0x0e, 0x00, 0x53, 0x00, 0x49,
0x00, 0x52, 0x00, 0x41, 0x00, 0x44, 0x00, 0x45,
0x00, 0x4c, 0x00, 0x01, 0x00, 0x16, 0x00, 0x57,
0x00, 0x41, 0x00, 0x56, 0x00, 0x2d, 0x00, 0x47,
0x00, 0x4c, 0x00, 0x57, 0x00, 0x2d, 0x00, 0x30,
0x00, 0x30, 0x00, 0x39, 0x00, 0x04, 0x00, 0x1a,
0x00, 0x53, 0x00, 0x69, 0x00, 0x72, 0x00, 0x61,
0x00, 0x64, 0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e,
0x00, 0x6c, 0x00, 0x6f, 0x00, 0x63, 0x00, 0x61,
0x00, 0x6c, 0x00, 0x03, 0x00, 0x32, 0x00, 0x77,
0x00, 0x61, 0x00, 0x76, 0x00, 0x2d, 0x00, 0x67,
0x00, 0x6c, 0x00, 0x77, 0x00, 0x2d, 0x00, 0x30,
0x00, 0x30, 0x00, 0x39, 0x00, 0x2e, 0x00, 0x53,
0x00, 0x69, 0x00, 0x72, 0x00, 0x61, 0x00, 0x64,
0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c,
0x00, 0x6f, 0x00, 0x63, 0x00, 0x61, 0x00, 0x6c,
0x00, 0x05, 0x00, 0x1a, 0x00, 0x53, 0x00, 0x69,
0x00, 0x72, 0x00, 0x61, 0x00, 0x64, 0x00, 0x65,
0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f,
0x00, 0x63, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x07,
0x00, 0x08, 0x00, 0x56, 0x93, 0x34, 0x32, 0xc7,
0x55, 0xd0, 0x01, 0x00, 0x00, 0x00, 0x00, 0xbf,
0xec, 0xf5, 0xf6, 0x69, 0x01, 0x3a, 0xef, 0x5b,
0xd0, 0xab, 0xfe, 0x3f, 0xdf, 0x75, 0x30, 0xa3,
0x82, 0x00, 0xa0, 0x04, 0x82, 0x00, 0x9c, 0x01,
0x00, 0x00, 0x00, 0xc4, 0x0e, 0xcd, 0x96, 0x8f,
0x67, 0xc0, 0xdd, 0x00, 0x00, 0x00, 0x00, 0xcf,
0x88, 0xbd, 0x30, 0xe2, 0x53, 0x4a, 0x4b, 0x8d,
0x49, 0xd4, 0xe9, 0xa3, 0x63, 0x1f, 0xe8, 0x19,
0x59, 0xe6, 0x88, 0x96, 0xaa, 0x50, 0x35, 0x81,
0x02, 0x9a, 0x91, 0x25, 0x8b, 0x1c, 0x0f, 0x8f,
0xc6, 0x91, 0x44, 0x55, 0x5f, 0x4e, 0xd9, 0x1b,
0xc3, 0xae, 0x94, 0xde, 0x09, 0xa8, 0xdd, 0x80,
0x64, 0x52, 0x85, 0x4a, 0xf2, 0xd7, 0xc7, 0x11,
0x29, 0x22, 0xbe, 0xe5, 0xad, 0x57, 0x6b, 0x4f,
0xdc, 0xa1, 0xae, 0x00, 0x5b, 0xff, 0xe8, 0x6c,
0xdb, 0x15, 0x84, 0x18, 0x94, 0x0e, 0xeb, 0xcd,
0x9d, 0x41, 0xc3, 0x4e, 0xf6, 0xa6, 0xcf, 0x2c,
0xf5, 0xc5, 0x9e, 0xa0, 0xd9, 0x80, 0x5f, 0xaa,
0x22, 0x66, 0x61, 0x56, 0xde, 0x3e, 0xcb, 0x5f,
0x7c, 0x64, 0xaf, 0xbf, 0xa7, 0x26, 0x83, 0xa8,
0x5c, 0x88, 0xf3, 0xbe, 0x8a, 0xe6, 0xe6, 0x4c,
0xf7, 0x95, 0xd0, 0xa8, 0xf0, 0x8c, 0x21, 0xf8,
0x86, 0x77, 0x49, 0x29, 0xe3, 0xd3, 0xf8, 0x78,
0x1f, 0x51, 0x91 ]
pubKey = "\x30\x81\x89\x02\x81\x81\x00\x9e\x95\xb5\x41\x03\xc5\x33\xea\x29\x65\x2b\x65\xef\x30\x71\xdd\x73\xbb\x30\x3b\xec\xca\x72\xcf\xbd\xe0\xf8\x21\xff\xa6\x97\x76\xa1\x08\xb5\xd2\xc6\x95\x81\xd2\xba\x71\x10\x4a\xac\x25\x34\x37\xa0\xc3\x57\xf0\xea\x1f\x8c\x84\xeb\x7b\xe6\x6c\x50\x26\x1f\xb7\x41\x0a\x58\xd3\x80\x87\x3d\x0b\x41\xd9\xbc\x54\x3a\x0f\x77\x14\x79\xf5\xb9\xa4\x38\xeb\x13\x08\x35\xae\xbf\xb3\x17\x5a\xe2\x58\x89\x39\xc4\x22\x7f\x16\x57\x90\x08\xaf\x91\x3b\x95\xc8\x53\xd0\xc0\x8e\x19\x8a\xf3\x10\xbc\xc8\xc7\x42\xfb\x12\xde\x2d\x5e\x83\x02\x03\x01\x00\x01"
if __name__ == "__main__":
import cssp, hexdump
from rdpy.core.type import Stream
negotiate_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_1])))
challenge_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_2])))
authenticate_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_3])))
negotiate_data = cssp.getNegoTokens(negotiate_data_request)[0]
challenge_data = cssp.getNegoTokens(challenge_data_request)[0]
authenticate_data = cssp.getNegoTokens(authenticate_data_request)[0]
negotiate = NegotiateMessage()
negotiate_data.readType(negotiate)
challenge = ChallengeMessage()
challenge_data.readType(challenge)
ServerChallenge = challenge.ServerChallenge.value
ServerName = challenge.getTargetInfo()
authenticate = AuthenticateMessage()
authenticate_data.readType(authenticate)
NtChallengeResponse = authenticate.getNtChallengeResponse()
NTProofStr = NtChallengeResponse[:16]
temp = NtChallengeResponse[16:]
Time = temp[8:16]
ClientChallenge = temp[16:24]
ServerName2 = temp[28:-4]
LmChallengeResponse = authenticate.getLmChallengeResponse()
SessionBaseKey = authenticate.getEncryptedRandomSession()
encryptedPubKey = cssp.getPubKeyAuth(authenticate_data_request)
NtChallengeResponse2, LmChallengeResponse2, SessionBaseKey2 = NTLMv2Authenticate(None, "coco", "toto", "lolo", ServerChallenge, ServerName, Time, ClientChallenge)
KeyExchangeKey = HMAC_MD5(SessionBaseKey2, ServerChallenge + LmChallengeResponse[:7])
ExportedSessionKey = RC4K(KeyExchangeKey, SessionBaseKey)
sealingKey = MD5(ExportedSessionKey + "session key to client-to-server sealing key magic constant")
#sealingKey = MD5(sealingKey + "\x00" + "\x00" * 3)
encryptedPubKey2 = RC4K(sealingKey, pubKey)
hexdump.hexdump(encryptedPubKey)
print "\n"
hexdump.hexdump(encryptedPubKey2)
print "-"*40
print "NtChallengeResponse"
print "\n"
hexdump.hexdump(NtChallengeResponse)
print "\n"
hexdump.hexdump(NtChallengeResponse2)
print "-"*40
print "-"*40
print "LmChallengeResponse"
print "\n"
hexdump.hexdump(LmChallengeResponse)
print "\n"
hexdump.hexdump(LmChallengeResponse2)
print "-"*40
print "-"*40
print "SessionBaseKey"
print "\n"
hexdump.hexdump(SessionBaseKey)
print "\n"
hexdump.hexdump(SessionBaseKey2)
print "-"*40