rapid7/ruby_smb

View on GitHub
lib/ruby_smb/client/authentication.rb

Summary

Maintainability
C
1 day
Test Coverage
require 'ruby_smb/peer_info'

module RubySMB
  class Client
    # This module holds all the backend client methods for authentication.
    module Authentication
      include RubySMB::PeerInfo

      # Responsible for handling Authentication and Session Setup for
      # the SMB Client. It returns the final Status code from the authentication
      # exchange.
      #
      # @return [WindowsError::NTStatus] the NTStatus object from the SessionSetup exchange.
      def authenticate
        if smb1
          if username.empty? && password.empty?
            smb1_anonymous_auth
          else
            smb1_authenticate
          end
        else
          smb2_authenticate
        end
      end

      #
      # SMB1 Methods
      #

      # Attempts an Anonymous logon to the remote server.
      #
      # @return [WindowsError::ErrorCode] the status code the server returned
      def smb1_anonymous_auth
        request       = smb1_anonymous_auth_request
        raw_response  = send_recv(request)
        response      = smb1_anonymous_auth_response(raw_response)
        response_code = response.status_code

        if response_code == WindowsError::NTStatus::STATUS_SUCCESS
          self.user_id = response.smb_header.uid
          self.peer_native_os = response.data_block.native_os.to_s
          self.peer_native_lm = response.data_block.native_lan_man.to_s
          self.primary_domain = response.data_block.primary_domain.to_s
        end

        response_code
      end

      # Creates a {SessionSetupRequest} for an anonymous
      # access session.
      def smb1_anonymous_auth_request
        packet = RubySMB::SMB1::Packet::SessionSetupLegacyRequest.new
        packet.data_block.oem_password = "\x00"
        packet.parameter_block.max_buffer_size = self.max_buffer_size
        packet.parameter_block.max_mpx_count = 50
        packet.parameter_block.capabilities.extended_security = 0
        packet
      end

      def smb1_anonymous_auth_response(raw_response)
        packet = RubySMB::SMB1::Packet::SessionSetupLegacyResponse.read(raw_response)

        unless packet.valid?
          raise RubySMB::Error::InvalidPacket.new(
            expected_proto: RubySMB::SMB1::SMB_PROTOCOL_ID,
            expected_cmd:   RubySMB::SMB1::Packet::SessionSetupLegacyResponse::COMMAND,
            packet:         packet
          )
        end
        packet
      end

      # Handles the SMB1 NTLMSSP 4-way handshake for Authentication and store
      # information about the peer/server.
      def smb1_authenticate
        response = smb1_ntlmssp_negotiate
        challenge_packet = smb1_ntlmssp_challenge_packet(response)

        # Store the available OS information before going forward.
        @peer_native_os = challenge_packet.data_block.native_os.to_s
        @peer_native_lm = challenge_packet.data_block.native_lan_man.to_s

        user_id = challenge_packet.smb_header.uid
        type2_b64_message = smb1_type2_message(challenge_packet)
        type3_message = @ntlm_client.init_context(type2_b64_message)

        @application_key = @session_key = @ntlm_client.session_key
        challenge_message = @ntlm_client.session.challenge_message
        store_target_info(challenge_message.target_info) if challenge_message.has_flag?(:TARGET_INFO)
        @os_version = extract_os_version(challenge_message.os_version.to_s) unless challenge_message.os_version.empty?

        raw = smb1_ntlmssp_authenticate(type3_message, user_id)
        response = smb1_ntlmssp_final_packet(raw)
        response_code = response.status_code

        @user_id = user_id if response_code == WindowsError::NTStatus::STATUS_SUCCESS

        response_code
      end

      # Sends the {RubySMB::SMB1::Packet::SessionSetupRequest} packet and
      # receives the response.
      #
      # @return [String] the binary string response from the server
      def smb1_ntlmssp_negotiate
        packet = smb1_ntlmssp_negotiate_packet
        send_recv(packet)
      end

      # Takes the NTLM Type 3 (authenticate) message and calls the routines to
      # build the Auth packet, sends the packet and receives the raw response.
      #
      # @param type3_message [String] the NTLM Type 3 message
      # @param user_id [Integer] the temporary user ID from the Type 2 response
      # @return [String] the raw binary response from the server
      def smb1_ntlmssp_authenticate(type3_message, user_id)
        packet = smb1_ntlmssp_auth_packet(type3_message, user_id)
        send_recv(packet)
      end

      # Generates the {RubySMB::SMB1::Packet::SessionSetupRequest} packet
      # with the NTLM Type 3 (Auth) message in the security_blob field.
      #
      # @param type3_message [String] the NTLM Type 3 message
      # @param user_id [Integer] the temporary user ID from the Type 2 response
      # @return [RubySMB::SMB1::Packet::SessionSetupRequest] the second authentication packet to send
      def smb1_ntlmssp_auth_packet(type3_message, user_id)
        packet = RubySMB::SMB1::Packet::SessionSetupRequest.new
        packet.smb_header.uid = user_id
        packet.set_type3_blob(type3_message.serialize)
        packet.parameter_block.max_buffer_size = self.max_buffer_size
        packet.parameter_block.max_mpx_count = 50
        packet.smb_header.flags2.extended_security = 1
        packet
      end

      # Creates the {RubySMB::SMB1::Packet::SessionSetupRequest} packet
      # for the first part of the NTLMSSP 4-way hnadshake. This packet
      # initializes negotiations for the NTLMSSP authentication
      #
      # @return [RubySMB::SMB1::Packet::SessionSetupRequest] the first authentication packet to send
      def smb1_ntlmssp_negotiate_packet
        type1_message = ntlm_client.init_context
        packet = RubySMB::SMB1::Packet::SessionSetupRequest.new
        packet.set_type1_blob(type1_message.serialize)
        packet.parameter_block.max_buffer_size = self.max_buffer_size
        packet.parameter_block.max_mpx_count = 50
        packet.smb_header.flags2.extended_security = 1
        packet
      end

      # Takes the raw binary string and returns a {RubySMB::SMB1::Packet::SessionSetupResponse}
      def smb1_session_setup_response(raw_response)
        packet = RubySMB::SMB1::Packet::SessionSetupResponse.read(raw_response)

        unless packet.valid?
          raise RubySMB::Error::InvalidPacket.new(
            expected_proto: RubySMB::SMB1::SMB_PROTOCOL_ID,
            expected_cmd:   RubySMB::SMB1::Packet::SessionSetupResponse::COMMAND,
            packet:         packet
          )
        end
        packet
      end

      # Takes the raw binary string and returns a {RubySMB::SMB1::Packet::SessionSetupResponse}
      def smb1_ntlmssp_final_packet(raw_response)
        smb1_session_setup_response(raw_response)
      end

      # Takes the raw binary string and returns a {RubySMB::SMB1::Packet::SessionSetupResponse}
      def smb1_ntlmssp_challenge_packet(raw_response)
        packet = RubySMB::SMB1::Packet::SessionSetupResponse.read(raw_response)
        unless packet.valid?
          raise RubySMB::Error::InvalidPacket.new(
            expected_proto: RubySMB::SMB1::SMB_PROTOCOL_ID,
            expected_cmd:   RubySMB::SMB1::Packet::SessionSetupResponse::COMMAND,
            packet:         packet
          )
        end

        status_code = packet.status_code
        unless status_code.name == 'STATUS_MORE_PROCESSING_REQUIRED'
          raise RubySMB::Error::UnexpectedStatusCode, status_code
        end

        packet
      end

      # Parses out the NTLM Type 2 Message from a {RubySMB::SMB1::Packet::SessionSetupResponse}
      #
      # @param response_packet [RubySMB::SMB1::Packet::SessionSetupResponse] the response packet to get the NTLM challenge from
      # @return [String] the base64 encoded  NTLM Challenge (Type2 Message) from the response
      def smb1_type2_message(response_packet)
        sec_blob = response_packet.data_block.security_blob
        ntlmssp_offset = sec_blob.index('NTLMSSP')
        type2_blob = sec_blob.slice(ntlmssp_offset..-1)
        [type2_blob].pack('m')
      end

      #
      # SMB 2 Methods
      #

      # Handles the SMB2 NTLMSSP 4-way handshake for Authentication and store
      # information about the peer/server.
      def smb2_authenticate
        response = smb2_ntlmssp_negotiate
        challenge_packet = smb2_ntlmssp_challenge_packet(response)
        if @dialect == '0x0311'
          update_preauth_hash(challenge_packet)
        end
        @session_id = challenge_packet.smb2_header.session_id
        type2_b64_message = smb2_type2_message(challenge_packet)
        type3_message = @ntlm_client.init_context(type2_b64_message)

        @application_key = @session_key = @ntlm_client.session_key
        challenge_message = ntlm_client.session.challenge_message
        store_target_info(challenge_message.target_info) if challenge_message.has_flag?(:TARGET_INFO)
        @os_version = extract_os_version(challenge_message.os_version.to_s) unless challenge_message.os_version.empty?

        raw = smb2_ntlmssp_authenticate(type3_message, @session_id)
        response = smb2_ntlmssp_final_packet(raw)
        @session_is_guest = response.session_flags.guest == 1

        if @smb3
          if response.session_flags.encrypt_data == 1
            # if the server indicates that encryption is required, enable it
            @session_encrypt_data = true
          elsif (@session_is_guest && password != '') || (username == '' && password == '')
            # disable encryption when necessary
            @session_encrypt_data = false
          end

          # see: https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-smb2/7fd079ca-17e6-4f02-8449-46b606ea289c
          if @dialect == '0x0300' || @dialect == '0x0302'
            @application_key = RubySMB::Crypto::KDF.counter_mode(
              @session_key,
              "SMB2APP\x00",
              "SmbRpc\x00"
            )
          else
            @application_key = RubySMB::Crypto::KDF.counter_mode(
              @session_key,
              "SMBAppKey\x00",
              @preauth_integrity_hash_value
            )
          end
          # otherwise, leave encryption to the default value that it was initialized to
        end
        ######
        # DEBUG
        #puts "Session ID = #{@session_id.to_binary_s.each_byte.map {|e| '%02x' % e}.join}"
        #puts "Session key = #{@session_key.each_byte.map {|e| '%02x' % e}.join}"
        #puts "PreAuthHash = #{@preauth_integrity_hash_value.each_byte.map {|e| '%02x' % e}.join}" if @preauth_integrity_hash_value
        ######

        response.status_code
      end

      # Takes the raw binary string and returns a {RubySMB::SMB2::Packet::SessionSetupResponse}
      def smb2_session_setup_response(raw_response)
        packet = RubySMB::SMB2::Packet::SessionSetupResponse.read(raw_response)
        unless packet.valid?
          raise RubySMB::Error::InvalidPacket.new(
            expected_proto: RubySMB::SMB2::SMB2_PROTOCOL_ID,
            expected_cmd:   RubySMB::SMB2::Packet::SessionSetupResponse::COMMAND,
            packet:         packet
          )
        end

        packet
      end

      # Takes the raw binary string and returns a {RubySMB::SMB2::Packet::SessionSetupResponse}
      def smb2_ntlmssp_final_packet(raw_response)
        smb2_session_setup_response(raw_response)
      end

      # Takes the raw binary string and returns a {RubySMB::SMB2::Packet::SessionSetupResponse}
      def smb2_ntlmssp_challenge_packet(raw_response)
        packet = RubySMB::SMB2::Packet::SessionSetupResponse.read(raw_response)
        unless packet.valid?
          raise RubySMB::Error::InvalidPacket.new(
            expected_proto: RubySMB::SMB2::SMB2_PROTOCOL_ID,
            expected_cmd:   RubySMB::SMB2::Packet::SessionSetupResponse::COMMAND,
            packet:         packet
          )
        end

        status_code = packet.status_code
        unless status_code.name == 'STATUS_MORE_PROCESSING_REQUIRED'
          raise RubySMB::Error::UnexpectedStatusCode, status_code
        end
        packet
      end

      # Sends the {RubySMB::SMB2::Packet::SessionSetupRequest} packet and
      # receives the response.
      #
      # @return [String] the binary string response from the server
      def smb2_ntlmssp_negotiate
        packet = smb2_ntlmssp_negotiate_packet
        response = send_recv(packet)
        if @dialect == '0x0311'
          update_preauth_hash(packet)
        end
        response
      end

      # Creates the {RubySMB::SMB2::Packet::SessionSetupRequest} packet
      # for the first part of the NTLMSSP 4-way handshake. This packet
      # initializes negotiations for the NTLMSSP authentication
      #
      # @return [RubySMB::SMB2::Packet::SessionSetupRequest] the first authentication packet to send
      def smb2_ntlmssp_negotiate_packet
        type1_message = ntlm_client.init_context
        packet = RubySMB::SMB2::Packet::SessionSetupRequest.new
        packet.set_type1_blob(type1_message.serialize)
        packet.security_mode.signing_enabled = 1
        packet
      end

      # Parses out the NTLM Type 2 Message from a {RubySMB::SMB2::Packet::SessionSetupResponse}
      #
      # @param response_packet [RubySMB::SMB2::Packet::SessionSetupResponse] the response packet to get the NTLM challenge from
      # @return [String] the base64 encoded  NTLM Challenge (Type2 Message) from the response
      def smb2_type2_message(response_packet)
        sec_blob = response_packet.buffer
        ntlmssp_offset = sec_blob.index('NTLMSSP')
        type2_blob = sec_blob.slice(ntlmssp_offset..-1)
        [type2_blob].pack('m')
      end

      # Takes the NTLM Type 3 (authenticate) message and calls the routines to
      # build the Auth packet, sends the packet and receives the raw response.
      #
      # @param type3_message [String] the NTLM Type 3 message
      # @param user_id [Integer] the temporary user ID from the Type 2 response
      # @return [String] the raw binary response from the server
      def smb2_ntlmssp_authenticate(type3_message, user_id)
        packet = smb2_ntlmssp_auth_packet(type3_message, user_id)
        response = send_recv(packet)
        if @dialect == '0x0311'
          update_preauth_hash(packet)
        end
        response
      end

      # Generates the {RubySMB::SMB2::Packet::SessionSetupRequest} packet
      # with the NTLM Type 3 (Auth) message in the security_blob field.
      #
      # @param type3_message [String] the NTLM Type 3 message
      # @param session_id [Integer] the temporary session id from the Type 2 response
      # @return [RubySMB::SMB2::Packet::SessionSetupRequest] the second authentication packet to send
      def smb2_ntlmssp_auth_packet(type3_message, session_id)
        packet = RubySMB::SMB2::Packet::SessionSetupRequest.new
        packet.smb2_header.session_id = session_id
        packet.set_type3_blob(type3_message.serialize)
        packet.security_mode.signing_enabled = 1
        packet
      end
    end
  end
end