I've been playing with trying to determine if there is a way to take
advantage of the many NBNS Name Query requests that are sent to the
broadcast address.  Specifically, I want to be able respond and redirect
these hosts to the attacker's box to perform attacks similar to smb_relay.
See this scenario:

Victor attempts to mount a share on \\notreal.  In an AD environment,
Windows:
1) issues DNS requests for notreal.sub.domain.tld; DNS server responds it
doesn't exist
2) issues DNS requests for notreal.domain.tld; DNS server responds it
doesn't exist
3) issues NBNS request to the the NB name server; NBNS gives response that
it doesn't exist
4) issues a request to broadcast (n.n.n.255), which would go unanswered in a
normal environment

Question 4 is what I'm trying to answer and elicit an SMB request to
metasploit.  When you spoof a response and Victor is looking to make an HTTP
connection, it immediately issues a GET to the IP address from the spoofed
response, as I expected.

However, when Victor wants to make an SMB connection, his PC issues an
NBSTAT request to the IP:137, which metasploit/linux has no idea what to do
with, and responds with an ICMP Type 3 Port Unreachable message.

Questions:
1) What causes Victor to issue an NBSTAT request?  Is it something wrong in
my spoofed response packet, perhaps?  (When Victor opens an SMB connection
to \\ip.add.res, it immediately performs an SMB connect to :139; no NBSTAT
to 137 is performed.)  I've examined my spoofed response and can't see
anything that would be kicking off an NBSTAT request, but I may be missing
something.
2) Anyone know if it's possible to answer 4) in such a way that Victor will
skip the NBSTAT request?
3) Is it possible to answer 4) with an NBSTAT response that will elicit a
Negotiate Protocol Request to :139 or :445?

Thanks very much for any help you can provide!  I'm sure there's good
documentation out there on this, but it's apparently hidden in the mounds
and mounds of trash from 20 years of SMB protocol development.
N
_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to