
Nmap Development mailing list archives
Re: [NSE] Script Submission: NTLM Information Disclosure (MS-SQL, SMTP, IMAP, POP3, Telnet, NNTP)
From: Daniel Miller <bonsaiviking () gmail com>
Date: Wed, 23 Apr 2014 12:49:54 -0500
On 04/23/2014 11:16 AM, NMap User1 wrote:
Hello, Expanding on the http-ntlm-info script, attached are six additional scripts that support this enumeration method among other common protocols that support NTLM authentication. In summary, if NTLM authentication is enabled, by sending a NTLM authentication request with null domain and user credentials, the remote service will respond with a NTLMSSP message and disclose information including NetBIOS, DNS, and OS build version. No log entry is created. The attached scripts include the following services: * MS-SQL * SMTP * IMAP * POP3 * Telnet * NNTP Similar to the HTTP NTLM information disclosure script, these function with identical/consistent behavior and output. As an example, below demonstrates usage of the MS-SQL script: #nmap -p1433 1.2.3.4 --script ms-sql-ntlm-info Nmap scan report for 1.2.3.4 Host is up (0.040s latency). PORT STATE SERVICE VERSION 1433/tcp open ms-sql-s | ms-sql-ntlm-info: | Target_Name: ACTIVESQL | NetBIOS_Domain_Name: ACTIVESQL | NetBIOS_Computer_Name: DB-TEST2 | DNS_Domain_Name: somedomain.com | DNS_Computer_Name: db-test2.somedomain.com | DNS_Tree_Name: somedomain.com |_ Product_Version: 6.1 (Build 7601) Below demonstrates SMTP: #nmap -p25 1.2.3.4 --script smtp-ntlm-info Nmap scan report for 1.2.3.4 Host is up (0.10s latency). PORT STATE SERVICE VERSION 25/tcp open smtp | smtp-ntlm-info: | Target_Name: ACTIVESMTP | NetBIOS_Domain_Name: ACTIVESMTP | NetBIOS_Computer_Name: SMTP-TEST2 | DNS_Domain_Name: somedomain.com | DNS_Computer_Name: smtp-test2.somedomain.com | DNS_Tree_Name: somedomain.com |_ Product_Version: 5.2 (Build 3790) Other protocols (e.g. IMAP, POP3, Telnet, NNTP) have similar implementation: --script [proto]-ntlm-info. These scripts have been tested against all current/past versions of their respective Microsoft services and have been classified as 'default' as they are non-malicious and no log entries are created. Just let me know if there are questions. If these scripts should be submitted individually to the mailing list, let me know. Cheers, Justin _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Justin,These look really neat, and I'm sure we can integrate them somehow. Do you think that it would be possible to combine them into one script that just handles the pre-NTLM protocol handshaking depending on the service, then does the NTLM information gathering on its own? Take a look at how sslcert library (http://nmap.org/nsedoc/lib/sslcert.html) does things with the SPECIALIZED_PREPARE_TLS and StartTLS tables, for instance. Just a thought for now, since I haven't had time to take a closer look yet.
Dan _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] Script Submission: NTLM Information Disclosure (MS-SQL, SMTP, IMAP, POP3, Telnet, NNTP) NMap User1 (Apr 23)
- Re: [NSE] Script Submission: NTLM Information Disclosure (MS-SQL, SMTP, IMAP, POP3, Telnet, NNTP) Daniel Miller (Apr 23)