NTLMCryptography.cs 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Globalization;
  10. using System.Reflection;
  11. using System.Security.Cryptography;
  12. using System.Text;
  13. using Utilities;
  14. namespace SMBLibrary.Authentication.NTLM
  15. {
  16. public class NTLMCryptography
  17. {
  18. public static byte[] ComputeLMv1Response(byte[] challenge, string password)
  19. {
  20. byte[] hash = LMOWFv1(password);
  21. return DesLongEncrypt(hash, challenge);
  22. }
  23. public static byte[] ComputeNTLMv1Response(byte[] challenge, string password)
  24. {
  25. byte[] hash = NTOWFv1(password);
  26. return DesLongEncrypt(hash, challenge);
  27. }
  28. public static byte[] ComputeNTLMv1ExtendedSessionSecurityResponse(byte[] serverChallenge, byte[] clientChallenge, string password)
  29. {
  30. byte[] passwordHash = NTOWFv1(password);
  31. byte[] challengeHash = MD5.Create().ComputeHash(ByteUtils.Concatenate(serverChallenge, clientChallenge));
  32. byte[] challengeHashShort = new byte[8];
  33. Array.Copy(challengeHash, 0, challengeHashShort, 0, 8);
  34. return DesLongEncrypt(passwordHash, challengeHashShort);
  35. }
  36. public static byte[] ComputeLMv2Response(byte[] serverChallenge, byte[] clientChallenge, string password, string user, string domain)
  37. {
  38. byte[] key = LMOWFv2(password, user, domain);
  39. byte[] bytes = ByteUtils.Concatenate(serverChallenge, clientChallenge);
  40. HMACMD5 hmac = new HMACMD5(key);
  41. byte[] hash = hmac.ComputeHash(bytes, 0, bytes.Length);
  42. return ByteUtils.Concatenate(hash, clientChallenge);
  43. }
  44. /// <summary>
  45. /// [MS-NLMP] https://msdn.microsoft.com/en-us/library/cc236700.aspx
  46. /// </summary>
  47. /// <param name="clientChallengeStructurePadded">ClientChallengeStructure with 4 zero bytes padding, a.k.a. temp</param>
  48. public static byte[] ComputeNTLMv2Proof(byte[] serverChallenge, byte[] clientChallengeStructurePadded, string password, string user, string domain)
  49. {
  50. byte[] key = NTOWFv2(password, user, domain);
  51. byte[] temp = clientChallengeStructurePadded;
  52. HMACMD5 hmac = new HMACMD5(key);
  53. byte[] _NTProof = hmac.ComputeHash(ByteUtils.Concatenate(serverChallenge, temp), 0, serverChallenge.Length + temp.Length);
  54. return _NTProof;
  55. }
  56. public static byte[] DesEncrypt(byte[] key, byte[] plainText)
  57. {
  58. return DesEncrypt(key, plainText, 0, plainText.Length);
  59. }
  60. public static byte[] DesEncrypt(byte[] key, byte[] plainText, int inputOffset, int inputCount)
  61. {
  62. ICryptoTransform encryptor = CreateWeakDesEncryptor(CipherMode.ECB, key, new byte[key.Length]);
  63. byte[] result = new byte[inputCount];
  64. encryptor.TransformBlock(plainText, inputOffset, inputCount, result, 0);
  65. return result;
  66. }
  67. public static ICryptoTransform CreateWeakDesEncryptor(CipherMode mode, byte[] rgbKey, byte[] rgbIV)
  68. {
  69. DES des = DES.Create();
  70. des.Mode = mode;
  71. DESCryptoServiceProvider sm = des as DESCryptoServiceProvider;
  72. MethodInfo mi = sm.GetType().GetMethod("_NewEncryptor", BindingFlags.NonPublic | BindingFlags.Instance);
  73. object[] Par = { rgbKey, mode, rgbIV, sm.FeedbackSize, 0 };
  74. ICryptoTransform trans = mi.Invoke(sm, Par) as ICryptoTransform;
  75. return trans;
  76. }
  77. /// <summary>
  78. /// DESL()
  79. /// </summary>
  80. public static byte[] DesLongEncrypt(byte[] key, byte[] plainText)
  81. {
  82. if (key.Length != 16)
  83. {
  84. throw new ArgumentException("Invalid key length");
  85. }
  86. if (plainText.Length != 8)
  87. {
  88. throw new ArgumentException("Invalid plain-text length");
  89. }
  90. byte[] padded = new byte[21];
  91. Array.Copy(key, padded, key.Length);
  92. byte[] k1 = new byte[7];
  93. byte[] k2 = new byte[7];
  94. byte[] k3 = new byte[7];
  95. Array.Copy(padded, 0, k1, 0, 7);
  96. Array.Copy(padded, 7, k2, 0, 7);
  97. Array.Copy(padded, 14, k3, 0, 7);
  98. byte[] r1 = DesEncrypt(ExtendDESKey(k1), plainText);
  99. byte[] r2 = DesEncrypt(ExtendDESKey(k2), plainText);
  100. byte[] r3 = DesEncrypt(ExtendDESKey(k3), plainText);
  101. byte[] result = new byte[24];
  102. Array.Copy(r1, 0, result, 0, 8);
  103. Array.Copy(r2, 0, result, 8, 8);
  104. Array.Copy(r3, 0, result, 16, 8);
  105. return result;
  106. }
  107. public static Encoding GetOEMEncoding()
  108. {
  109. return Encoding.GetEncoding(CultureInfo.CurrentCulture.TextInfo.OEMCodePage);
  110. }
  111. /// <summary>
  112. /// LM Hash
  113. /// </summary>
  114. public static byte[] LMOWFv1(string password)
  115. {
  116. byte[] plainText = ASCIIEncoding.ASCII.GetBytes("KGS!@#$%");
  117. byte[] passwordBytes = GetOEMEncoding().GetBytes(password.ToUpper());
  118. byte[] key = new byte[14];
  119. Array.Copy(passwordBytes, key, Math.Min(passwordBytes.Length, 14));
  120. byte[] k1 = new byte[7];
  121. byte[] k2 = new byte[7];
  122. Array.Copy(key, 0, k1, 0, 7);
  123. Array.Copy(key, 7, k2, 0, 7);
  124. byte[] part1 = DesEncrypt(ExtendDESKey(k1), plainText);
  125. byte[] part2 = DesEncrypt(ExtendDESKey(k2), plainText);
  126. return ByteUtils.Concatenate(part1, part2);
  127. }
  128. /// <summary>
  129. /// NTLM hash (NT hash)
  130. /// </summary>
  131. public static byte[] NTOWFv1(string password)
  132. {
  133. byte[] passwordBytes = UnicodeEncoding.Unicode.GetBytes(password);
  134. return new MD4().GetByteHashFromBytes(passwordBytes);
  135. }
  136. /// <summary>
  137. /// LMOWFv2 is identical to NTOWFv2
  138. /// </summary>
  139. public static byte[] LMOWFv2(string password, string user, string domain)
  140. {
  141. return NTOWFv2(password, user, domain);
  142. }
  143. public static byte[] NTOWFv2(string password, string user, string domain)
  144. {
  145. byte[] passwordBytes = UnicodeEncoding.Unicode.GetBytes(password);
  146. byte[] key = new MD4().GetByteHashFromBytes(passwordBytes);
  147. string text = user.ToUpper() + domain;
  148. byte[] bytes = UnicodeEncoding.Unicode.GetBytes(text);
  149. HMACMD5 hmac = new HMACMD5(key);
  150. return hmac.ComputeHash(bytes, 0, bytes.Length);
  151. }
  152. /// <summary>
  153. /// Extends a 7-byte key into an 8-byte key.
  154. /// Note: The DES key ostensibly consists of 64 bits, however, only 56 of these are actually used by the algorithm.
  155. /// Eight bits are used solely for checking parity, and are thereafter discarded
  156. /// </summary>
  157. private static byte[] ExtendDESKey(byte[] key)
  158. {
  159. byte[] result = new byte[8];
  160. int i;
  161. result[0] = (byte)((key[0] >> 1) & 0xff);
  162. result[1] = (byte)((((key[0] & 0x01) << 6) | (((key[1] & 0xff) >> 2) & 0xff)) & 0xff);
  163. result[2] = (byte)((((key[1] & 0x03) << 5) | (((key[2] & 0xff) >> 3) & 0xff)) & 0xff);
  164. result[3] = (byte)((((key[2] & 0x07) << 4) | (((key[3] & 0xff) >> 4) & 0xff)) & 0xff);
  165. result[4] = (byte)((((key[3] & 0x0F) << 3) | (((key[4] & 0xff) >> 5) & 0xff)) & 0xff);
  166. result[5] = (byte)((((key[4] & 0x1F) << 2) | (((key[5] & 0xff) >> 6) & 0xff)) & 0xff);
  167. result[6] = (byte)((((key[5] & 0x3F) << 1) | (((key[6] & 0xff) >> 7) & 0xff)) & 0xff);
  168. result[7] = (byte)(key[6] & 0x7F);
  169. for (i = 0; i < 8; i++)
  170. {
  171. result[i] = (byte)(result[i] << 1);
  172. }
  173. return result;
  174. }
  175. /// <summary>
  176. /// [MS-NLMP] 3.4.5.1 - KXKEY - NTLM v1
  177. /// </summary>
  178. /// <remarks>
  179. /// If NTLM v2 is used, KeyExchangeKey MUST be set to the value of SessionBaseKey.
  180. /// </remarks>
  181. public static byte[] KXKey(byte[] sessionBaseKey, NegotiateFlags negotiateFlags, byte[] lmChallengeResponse, byte[] serverChallenge, byte[] lmowf)
  182. {
  183. if ((negotiateFlags & NegotiateFlags.ExtendedSessionSecurity) == 0)
  184. {
  185. if ((negotiateFlags & NegotiateFlags.LanManagerSessionKey) > 0)
  186. {
  187. byte[] k1 = ByteReader.ReadBytes(lmowf, 0, 7);
  188. byte[] k2 = ByteUtils.Concatenate(ByteReader.ReadBytes(lmowf, 7, 1), new byte[] { 0xBD, 0xBD, 0xBD, 0xBD, 0xBD, 0xBD });
  189. byte[] temp1 = DesEncrypt(ExtendDESKey(k1), ByteReader.ReadBytes(lmChallengeResponse, 0, 8));
  190. byte[] temp2 = DesEncrypt(ExtendDESKey(k2), ByteReader.ReadBytes(lmChallengeResponse, 0, 8));
  191. byte[] keyExchangeKey = ByteUtils.Concatenate(temp1, temp2);
  192. return keyExchangeKey;
  193. }
  194. else
  195. {
  196. if ((negotiateFlags & NegotiateFlags.RequestLMSessionKey) > 0)
  197. {
  198. byte[] keyExchangeKey = ByteUtils.Concatenate(ByteReader.ReadBytes(lmowf, 0, 8), new byte[8]);
  199. return keyExchangeKey;
  200. }
  201. else
  202. {
  203. return sessionBaseKey;
  204. }
  205. }
  206. }
  207. else
  208. {
  209. byte[] buffer = ByteUtils.Concatenate(serverChallenge, ByteReader.ReadBytes(lmChallengeResponse, 0, 8));
  210. byte[] keyExchangeKey = new HMACMD5(sessionBaseKey).ComputeHash(buffer);
  211. return keyExchangeKey;
  212. }
  213. }
  214. }
  215. }