Rapid7 Vulnerability & Exploit Database

NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)

Back to Search

NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)

Disclosed
06/14/2016
Created
05/30/2018

Description

This module listens for a NetBIOS name request and then continuously spams NetBIOS responses to a target for given hostname, causing the target to cache a malicious address for this name. On high-speed networks, the PPSRATE value should be increased to speed up this attack. As an example, a value of around 30,000 is almost 100% successful when spoofing a response for a 'WPAD' lookup. Distant targets may require more time and lower rates for a successful attack. This module works when the target is behind a NAT gateway, since the stream of NetBIOS responses will keep the NAT mapping alive after the initial setup. To trigger the initial NetBIOS request to the Metasploit system, force the target to access a UNC link pointing to the same address (HTML, Office attachment, etc). This NAT-piercing issue was named the 'BadTunnel' vulnerability by the discoverer, Yu Yang (@tombkeeper). The Microsoft patches (MS16-063/MS16-077) impact the way that the proxy host (WPAD) host is identified, but do change the predictability of NetBIOS requests.

Author(s)

  • vvalien
  • hdm <x@hdm.io>
  • tombkeeper

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/server/netbios_spoof_nat
msf auxiliary(netbios_spoof_nat) > show actions
    ...actions...
msf auxiliary(netbios_spoof_nat) > set ACTION < action-name >
msf auxiliary(netbios_spoof_nat) > show options
    ...show and set options...
msf auxiliary(netbios_spoof_nat) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;