UNPKG

tedious

Version:

A TDS driver, for connecting to MS SQLServer databases.

174 lines (149 loc) 5.38 kB
"use strict"; const WritableTrackingBuffer = require('./tracking-buffer/writable-tracking-buffer'); const crypto = require('crypto'); const BigInteger = require('big-number'); const hex = ['0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f']; class NTLMResponsePayload { constructor(loginData) { this.data = this.createResponse(loginData); } toString(indent = '') { return indent + 'NTLM Auth'; } createResponse(challenge) { const client_nonce = this.createClientNonce(); const lmv2len = 24; const ntlmv2len = 16; const domain = challenge.domain; const username = challenge.userName; const password = challenge.password; let ntlmData = challenge.ntlmpacket; const server_data = ntlmData.target; const server_nonce = ntlmData.nonce; const bufferLength = 64 + domain.length * 2 + username.length * 2 + lmv2len + ntlmv2len + 8 + 8 + 8 + 4 + server_data.length + 4; const data = new WritableTrackingBuffer(bufferLength); data.position = 0; data.writeString('NTLMSSP\u0000', 'utf8'); data.writeUInt32LE(0x03); const baseIdx = 64; const dnIdx = baseIdx; const unIdx = dnIdx + domain.length * 2; const l2Idx = unIdx + username.length * 2; const ntIdx = l2Idx + lmv2len; data.writeUInt16LE(lmv2len); data.writeUInt16LE(lmv2len); data.writeUInt32LE(l2Idx); data.writeUInt16LE(ntlmv2len); data.writeUInt16LE(ntlmv2len); data.writeUInt32LE(ntIdx); data.writeUInt16LE(domain.length * 2); data.writeUInt16LE(domain.length * 2); data.writeUInt32LE(dnIdx); data.writeUInt16LE(username.length * 2); data.writeUInt16LE(username.length * 2); data.writeUInt32LE(unIdx); data.writeUInt16LE(0); data.writeUInt16LE(0); data.writeUInt32LE(baseIdx); data.writeUInt16LE(0); data.writeUInt16LE(0); data.writeUInt32LE(baseIdx); data.writeUInt16LE(0x8201); data.writeUInt16LE(0x08); data.writeString(domain, 'ucs2'); data.writeString(username, 'ucs2'); const lmv2Data = this.lmv2Response(domain, username, password, server_nonce, client_nonce); data.copyFrom(lmv2Data); const genTime = new Date().getTime(); ntlmData = this.ntlmv2Response(domain, username, password, server_nonce, server_data, client_nonce, genTime); data.copyFrom(ntlmData); data.writeUInt32LE(0x0101); data.writeUInt32LE(0x0000); const timestamp = this.createTimestamp(genTime); data.copyFrom(timestamp); data.copyFrom(client_nonce); data.writeUInt32LE(0x0000); data.copyFrom(server_data); data.writeUInt32LE(0x0000); return data.data; } createClientNonce() { const client_nonce = Buffer.alloc(8, 0); let nidx = 0; while (nidx < 8) { client_nonce.writeUInt8(Math.ceil(Math.random() * 255), nidx); nidx++; } return client_nonce; } ntlmv2Response(domain, user, password, serverNonce, targetInfo, clientNonce, mytime) { const timestamp = this.createTimestamp(mytime); const hash = this.ntv2Hash(domain, user, password); const dataLength = 40 + targetInfo.length; const data = Buffer.alloc(dataLength, 0); serverNonce.copy(data, 0, 0, 8); data.writeUInt32LE(0x101, 8); data.writeUInt32LE(0x0, 12); timestamp.copy(data, 16, 0, 8); clientNonce.copy(data, 24, 0, 8); data.writeUInt32LE(0x0, 32); targetInfo.copy(data, 36, 0, targetInfo.length); data.writeUInt32LE(0x0, 36 + targetInfo.length); return this.hmacMD5(data, hash); } createTimestamp(time) { const tenthsOfAMicrosecond = BigInteger(time).plus(11644473600).multiply(10000000); const hexArray = []; let pair = []; while (tenthsOfAMicrosecond.val() !== '0') { const idx = tenthsOfAMicrosecond.mod(16); pair.unshift(hex[idx]); if (pair.length === 2) { hexArray.push(pair.join('')); pair = []; } } if (pair.length > 0) { hexArray.push(pair[0] + '0'); } return Buffer.from(hexArray.join(''), 'hex'); } lmv2Response(domain, user, password, serverNonce, clientNonce) { const hash = this.ntv2Hash(domain, user, password); const data = Buffer.alloc(serverNonce.length + clientNonce.length, 0); serverNonce.copy(data); clientNonce.copy(data, serverNonce.length, 0, clientNonce.length); const newhash = this.hmacMD5(data, hash); const response = Buffer.alloc(newhash.length + clientNonce.length, 0); newhash.copy(response); clientNonce.copy(response, newhash.length, 0, clientNonce.length); return response; } ntv2Hash(domain, user, password) { const hash = this.ntHash(password); const identity = Buffer.from(user.toUpperCase() + domain.toUpperCase(), 'ucs2'); return this.hmacMD5(identity, hash); } ntHash(text) { const hash = Buffer.alloc(21, 0); const unicodeString = Buffer.from(text, 'ucs2'); const md4 = crypto.createHash('md4').update(unicodeString).digest(); if (md4.copy) { md4.copy(hash); } else { Buffer.from(md4).copy(hash); } return hash; } hmacMD5(data, key) { const hmac = crypto.createHmac('MD5', key); hmac.update(data); const result = hmac.digest(); if (result.copy) { return result; } else { return Buffer.from(result).slice(0, 16); } } } module.exports = NTLMResponsePayload;