Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
On a recent gig I was hit with hundreds of hosts running a service on port TCP 5405, the NetSupport remote management application. Running a version port scan on them revealed nothing more than:
5405/tcp open netsupport NetSupport PC remote control (Name: HOSTNAME)
The version scan didn't reveal anything apart from the hostname. Connecting to the port with Netcat just returned the hostname.
Looking at the known vulnerabilities associated with the service, the most notable was a buffer overflow Not wanting to potentially cause disruption to hundreds of clients running the exploit against all of them I needed to find the version of the software running and also see if any of the hosts could be taken over using no authentication, for the quick win.
A quick search around revealed there wasn't many free tools available to perform such checks.
Downloading an evaluation copy of the software from NetSupport's website revealed the software provided its own proprietary scripting language (which looked a bit like VBScript) to help automate tasks. Although I couldn't find any manuals on using the scripting language, the examples provided with the software gave enough information to mash up a script to find all clients running the NetSupport client, check their version and check if authentication was required. This was all I needed for the time being.
The following was written locally and tested before running using the evaluation software:
Print "NetSupport Manager Script to find clients and get their version numbers"// Set the transport protocol to use SetTransport(T_TCPIP)// Declares the variables used in the main functionDim ClientDim ClientlistDim CountDim MaskDim MajorVersion, MinorVersion// Starts the count to equal 0Count = 0 // Performs a network browse for all available Clients Client = Lookup(Mask, Clientlist) // This will run the below condition for each client found in the browse For each Client in Clientlist // Error checks the connection to the Client If Connect(CLIENT) = FALSE then Print " " Print "Could not connect to: - " Print Client Wait(0.2) Else Print " " Print "You have successfully connected to Client: - ", Client // Do some stuff while connected If GetClientVersion (MajorVersion, MinorVersion) then Print "Client ", CurrentClient (), " is running NetSupport version ", MajorVersion, ".", MinorVersion endif Wait (0.2)// Checks if the disconnect from the Client machine worked or not If disconnect(Client) = FALSE then Print " " Print " Could not disconnect to " Print Client Wait(0.2) Else Print "You have successfully disconnected from Client: -", Client Wait(0.2) Endif Endif Count = Count + 1 Next // Informs you if no Client machines were found in the lookup If Count = 0 then Print " " Print "No Clients were found in the lookup!" Wait (0.2) Else Print " " Print "The number of Clients found was ", Count Wait(0.2) Endif
The results of the script are stored in the corresponding log file with the same name as the SCP file.
A typical response for hosts that require no authentication when a successful connection is made would be:
You have successfully connected to Client: - HOSTNAME|>192.168.1.110:5405 (HOSTNAME)Retrieving client versionRetrieving default client nameClient HOSTNAME is running NetSupport version 12.0Disconnecting from client 'HOSTNAME|>192.168.1.110:5405 (HOSTNAME)'You have successfully disconnected from Client: -HOSTNAME|>192.168.1.110:5405 (HOSTNAME) The number of Clients found was 10
For hosts configured with authentication whereby a password was required before connection, a typical response would be:
NetSupport Manager Script to find clients and get their version numbersSetting a new default network transportSearching network for clientsConnecting to client 'HOSTNAME|>192.168.1.111:5405 (HOSTNAME)'Could not connect to: - HOSTNAME|>192.168.1.111:5405 (HOSTNAME)The number of Clients found was 10
And if no clients were found (unlikely or why would you go to this trouble!) the response would be:
> No Clients were found in the lookup!
I was later able to upload to another compromised host on the network and use the "runscrip.exe" exe provided to run the script:
C:\Program Files (x86)\NetSupport\NetSupportManager>runscrip.exe /B ./dk_findclients.scp
Now, before using this there are a couple of things to be aware of:
So using the NetSupport scripting engine I was able to find the versions of the software running on the hundreds of hosts on the network and target those that may be vulnerable. More notable were the number of hosts running with no authentication required. Of course the power of this application can allow anyone to compromise hosts easily allowing for remote commands, file uploads and total control of the clients on the network. Therefore due care and attention should be applied when running it on your corporate network and at the very least ensure that all clients require a strong password before the manager can connect.
It was a bit surprising there isn't more free testing tools out there for this service. There are public exploits available and the natural follow up to this would involve writing my own test script without the need to use the NetSupport Manager to run the script. I couldn't find any reference to the NetSupport Manager packet format. I did perform some quick protocol analysis on port 5405 between a manager and client and wrote a quick nmap script to output the response from the client when sending it a query (captured with Wireshark) from a manager which worked in the test environment but didn't work in the customer environment. I'll carry out further testing and post it in my next blog update.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.