Virtual Machine Remote Control (protocol): Difference between revisions

From Computernewb Wiki
Jump to navigation Jump to search
(Created page with "VMRC is <s>a pile of garbage which is</s> modified VNC with NTLM and Kerberos authentication. Ain't that fun? The Kerberos portion of this protocol requires an AD to be present on the server itself, so we will be only covering NTLM itself as no one wants to bother setting up an buggy piece of shit server daemon on an AD out of all things. Used in Virtual Server 2005. == Opening == When a VMRC client and server exchange information, the exchange of packets will be...")
 
No edit summary
Line 8: Line 8:
When a VMRC client and server exchange information, the exchange of packets will be as follows:
When a VMRC client and server exchange information, the exchange of packets will be as follows:


Legend: '''S''' == <code>Server</code>, '''C''' == <code>Client</code>
Legend: '''S''' = Server, '''C''' = Client


# '''S''' → '''C''': <kbd>RFB 003.006</kbd>
# '''S''' → '''C''': <kbd>RFB 003.006</kbd>
Line 27: Line 27:
# '''S''' → '''C''': [0x00, 0x00, 0x00, 0x0y]
# '''S''' → '''C''': [0x00, 0x00, 0x00, 0x0y]


The `y` denotes the authentication method used:
The <kbd>y</kbd> denotes the authentication method used:
* 0x00: None (unused?)
* 0x00: None (unused?)
* 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA208B207.)
* 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA208B207.)
* 0x05, reconnect, followed by 0x04, 0x05, 0x06, explained below
* 0x05: Reconnect, followed by 0x04, 0x05, 0x06, explained below
* 0x06: Negotiate (No idea what this is... the client calls it NTLM but the structure is way different.)
* 0x06: Negotiate (No idea what this is... the client calls it NTLM but the structure is way different.)


0x05, always will connect twice if detected, and changes the authentication method to:
0x05 always will connect twice if detected, and changes the authentication method to:
* 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA2088207.)
* 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA2088207.)
* 0x05: Kerberos.
* 0x05: Kerberos.

Revision as of 07:23, 23 September 2022

VMRC is a pile of garbage which is modified VNC with NTLM and Kerberos authentication. Ain't that fun?

The Kerberos portion of this protocol requires an AD to be present on the server itself, so we will be only covering NTLM itself as no one wants to bother setting up an buggy piece of shit server daemon on an AD out of all things.

Used in Virtual Server 2005.

Opening

When a VMRC client and server exchange information, the exchange of packets will be as follows:

Legend: S = Server, C = Client

  1. SC: RFB 003.006
  2. CS: RFB 003.006
  3. SC: Authentication packet.
  4. CS: NTLMSSP_NEGOTIATE
  5. SC: NTLMSSP_CHALLENGE
  6. CS: NTLMSSP_AUTH

Depending on how successful the authentication is, it can either:

  1. S → ❌: Server terminates connection to client
  2. SC: Select Security Type packet with the Security Type set to 0x00.

If you got the second result, go to the Post Authentication section.

Authentication

  1. SC: [0x00, 0x00, 0x00, 0x0y]

The y denotes the authentication method used:

  • 0x00: None (unused?)
  • 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA208B207.)
  • 0x05: Reconnect, followed by 0x04, 0x05, 0x06, explained below
  • 0x06: Negotiate (No idea what this is... the client calls it NTLM but the structure is way different.)

0x05 always will connect twice if detected, and changes the authentication method to:

  • 0x04: NTLM (NTLMSSP_NEGOTIATE flags set to 0xA2088207.)
  • 0x05: Kerberos.
  • 0x06: NTLM/Negotiate (NTLMSSP_NEGOTIATE flags set to 0xE2088297.)

Post Authentication


  1. CS: Select Security Type packet with the Security Type set to 0x01.
  2. SC: "Share desktop flag" with what seems to be a length of 0x0e followed by "Virtual Server"