@@ -509,48 +509,48 @@ DCE/RPC Endpoint Mapper, Map
509509#### DRSR traffic
510510
511511``` output
512- Source Destination Protocol Info
513- 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
514- 192.168.100.10 192.168.100.13 TCP 49671 → 49711 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
515- 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [ACK] Seq=1 Ack=1 Win=65280 Len=0
512+ Source Destination Protocol Info
513+ 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
514+ 192.168.100.10 192.168.100.13 TCP 49671 → 49711 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
515+ 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [ACK] Seq=1 Ack=1 Win=65280 Len=0
516516192.168.100.13 192.168.100.10 DCERPC Bind: call_id: 2, Fragment: Single, 3 context items: DRSUAPI V4.0 (32bit NDR), DRSUAPI V4.0 (64bit NDR), DRSUAPI V4.0 (6cb71c2c-9812-4540-0300-000000000000), NTLMSSP_NEGOTIATE
517517192.168.100.10 192.168.100.13 DCERPC Bind_ack: call_id: 2, Fragment: Single, max_xmit: 5840 max_recv: 5840, 3 results: Provider rejection, Acceptance, Negotiate ACK, NTLMSSP_CHALLENGE
518518192.168.100.13 192.168.100.10 DCERPC AUTH3: call_id: 2, Fragment: Single, NTLMSSP_AUTH, User: contoso\puser2
519- 192.168.100.13 192.168.100.10 DRSUAPI DsBind request
520- 192.168.100.10 192.168.100.13 TCP 49671 → 49711 [ACK] Seq=329 Ack=929 Win=2096896 Len=0
521- 192.168.100.10 192.168.100.13 DRSUAPI DsBind response
522- 192.168.100.13 192.168.100.10 DRSUAPI DsCrackNames request
523- 192.168.100.10 192.168.100.13 DRSUAPI DsCrackNames response
524- 192.168.100.13 192.168.100.10 DRSUAPI DsCrackNames request
525- 192.168.100.10 192.168.100.13 DRSUAPI DsCrackNames response
526- 192.168.100.13 192.168.100.10 DRSUAPI DsUnbind request
527- 192.168.100.10 192.168.100.13 DRSUAPI DsUnbind response
528- 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [ACK] Seq=1393 Ack=905 Win=64512 Len=0
519+ 192.168.100.13 192.168.100.10 DRSUAPI DsBind request
520+ 192.168.100.10 192.168.100.13 TCP 49671 → 49711 [ACK] Seq=329 Ack=929 Win=2096896 Len=0
521+ 192.168.100.10 192.168.100.13 DRSUAPI DsBind response
522+ 192.168.100.13 192.168.100.10 DRSUAPI DsCrackNames request
523+ 192.168.100.10 192.168.100.13 DRSUAPI DsCrackNames response
524+ 192.168.100.13 192.168.100.10 DRSUAPI DsCrackNames request
525+ 192.168.100.10 192.168.100.13 DRSUAPI DsCrackNames response
526+ 192.168.100.13 192.168.100.10 DRSUAPI DsUnbind request
527+ 192.168.100.10 192.168.100.13 DRSUAPI DsUnbind response
528+ 192.168.100.13 192.168.100.10 TCP 49711 → 49671 [ACK] Seq=1393 Ack=905 Win=64512 Len=0
529529```
530530
531531#### NetLogon traffic
532532
533533``` output
534- Source Destination Protocol Info
535- 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
536- 192.168.100.10 192.168.100.13 TCP 49682 → 49735 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
537- 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [ACK] Seq=1 Ack=1 Win=65280 Len=0
538- 192.168.100.13 192.168.100.10 DCERPC Bind: call_id: 2, Fragment: Single, 3 context items: RPC_NETLOGON V1.0 (32bit NDR), RPC_NETLOGON V1.0 (64bit NDR), RPC_NETLOGON V1.0 (6cb71c2c-9812-4540-0300-000000000000)
539- 192.168.100.10 192.168.100.13 DCERPC Bind_ack: call_id: 2, Fragment: Single, max_xmit: 5840 max_recv: 5840, 3 results: Provider rejection, Acceptance, Negotiate ACK
534+ Source Destination Protocol Info
535+ 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
536+ 192.168.100.10 192.168.100.13 TCP 49682 → 49735 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
537+ 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [ACK] Seq=1 Ack=1 Win=65280 Len=0
538+ 192.168.100.13 192.168.100.10 DCERPC Bind: call_id: 2, Fragment: Single, 3 context items: RPC_NETLOGON V1.0 (32bit NDR), RPC_NETLOGON V1.0 (64bit NDR), RPC_NETLOGON V1.0 (6cb71c2c-9812-4540-0300-000000000000)
539+ 192.168.100.10 192.168.100.13 DCERPC Bind_ack: call_id: 2, Fragment: Single, max_xmit: 5840 max_recv: 5840, 3 results: Provider rejection, Acceptance, Negotiate ACK
540540192.168.100.13 192.168.100.10 RPC_NETLOGON NetrServerReqChallenge request,
541541192.168.100.10 192.168.100.13 RPC_NETLOGON NetrServerReqChallenge response
542542192.168.100.13 192.168.100.10 RPC_NETLOGON NetrServerAuthenticate3 request
543543192.168.100.10 192.168.100.13 RPC_NETLOGON NetrServerAuthenticate3 response
544- 192.168.100.13 192.168.100.10 DCERPC Alter_context: call_id: 4, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (64bit NDR)
545- 192.168.100.10 192.168.100.13 DCERPC Alter_context_resp: call_id: 4, Fragment: Single, max_xmit: 5840 max_recv: 5840, 1 results: Acceptance
544+ 192.168.100.13 192.168.100.10 DCERPC Alter_context: call_id: 4, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (64bit NDR)
545+ 192.168.100.10 192.168.100.13 DCERPC Alter_context_resp: call_id: 4, Fragment: Single, max_xmit: 5840 max_recv: 5840, 1 results: Acceptance
546546192.168.100.13 192.168.100.10 RPC_NETLOGON NetrLogonGetCapabilities request
547547192.168.100.10 192.168.100.13 RPC_NETLOGON NetrLogonGetCapabilities response
548548192.168.100.13 192.168.100.10 RPC_NETLOGON NetrLogonGetCapabilities request
549549192.168.100.10 192.168.100.13 RPC_NETLOGON NetrLogonGetCapabilities response
550550192.168.100.13 192.168.100.10 RPC_NETLOGON NetrLogonGetDomainInfo request
551- 192.168.100.10 192.168.100.13 TCP 49682 → 49735 [ACK] Seq=505 Ack=1993 Win=2097920 Len=1460 [TCP PDU reassembled in 562]
551+ 192.168.100.10 192.168.100.13 TCP 49682 → 49735 [ACK] Seq=505 Ack=1993 Win=2097920 Len=1460 [TCP PDU reassembled in 562]
552552192.168.100.10 192.168.100.13 RPC_NETLOGON NetrLogonGetDomainInfo response
553- 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [ACK] Seq=1993 Ack=2113 Win=65280 Len=09735, DstPort=49682, PayloadLen=0, Seq=2988619262, Ack=225725553
553+ 192.168.100.13 192.168.100.10 TCP 49735 → 49682 [ACK] Seq=1993 Ack=2113 Win=65280 Len=09735, DstPort=49682, PayloadLen=0, Seq=2988619262, Ack=225725553
554554```
555555
556556### Kerberos
@@ -560,25 +560,25 @@ Kerberos traffic is also used during domain join operation, because all the type
560560For example, in the following network trace, the client gets a Kerberos TGT for the user account ** CONTOSO\puser2** and the service ticket for the target SPN ** cifs/DC2.contoso.local** . Then, the client sets up the SMB session to the DC DC2.contoso.local with that service ticket.
561561
562562``` output
563- Source Destination Protocol Info
564- 192.168.100.13 192.168.100.10 TCP 49744 → 445 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
565- 192.168.100.10 192.168.100.13 TCP 445 → 49744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
566- 192.168.100.13 192.168.100.10 TCP 49744 → 445 [ACK] Seq=1 Ack=1 Win=65280 Len=0
567- 192.168.100.13 192.168.100.10 SMB Negotiate Protocol Request
568- 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
569- 192.168.100.13 192.168.100.10 SMB2 Negotiate Protocol Request
570- 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
571- 192.168.100.13 192.168.100.12 KRB5 AS-REQ
572- 192.168.100.12 192.168.100.13 KRB5 KRB Error: KRB5KDC_ERR_PREAUTH_REQUIRED
573- 192.168.100.13 192.168.100.12 KRB5 AS-REQ
574- 192.168.100.12 192.168.100.13 KRB5 AS-REP
575- 192.168.100.13 192.168.100.12 KRB5 TGS-REQ
576- 192.168.100.12 192.168.100.13 KRB5 TGS-REP
577- 192.168.100.13 192.168.100.10 SMB2 Session Setup Request
578- 192.168.100.10 192.168.100.13 TCP 445 → 49744 [ACK] Seq=629 Ack=2213 Win=2097920 Len=0
579- 192.168.100.10 192.168.100.13 SMB2 Session Setup Response
580- 192.168.100.13 192.168.100.10 SMB2 Tree Connect Request Tree: \\DC2.contoso.local\IPC$
581- 192.168.100.10 192.168.100.13 SMB2 Tree Connect Response
563+ Source Destination Protocol Info
564+ 192.168.100.13 192.168.100.10 TCP 49744 → 445 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
565+ 192.168.100.10 192.168.100.13 TCP 445 → 49744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
566+ 192.168.100.13 192.168.100.10 TCP 49744 → 445 [ACK] Seq=1 Ack=1 Win=65280 Len=0
567+ 192.168.100.13 192.168.100.10 SMB Negotiate Protocol Request
568+ 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
569+ 192.168.100.13 192.168.100.10 SMB2 Negotiate Protocol Request
570+ 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
571+ 192.168.100.13 192.168.100.12 KRB5 AS-REQ
572+ 192.168.100.12 192.168.100.13 KRB5 KRB Error: KRB5KDC_ERR_PREAUTH_REQUIRED
573+ 192.168.100.13 192.168.100.12 KRB5 AS-REQ
574+ 192.168.100.12 192.168.100.13 KRB5 AS-REP
575+ 192.168.100.13 192.168.100.12 KRB5 TGS-REQ
576+ 192.168.100.12 192.168.100.13 KRB5 TGS-REP
577+ 192.168.100.13 192.168.100.10 SMB2 Session Setup Request
578+ 192.168.100.10 192.168.100.13 TCP 445 → 49744 [ACK] Seq=629 Ack=2213 Win=2097920 Len=0
579+ 192.168.100.10 192.168.100.13 SMB2 Session Setup Response
580+ 192.168.100.13 192.168.100.10 SMB2 Tree Connect Request Tree: \\DC2.contoso.local\IPC$
581+ 192.168.100.10 192.168.100.13 SMB2 Tree Connect Response
582582```
583583
584584``` output
@@ -637,21 +637,21 @@ Even if you don't see any Kerberos traffic, that doesn't necessarily mean the do
637637See the following example of successful SMB session setup using NTLM authentication.
638638
639639``` output
640- Source Destination Protocol Info
641- 192.168.100.13 192.168.100.10 TCP 49708 → 445 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
642- 192.168.100.10 192.168.100.13 TCP 445 → 49708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
643- 192.168.100.13 192.168.100.10 TCP 49708 → 445 [ACK] Seq=1 Ack=1 Win=65280 Len=0
644- 192.168.100.13 192.168.100.10 SMB Negotiate Protocol Request
645- 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
646- 192.168.100.13 192.168.100.10 SMB2 Negotiate Protocol Request
647- 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
648- 192.168.100.13 192.168.100.10 TCP 49708 → 445 [ACK] Seq=378 Ack=629 Win=64768 Len=0
649- 192.168.100.13 192.168.100.10 SMB2 Session Setup Request, NTLMSSP_NEGOTIATE
650- 192.168.100.10 192.168.100.13 SMB2 Session Setup Response, Error: STATUS_MORE_PROCESSING_REQUIRED, NTLMSSP_CHALLENGE
651- 192.168.100.13 192.168.100.10 SMB2 Session Setup Request, NTLMSSP_AUTH, User: contoso\puser2
652- 192.168.100.10 192.168.100.13 SMB2 Session Setup Response
653- 192.168.100.13 192.168.100.10 SMB2 Tree Connect Request Tree: \\DC2.contoso.local\IPC$
654- 192.168.100.10 192.168.100.13 SMB2 Tree Connect Response
640+ Source Destination Protocol Info
641+ 192.168.100.13 192.168.100.10 TCP 49708 → 445 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
642+ 192.168.100.10 192.168.100.13 TCP 445 → 49708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM
643+ 192.168.100.13 192.168.100.10 TCP 49708 → 445 [ACK] Seq=1 Ack=1 Win=65280 Len=0
644+ 192.168.100.13 192.168.100.10 SMB Negotiate Protocol Request
645+ 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
646+ 192.168.100.13 192.168.100.10 SMB2 Negotiate Protocol Request
647+ 192.168.100.10 192.168.100.13 SMB2 Negotiate Protocol Response
648+ 192.168.100.13 192.168.100.10 TCP 49708 → 445 [ACK] Seq=378 Ack=629 Win=64768 Len=0
649+ 192.168.100.13 192.168.100.10 SMB2 Session Setup Request, NTLMSSP_NEGOTIATE
650+ 192.168.100.10 192.168.100.13 SMB2 Session Setup Response, Error: STATUS_MORE_PROCESSING_REQUIRED, NTLMSSP_CHALLENGE
651+ 192.168.100.13 192.168.100.10 SMB2 Session Setup Request, NTLMSSP_AUTH, User: contoso\puser2
652+ 192.168.100.10 192.168.100.13 SMB2 Session Setup Response
653+ 192.168.100.13 192.168.100.10 SMB2 Tree Connect Request Tree: \\DC2.contoso.local\IPC$
654+ 192.168.100.10 192.168.100.13 SMB2 Tree Connect Response
655655```
656656
657657``` output
0 commit comments