Codebase list pysmb / 38858a47-a141-4b15-b621-7621093dbc3c/main python3 / tests / test_ntlm.py
38858a47-a141-4b15-b621-7621093dbc3c/main

Tree @38858a47-a141-4b15-b621-7621093dbc3c/main (Download .tar.gz)

test_ntlm.py @38858a47-a141-4b15-b621-7621093dbc3c/mainraw · history · blame

import binascii
from smb import ntlm

def test_NTLMv1_without_extended_security():
    password = 'Password'
    server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef'

    nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1(password,
                                                                                                 server_challenge,
                                                                                                 has_extended_security = False,
                                                                                                 client_challenge = b'\xAA'*8)

    assert binascii.hexlify(nt_challenge_response).lower() == b'67 c4 30 11 f3 02 98 a2 ad 35 ec e6 4f 16 33 1c 44 bd be d9 27 84 1f 94'.replace(b' ', b'')  # [MS-NLMP]: 4.2.2.2.1
    assert binascii.hexlify(lm_challenge_response).lower() == b'98 de f7 b8 7f 88 aa 5d af e2 df 77 96 88 a1 72 de f1 1c 7d 5c cd ef 13'.replace(b' ', b'')  # [MS-NLMP]: 4.2.2.2.2


def test_NTLMv1_with_extended_security():
    password = 'Password'
    server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef'

    nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1(password,
                                                                                                 server_challenge,
                                                                                                 has_extended_security = True,
                                                                                                 client_challenge = b'\xAA'*8)

    assert binascii.hexlify(nt_challenge_response).lower() == b'75 37 f8 03 ae 36 71 28 ca 45 82 04 bd e7 ca f8 1e 97 ed 26 83 26 72 32'.replace(b' ', b'')  # [MS-NLMP]: 4.2.3.2.2
    assert binascii.hexlify(lm_challenge_response).lower() == b'aa aa aa aa aa aa aa aa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00'.replace(b' ', b'')  # [MS-NLMP]: 4.2.3.2.1


def test_NTLMv2():
    user = 'User'
    password = 'Password'
    domain = 'Domain'
    server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef'

    server_avpair = binascii.unhexlify(b'01 00 0c 00 53 00 65 00 72 00 76 00 65 00 72 00'.replace(b' ', b''))
    domain_avpair = binascii.unhexlify(b'02 00 0c 00 44 00 6f 00 6d 00 61 00 69 00 6e 00'.replace(b' ', b''))

    nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV2(password,
                                                                                                 user,
                                                                                                 server_challenge,
                                                                                                 server_avpair + domain_avpair + b'\0'*4,
                                                                                                 domain,
                                                                                                 client_challenge = b'\xAA'*8)

    assert binascii.hexlify(lm_challenge_response).lower() == b'86 c3 50 97 ac 9c ec 10 25 54 76 4a 57 cc cc 19 aa aa aa aa aa aa aa aa'.replace(b' ', b'')  # [MS-NLMP]: 4.2.4.2.1