githubEdit

MS-DFSNM abuse (DFSCoerce)

Theory

MS-DFSNM is Microsoft's Distributed File System Namespace Management protocol. It provides an RPC interface for administering DFS configurations (docs.microsoft.comarrow-up-right). That interface is available through the \pipe\netdfs SMB named pipe.

In mid-2022, Filip Dragovicarrow-up-right demonstrated the possibility of abusing the protocol to coerce authentications. Similarly to other MS-RPC abuses, this works by using a specific method relying on remote address. In this case (as of July 6th, 2022), the following methods were detected vulnerable: NetrDfsRemoveStdRoot and NetrDfsAddStdRoot. It is worth noting this coercion method only works against domain controllers.

Practice

NetExecarrow-up-right (Python) can be used to check if the target is vulnerable to DFSCoerce.

netexec smb <TARGET> -u <USER> -p <PASSWORD> -M dfscoerce

Resources

Last updated