Sponsored Content
Top Forums Programming C NTLM Authorization via HTTP Post 302205972 by edvin on Monday 16th of June 2008 04:25:16 PM
Old 06-16-2008
Question C NTLM Authorization via HTTP

Greetings,

I am writing a C socket application that needs NTLM authorization before it can post HTTP requests, and
I am having trouble with NTLM authorization messages.

:b: I've found the following urls extremely valuable for creating message functions:Furthermore, I've been able to validate my response functions by utilizing input values from the examples found in the above URL.

Even though I am using XP client and W2003 server, I expected that NTLMv1 authentication work, see Implementing CIFS: SMB

Using Network Monitor I observed the traffic of another client (MSXML2.ServerXMLHTTP). After decoding base64 NTLMAuthorization and WWWAuthenticate messages, I found that “Negotiate NTLM2 Key” (0x00080000) is set, which is why I am assuming the NTLM session response is utilized:
The NTLM Authentication Protocol and Security Support Provider

As I mentioned earlier, when I plug-in sample client_challange (nonce), and server_challange, username, password in my functions I get the same NTLM response
as the above section. However, :confused: when I utilize my own information, I end up with
“HTTP/1.1 401 Unauthorized” in response for my message3.

I am authenticating against TARGET_TYPE_SERVER, thus, we are dealing with server level validation rather than domain.

I just have not been able to nail down the right sequence of flags and responses. I would be greatful to any guidance in resolving my issue.

Thanks in advance
 

7 More Discussions You Might Find Interesting

1. HP-UX

SMTP and NTLM

Hi, I have a HP Unix from which I'm trying to connect to an email server through telnet and test sending emails using commands. Why am I doing that is not important. The email server is an Exchange server and it looks like that the only Authentication method it supports is NTLM. The host name... (0 Replies)
Discussion started by: gheibia
0 Replies

2. Programming

sending http url through http socket programming..

hi am senthil am developing a software to send and receive SMS using HTTP connection first of all am forming a URL and sending that URL to a remote server using my Client Program i send that url through Socket(using Send() Function) if i send more than one URL one by one using the same... (0 Replies)
Discussion started by: senkerth
0 Replies

3. Shell Programming and Scripting

sending http url through http socket programming..

hi am senthil am developing a software to send and receive SMS using HTTP connection first of all am forming a URL and sending that URL to a remote server using my Client Program i send that url through Socket(using Send() Function) if i send more than one URL one by one using the same... (4 Replies)
Discussion started by: senkerth
4 Replies

4. UNIX for Dummies Questions & Answers

Configure Cyrus SASL NTLM Plugin with Postfix

Hello I hope somebody can help with this. I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication. 250-AUTH NTLM This is the configuration I have: Postfix 2.1.1 as client. Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies

5. Shell Programming and Scripting

Configure Cyrus SASL NTLM Plugin with Postfix

Hello I hope somebody can help with this. I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication. 250-AUTH NTLM This is the configuration I have: Postfix 2.1.1 as client. Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies

6. Web Development

HTTP Headers Reference: HTTP Status-Codes

Hypertext Transfer Protocol -- HTTP/1.1 for Reference - HTTP Headers 10 Status Code Definitions Each Status-Code is described below, including a description of which method(s) it can follow and any metainformation required in the response. (1 Reply)
Discussion started by: Neo
1 Replies

7. Shell Programming and Scripting

awk script to find time difference between HTTP PUT and HTTP DELETE requests in access.log

Hi, I'm trying to write a script to determine the time gap between HTTP PUT and HTTP DELETE requests in the HTTP Servers access log. Normally client will do HTTP PUT to push content e.g. file_1.txt and 21 seconds later it will do HTTP DELETE, but sometimes the time varies causing some issues... (3 Replies)
Discussion started by: Juha
3 Replies
SPIKEPROXY(1)						      General Commands Manual						     SPIKEPROXY(1)

NAME
spikeproxy - web application auditing tool SYNOPSIS
spkproxy [-s SSLproxyhost] [-p port] [-U NTLMUser] [-D NTLMDomain] [-P NTLMPassword] [-l ListenHost] [-c cache_directory] DESCRIPTION
This manual page documents briefly the spikeproxy command. This manual page was written for the Debian distribution because the original program does not have a manual page. SPIKE proXY functions as an HTTP and HTTPS proxy, and allows web developers or web application auditors low level access to the entire web application interface, while also providing a number of automated tools and techniques for discovering common problems. These automated tools include: 1.Automated SQL Injection Detection 2.Web Site Crawling (guaranteed not to crawl sites other than the one being tested) 3.Login form brute forcing 4.Automated overflow detection 5.Automated directory traversal detection In addition to automated analysis, SPIKE proXy allows the user to penetrate into the internals of the web application by viewing and chang- ing all variables, cookies, headers, or other parts of the request and resubmit them. SPIKE proXy maintains a careful record of each request made - saving both each request, and the entire response. The user can later go back and replace any request or view any response. OPTIONS
This program can be configured with the options listed below. The options may be given in any order. -c cache directory The directory that will be used to cache all the requests. This directory is created if it does not exist. The default location is /var/cache/spikeproxy but it can only be used by the root user. -l listenhost The IP address the proxy will listen on (it defaults to 127.0.0.1 so it is not available from external hosts). -p port This option sets the port the proxy will listen on (it defaults to 8080 if not provided). -h proxyHost Sets a proxy host to use in the proxy chain. Spike will forward all requests to this proxy. -H proxyPort Sets the port for the proxy host. -s proxySSLHost Sets a proxy host for SSL connections. Spike will forward all SSL requests to this proxy. -S proxySSLPort Sets the port for the SSL proxy host. -U NTLM Username Defines the NTLM username it will use when authenticating to the proxy host. -P NTLM Password Sets the password it will use when authenticating to the proxy host. -D NTLM Domain Sets the NTLM domain it will use when providing credentials to the proxy host. SEE ALSO
The program provides inline documentation in the user interface when connected to it through a web client. If you are trying to audit a web application you might want to read OWASP Guide to Building Secure Web Applications and Web Services, Application Security Attack Components project, Application Security Testing Framework, and the OWASP Web Application Security TopTen available at http://www.owasp.org and the World Wide Web Security FAQ available at http://www.w3.org/Security/Faq/ AUTHOR
This manual page was written by Javier Fernandez-Sanguino Pen~a <jfs@computer.org>, for the Debian GNU/Linux system (but may be used by others). October 2, 2006 SPIKEPROXY(1)
All times are GMT -4. The time now is 02:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy