Terminal Services Patch [Windows XP / Server 2k3]

Status
Not open for further replies.

NewEraCracker

Active Member
1,335
2010
203
10
Code:
Terminal server No Restriction Patch 1.3 - Prefix #1
========================================

Just a compiled the script as normal - so it doesn't crash on non WinXP SP2 2180 Systems
- Antivirus poggie may detect  "TS_Free.exe" as suspicious...



Purpose:
	Remove all limitation of the Windows Remotedesktop/Terminalserver service 
	because of some 'restrictive' windows version like XP Home/XP Professional, 
	Small Business... or limits expose by licensing logic.

Usage:
	Backup C:\windows\system32, termsrv.dll,	winlogon.exe,	mstscax.dll.
	Start TS-Free-1.1.exe.
	Check patcher output for error. Reboot.

Changes:
	Files:
		termsrv.dll
		winlogon.exe
		mstscax.dll

	Registry:
		[HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server]
			"fDenyTSConnections"=0
			"TSAdvertise"=1
			"IdleWinStationPoolCount"=1
			"TSAppCompat"=0
			"TSEnabled"=1
			"TSUserEnabled"=0
		Licensing Core\
			"EnableConcurrentSessions"=0
		WinStations\RDP-Tcp\
			"fEnableWinStation"=1
			"MaxInstanceCount"=dword:ffffffff
		
		[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
		"AllowMultipleTSSessions"=1

Debugging:
	If patch is not working compare if the modified version of the 3 files is
	still in by comparing them with examdiff, Totalcommander or by windows onboard
	Filecompare ("FC.exe /?")
	

	The patch is only for 32-bit Windows. There currently no version for X64. Also
	It doesn't work on windows vista (critical bytepattern changed so patcher
	fails).
	I someone really needs a 64-bit version and can give me a remote desktop connection
	to the system contact me ;)





How it works:
	TS-Free-1.1.exe is an rar-sfx archive which will extract all files
	C:\windows\system32 and run TS_free.bat 
	TS_free.bat launches WPA-kill.exe that will remove the self checks from
	winlogon.exe to make it patchable (and as also disable the product
	activation check).
	Ts_free.exe is the main patch that will modify 
		termsrv.dll
		winlogon.exe
		mstscax.dll
	by a pattern search.
	Note: patching of mstscax.dll is no really important. It just allows you
	on XP Pro to connection with mstsc.exe to yourself (127.0.0.1)
	

Limitations/Known Bug:
	On WinXP I discovered to following bug in previous version(1.1) of this patch: 
	After termsrv.dll was patched following steps brings up a 'can't connect': 
	
	Login locally as user1 , switch user - WinKey+L (or taskmgr/user/rightclick) 
	Login locally as user2 , switch user - WinKey+L (or taskmgr/user/rightclick) 
	Login/reconnect locally as user2 => Error! 
	 
	Without patched termsrv.dll it works. 

	To solve this (at least on WinXP) a added to choice to apply/skip these so called
	'additional patches'. On WinXP they somehow cause the problem.
	They are related to the the 'Windows Version Info' constants VER_SUITE_TERMINAL and 
	VER_SUITE_SINGLEUSERTS.	On server system I think 'additional patches' really
	necessary because VER_SUITE_SINGLEUSERTS is not set. VER_SUITE_SINGLEUSERTS need to
	be set so terminalserver will branch in the 'patched' branch of the simple
	(termsrv.dll!CFullDesktopPolicy::UseLicense) license check.
	
	
	So far I've only test it on WinXP SP2.


How the patch works - how did I create it.
	
	Preparation:
		get the source of this patch it contains some more info's
		get debugsymboles for winlogon & termsrv
		http://www.microsoft.com/whdc/devtools/debugging/symbolpkg.mspx
		to add many useful label and comments to disassembling.
		Get Antiwpa2 patch enable decrypt in options and open winlogon.exe
		also press the apply button to remove self checks. 
	
	
	open termsrv.dll/winlogon.exe in ollydebug and look for references
	(ctrl+n) to
	Kernel32!GetVersionExW (ntdll.RtlGetVersion)
	VerSetConditionMask
	KERNEL32.VerifyVersionInfoW
	to get near to the version restricting function - now your on your own...
	
	In termsrv.dll	look for symbols like
	_fDenyTSConnectionsPolicy
	LicenseModeInit
	LCQueryAllowConcurrentConnections...
	
	
	For live debug open process with commandline <WINXP>system32\svchost -k DcomLaunch
	(Check commandline column in sysinternals process explorer to see it)

	
	So what about the dot's
	If it needs to seek to the beginning of some 
	certain function you to find some unique byte pattern (like a constant
	or a sequence of command/byte)  inside that function and then
	move to the beginning and write the patch data there. Seeking with a byte
	directly to the beginning is not so safe because all functions start
	with the same commands.	So if it seeks backward or forward to the beginning
	I output dots as control. Normally this should be 1 or 2 lines - if there are
	more it's probably didn't found the correct beginning (or beginning is already
	patched) the patch is applied at some wrong location and result is corrupt
	file.

AntiVirus alerts
	Some AntiVirus detect 'WPA_Kill.exe' as HackTool, Trojan or
	unwanted program. Well I don't know why the AV-Maker flag 
	'WPA_Kill.exe' this way, but it's definitly no virus or trojan.
	Probably they don't like the fact that it modified some byte in
	winlogon.exe or possibly violates M$-Eula or what ever. I don't know/care about.
	
	Lately I want to install 'TS-Free-1.2.exe' on a friend's PC and found it
	very annoy that the installed AVG-Virusscanner blocked access to 'WPA_Kill.exe'.
	Also there was no easy to find an userinterface to disable this AV
	and because	there was only little time I saw the quickest way in uninstalling 
	that AVG crap via controlpanel software.
	(Later I saw that this was good because AVG seems to have the weakest detection engine
	(refers only to 'Wpa_Kill.exe') so probably it won't be better for real malware.)
	
	I personly don't use any of this AntiVirus or Internet Security Babysitter software.
	Windows is slow & anony enough so I don't need any addition annoying software panic brake.
	(Just be caution when downloading keygen, cracks with emule or from so ads popluted
	Crack-Site. Don't trust AV Prg but trust ya feeling. Well to get this watch all kinds 
	of files with an Accii viewer to 'feel' weather this is normal(uncompressed) code or
	suspicious(compress/encrypted) code. Well that's how I started.)
	
	Anyway most ppl just use AV-Scanners and as I see that this can be annoying
	(or even wreak the system if the main patch is applied without to 'WPA_Kill'-prepatch and so winlogon.exe will crash...)
	So I decided to do that update and change some pattern that AV uses for their recognition.
	
	This is base on some list I found in a forum:
	
"AntiVir"					->	Trojan/Agent.JH.7		Detection: Scans sfx-rar-archive comment (+Importtable)
"ArcaVir"					->		<none>
"Avast"						->	Win32:Agent-AKC		Detection: Scans for "crackware2k@freenet.de...{ForegroundColor:&H00808081&}..."(size:0x20)
"AVG Antivirus"			->	Generic.DQD				Detection: Creates CRC for exe
"BitDefender"				->	Trojan.Agent.JH
"ClamAV"						->		<none>
"Dr.Web"						->	Tool.Wpakill			Current version does not detect it.
"F-Prot Antivirus"		->		<none>
"Fortinet"					->	W32/Agent.JH!tr
"Kaspersky Anti-Virus"	->	Trojan.Win32.Agent.jh	Detection: Creates CRC of first 0xA70 Bytes of CodeSection
"NOD32"						->	Win32/Agent.JH			Current version does not detect it.
"Norman Virus Control"	->		<none>
"UNA"							->		<none>
"VirusBuster"				->		<none>
"VBA32"						->	Trojan.Win32.Agent.jh


History:
1.3  BugFix mstscax.dll was incorrectly patched on WinXP SP3

1.21 Changes to avoid some false virus alerts of AntiVir,Avast,AVG,Kaspersky

1.2 choice to apply/skip additional patches

1.2 Pre Version
	 Info.txt added
 
1.1 Byte patterns updated for Longhorn

1.0 Initial Version

<CW2K>

Download:
Code:
http://www.multiupload.com/BJOT8ADEXE

Code:
I made an improvement to the Terminal Services Patch v1.3 and I'am naming it v1.4

There are 3 improvements:
1) The patch no longer has to be executed from %systemRoot%\system32
2) The patch no longer triggers the Windows File Protection (WFP) warning.
3) A new key (AllowRemoteRPC) is added to the Registry, see the URL below:
   http://www.pcreview.co.uk/forums/thread-2395421.php

How the patch works:
First 3 files (winlogon.exe, termsrv.dll, mstscax.dll) are copied into the current directory and patched there.
The WPA_Kill.exe is modified to patch winlogon.exe in the current directory, because in v1.3 the WPA_Kill.exe was hardcoded to %systemRoot%\system32 (very, very inflexible :/ )

Finally, a 3rd party 4KB utility (WFPdeprotect.exe) is used to avoid triggering the WFP when the 3 patched files are copied from the current directory to %systemRoot%\system32


Enjoy,
Slick Willy

Download:
Code:
http://megaupper.com/files/00DLGCRJ/TerminalServicesPatch_v1.4.rar

I used 1.4 Version of patch and it works flawless :D
Enjoy webmasters
 
Status
Not open for further replies.
Back
Top