2010-12-25 06:08:34 +00:00
|
|
|
##
|
|
|
|
# $Id$
|
|
|
|
##
|
|
|
|
|
|
|
|
##
|
|
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
2012-02-21 01:40:50 +00:00
|
|
|
# web site for more information on licensing and terms of use.
|
|
|
|
# http://metasploit.com/
|
2010-12-25 06:08:34 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
|
|
|
|
include Msf::Exploit::Remote::SNMPClient
|
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Auxiliary::Scanner
|
|
|
|
|
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'SNMP Windows Username Enumeration',
|
|
|
|
'Version' => '$Revision$',
|
|
|
|
'Description' => "This module will use LanManager OID values to enumerate local user accounts on a Windows system via SNMP",
|
|
|
|
'Author' => ['tebo[at]attackresearch.com'],
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def run_host(ip)
|
|
|
|
begin
|
|
|
|
snmp = connect_snmp
|
|
|
|
|
|
|
|
if snmp.get_value('sysDescr.0') =~ /Windows/
|
|
|
|
|
|
|
|
@users = []
|
|
|
|
snmp.walk("1.3.6.1.4.1.77.1.2.25") do |row|
|
|
|
|
row.each { |val| @users << val.value.to_s }
|
|
|
|
end
|
|
|
|
|
|
|
|
print_good("#{ip} Found Users: #{@users.sort.join(", ")} ")
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
disconnect_snmp
|
|
|
|
|
2011-03-23 18:14:05 +00:00
|
|
|
report_note(
|
|
|
|
:host => rhost,
|
|
|
|
:port => datastore['RPORT'],
|
|
|
|
:proto => 'udp',
|
|
|
|
:sname => 'snmp',
|
|
|
|
:update => :unique_data,
|
|
|
|
:type => 'snmp.users',
|
|
|
|
:data => @users
|
|
|
|
)
|
2011-11-20 02:12:07 +00:00
|
|
|
|
2010-12-25 06:08:34 +00:00
|
|
|
|
|
|
|
rescue ::SNMP::UnsupportedVersion
|
|
|
|
rescue ::SNMP::RequestTimeout
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error("Unknown error: #{e.class} #{e}")
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|