metasploit-framework/modules/post/hardware/automotive/identifymodules.rb

54 lines
1.8 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'rex'
require 'msf/core/post/hardware/automotive/uds'
class MetasploitModule < Msf::Post
include Msf::Post::Hardware::Automotive::UDS
def initialize(info={})
super( update_info( info,
'Name' => 'Scan CAN Bus for Diagnostic Modules',
'Description' => %q{ Post Module to scan the CAN bus for any modules that can respond to UDS DSC queries},
'License' => MSF_LICENSE,
'Author' => ['Craig Smith'],
'Platform' => ['hardware'],
'SessionTypes' => ['hwbridge']
))
register_options([
OptInt.new('STARTID', [true, "Start scan from this ID", 0x600]),
OptInt.new('ENDID', [true, "End scan at this ID", 0x7F7]),
OptString.new('CANBUS', [false, "CAN Bus to perform scan on, defaults to connected bus", nil])
], self.class)
2017-03-08 17:21:33 +00:00
@found_id = []
end
def run
scanned_ids = 0
print_line("Starting scan...")
2017-03-08 17:21:33 +00:00
(datastore['STARTID']..datastore['ENDID']).each do |id|
res = set_dsc(datastore['CANBUS'], id, id + 8, 1)
2017-03-16 16:22:01 +00:00
scanned_ids += 1
2017-03-08 17:21:33 +00:00
next if res.nil?
next unless res.key? "Packets"
next unless res["Packets"].empty?
if (res["Packets"][0].key? "DATA") && res["Packets"][0]["DATA"].size > 3
if res["Packets"][0]["DATA"][0].hex == 3 && res["Packets"][0]["DATA"][1].hex == 0x7f && res["Packets"][0]["DATA"][2].hex == 0x10
print_status("Identified module #{"%3x" % id}")
@found_id << id
end
end
end
print_line("Scanned #{scanned_ids} IDs and found #{@found_id.size} modules that responded")
@found_id.each do |id|
print_line(" #{"%3x" % id}")
end
end
end