metasploit-framework/modules/auxiliary/scanner/ssh/detect_kippo.rb

50 lines
1.4 KiB
Ruby
Raw Normal View History

2014-12-11 03:37:35 +00:00
require 'msf/core'
2014-12-15 20:28:10 +00:00
class Metasploit4 < Msf::Auxiliary
2014-12-11 03:37:35 +00:00
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
2014-12-11 03:37:35 +00:00
2014-12-15 20:28:10 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Kippo SSH Honeypot Detector',
'Description' => %q{
This module will detect if an SSH server is running a Kippo honeypot.
This is done by issuing unexpected data to the SSH service and checking
the response returned for two particular non-standard error messages.
},
'Author' => 'Andrew Morris <andrew[at]morris.guru>',
'References' => [
['URL', 'https://cultofthedyingsun.wordpress.com/2014/09/12/death-by-magick-number-fingerprinting-kippo-2014/'],
['URL', 'http://morris.guru/detecting-kippo-ssh-honeypots/']
],
'License' => MSF_LICENSE
))
register_options([
Opt::RPORT(22)
])
end
def run_host(ip)
connect
banner = sock.get_once || ''
2014-12-15 20:28:10 +00:00
sock.put(banner + "\n" * 8)
response = sock.get_once || ''
2014-12-15 20:28:10 +00:00
if response =~ /(?:^Protocol mismatch\.\n$|bad packet length)/
print_good("#{ip}:#{rport} - Kippo detected!")
report_service(
:host => ip,
:port => rport,
:name => 'ssh',
:info => 'Kippo SSH honeypot'
)
else
vprint_status("#{ip}:#{rport} - #{banner.strip} detected")
end
end
2014-12-11 03:37:35 +00:00
2014-12-15 20:28:10 +00:00
end