metasploit-framework/modules/post/windows/gather/enum_prefetch.rb

212 lines
7.4 KiB
Ruby
Raw Normal View History

2013-07-14 12:30:54 +00:00
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
require 'rex'
require 'msf/core/post/windows/registry'
class Metasploit3 < Msf::Post
include Msf::Post::Windows::Priv
def initialize(info={})
super(update_info(info,
'Name' => 'Windows Gather Prefetch File Information',
'Description' => %q{This module gathers prefetch file information from WinXP & Win7 systems.},
'License' => MSF_LICENSE,
'Author' => ['TJ Glad <fraktaali[at]gmail.com>'],
'Platform' => ['win'],
'SessionType' => ['meterpreter']
))
end
def prefetch_key_value()
# Checks if Prefetch registry key exists and what value it has.
reg_key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SYSTEM\\CurrentControlSet\\Control\\Session\ Manager\\Memory\ Management\\PrefetchParameters", KEY_READ)
key_value = reg_key.query_value("EnablePrefetcher").data
if key_value == 0
print_error("EnablePrefetcher Value: (0) = Disabled (Non-Default).")
elsif key_value == 1
print_good("EnablePrefetcher Value: (1) = Application launch prefetching enabled (Non-Default).")
elsif key_value == 2
print_good("EnablePrefetcher Value: (2) = Boot prefetching enabled (Non-Default).")
elsif key_value == 3
print_good("EnablePrefetcher Value: (3) = Applaunch and boot enabled (Default Value).")
else
print_error("No value or unknown value. Results might vary.")
end
reg_key.close
end
2013-07-15 14:51:55 +00:00
def timezone_key_values(key_value)
# Looks for timezone from registry
timezone_key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SYSTEM\\CurrentControlSet\\Control\\TimeZoneInformation", KEY_READ)
if timezone_key.nil?
2013-07-14 12:30:54 +00:00
print_line("Couldn't find key/value for timezone from registry.")
else
2013-07-15 14:51:55 +00:00
timezone = timezone_key.query_value(key_value).data
tzbias = timezone_key.query_value("Bias").data
if timezone.nil? or tzbias.nil?
print_error("Couldn't find timezone information from registry.")
else
print_good("Remote: Timezone is %s." % timezone)
if tzbias < 0xfff
bias = tzbias
print_good("Remote: Localtime bias to UTC: -%s minutes." % bias)
else
offset = 0xffffffff
bias = offset - tzbias
print_good("Remote: Localtime bias to UTC: +%s minutes." % bias)
end
end
2013-07-14 14:24:27 +00:00
end
2013-07-15 14:51:55 +00:00
timezone_key.close
2013-07-15 10:15:39 +00:00
end
2013-07-14 14:24:27 +00:00
2013-07-15 12:38:42 +00:00
def gather_prefetch_info(name_offset, hash_offset, lastrun_offset, runcount_offset, filename, table)
2013-07-14 12:30:54 +00:00
# This function seeks and gathers information from specific offsets.
h = client.railgun.kernel32.CreateFileA(filename, "GENERIC_READ", "FILE_SHARE_DELETE|FILE_SHARE_READ|FILE_SHARE_WRITE", nil, "OPEN_EXISTING", "FILE_ATTRIBUTE_NORMAL", 0)
if h['GetLastError'] != 0
print_error("Error opening a file handle.")
return nil
else
handle = h['return']
# Finds the filename from the prefetch file
client.railgun.kernel32.SetFilePointer(handle, name_offset, 0, nil)
name = client.railgun.kernel32.ReadFile(handle, 60, 60, 4, nil)
x = name['lpBuffer']
2013-07-15 13:07:45 +00:00
pname = Rex::Text.to_ascii(x.slice(0..x.index("\x00\x00")))
2013-07-14 12:30:54 +00:00
# Finds the run count from the prefetch file
client.railgun.kernel32.SetFilePointer(handle, runcount_offset, 0, nil)
count = client.railgun.kernel32.ReadFile(handle, 4, 4, 4, nil)
prun = count['lpBuffer'].unpack('L*')[0]
# Finds the hash.
2013-07-15 14:51:55 +00:00
client.railgun.kernel32.SetFilePointer(handle, hash_offset, 0, nil)
2013-07-14 12:30:54 +00:00
hh = client.railgun.kernel32.ReadFile(handle, 4, 4, 4, nil)
2013-07-15 12:38:42 +00:00
phash = hh['lpBuffer'].unpack('h*')[0].reverse
2013-07-14 12:30:54 +00:00
# Finds the LastModified timestamp (MACE)
lm = client.priv.fs.get_file_mace(filename)
2013-07-15 14:51:55 +00:00
lmod = lm['Modified'].utc
2013-07-14 12:30:54 +00:00
# Finds the Creation timestamp (MACE)
cr = client.priv.fs.get_file_mace(filename)
2013-07-15 14:51:55 +00:00
creat = cr['Created'].utc
2013-07-14 12:30:54 +00:00
2013-07-15 14:51:55 +00:00
# Saves the results to the table and closes the file handle
2013-07-15 12:38:42 +00:00
if name.nil? or count.nil? or hh.nil? or lm.nil? or cr.nil?
print_error("Could not access file: %s." % filename)
else
table << [lmod,creat,prun,phash,pname]
end
2013-07-14 12:30:54 +00:00
client.railgun.kernel32.CloseHandle(handle)
end
end
def run
print_status("Prefetch Gathering started.")
if not is_admin?
print_error("You don't have enough privileges. Try getsystem.")
return nil
end
2013-07-14 14:24:27 +00:00
2013-07-14 12:30:54 +00:00
begin
# Check to see what Windows Version is running.
# Needed for offsets.
# Tested on WinXP and Win7 systems. Should work on WinVista & Win2k3..
# http://www.forensicswiki.org/wiki/Prefetch
2013-07-14 21:19:32 +00:00
# http://www.forensicswiki.org/wiki/Windows_Prefetch_File_Format
2013-07-14 14:24:27 +00:00
sysnfo = client.sys.config.sysinfo['OS']
2013-07-15 14:51:55 +00:00
if sysnfo =~/(Windows XP)/
# Offsets for WinXP
2013-07-14 14:24:27 +00:00
print_good("Detected Windows XP (max 128 entries)")
2013-07-14 12:30:54 +00:00
name_offset = 0x10
hash_offset = 0x4C
lastrun_offset = 0x78
runcount_offset = 0x90
2013-07-15 14:51:55 +00:00
# Registry key for timezone
key_value = "StandardName"
2013-07-14 12:30:54 +00:00
2013-07-15 14:51:55 +00:00
elsif sysnfo =~/(Windows 7)/
# Offsets for Win7
2013-07-14 14:24:27 +00:00
print_good("Detected Windows 7 (max 128 entries)")
2013-07-14 12:30:54 +00:00
name_offset = 0x10
hash_offset = 0x4C
lastrun_offset = 0x80
runcount_offset = 0x98
2013-07-15 14:51:55 +00:00
# Registry key for timezone
key_value = "TimeZoneKeyName"
2013-07-14 12:30:54 +00:00
else
2013-07-15 13:07:45 +00:00
print_error("No offsets for the target Windows version. Currently works only on WinXP and Win7.")
2013-07-14 12:30:54 +00:00
return nil
end
2013-07-15 12:38:42 +00:00
table = Rex::Ui::Text::Table.new(
'Header' => "Prefetch Information",
'Indent' => 1,
'Columns' =>
[
"Modified (mace)",
"Created (mace)",
"Run Count",
"Hash",
"Filename"
])
2013-07-14 12:30:54 +00:00
print_status("Searching for Prefetch Registry Value.")
2013-07-14 14:24:27 +00:00
2013-07-14 12:30:54 +00:00
prefetch_key_value
2013-07-15 16:34:44 +00:00
print_line("")
print_status("Searching for TimeZone Registry Values.")
2013-07-14 14:24:27 +00:00
2013-07-15 14:51:55 +00:00
timezone_key_values(key_value)
2013-07-14 14:24:27 +00:00
print_good("Current UTC Time: %s" % Time.now.utc)
2013-07-14 12:30:54 +00:00
sysroot = client.fs.file.expand_path("%SYSTEMROOT%")
full_path = sysroot + "\\Prefetch\\"
file_type = "*.pf"
2013-07-15 12:38:42 +00:00
print_status("Gathering information from remote system. This will take awhile..")
2013-07-14 12:30:54 +00:00
2013-07-14 14:24:27 +00:00
# Goes through the files in Prefetch directory, creates file paths for the
# gather_prefetch_info function that enumerates all the pf info
2013-07-14 12:30:54 +00:00
getfile_prefetch_filenames = client.fs.file.search(full_path,file_type,recurse=false,timeout=-1)
getfile_prefetch_filenames.each do |file|
if file.empty? or file.nil?
2013-07-15 12:38:42 +00:00
print_error("Could not open file: %s." % file['name'])
2013-07-14 12:30:54 +00:00
else
filename = File.join(file['path'], file['name'])
2013-07-15 12:38:42 +00:00
gather_prefetch_info(name_offset, hash_offset, lastrun_offset, runcount_offset, filename, table)
2013-07-14 12:30:54 +00:00
end
end
end
2013-07-15 12:38:42 +00:00
2013-07-15 14:51:55 +00:00
# Stores and prints out results
2013-07-15 12:38:42 +00:00
results = table.to_s
loot = store_loot("prefetch_info", "text/plain", session, results, nil, "Prefetch Information")
print_line("\n" + results + "\n")
print_status("Finished gathering information from prefetch files.")
print_status("Results stored in: #{loot}")
2013-07-14 12:30:54 +00:00
end
end