metasploit-framework/modules/post/windows/gather/enum_applications.rb

72 lines
1.8 KiB
Ruby
Raw Normal View History

#
# $Id$ ##
# ## This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/ ##
require 'msf/core'
require 'rex'
require 'msf/core/post/windows/registry'
class Metasploit3 < Msf::Post
include Msf::Post::Registry
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate Installed Applications',
'Description' => %q{ This module will enumerate installed application on a target host},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
'Version' => '$Revision$',
'Platform' => [ 'windows' ],
'SessionTypes' => [ 'meterpreter' ]
))
end
def app_list
tbl = Rex::Ui::Text::Table.new(
'Header' => "Installed Applications",
'Indent' => 1,
'Columns' =>
[
"Name",
"Version"
])
appkeys = ['HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall',
'HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall' ]
threadnum = 0
a = []
appkeys.each do |keyx86|
registry_enumkeys(keyx86).each do |k|
if threadnum < 10
a.push(::Thread.new {
begin
dispnm = registry_getvaldata("#{keyx86}\\#{k}","DisplayName")
dispversion = registry_getvaldata("#{keyx86}\\#{k}","DisplayVersion")
tbl << [dispnm,dispversion]
rescue
end
})
threadnum += 1
else
sleep(0.5) and a.delete_if {|x| not x.alive?} while not a.empty?
threadnum = 0
end
end
end
print_line("\n" + tbl.to_s + "\n")
end
def run
print_status("Enumerating applications installed on #{sysinfo['Computer']}")
app_list
end
end