2012-06-05 16:36:45 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2012-06-05 16:36:45 +00:00
|
|
|
##
|
|
|
|
|
2012-05-29 18:34:33 +00:00
|
|
|
require 'msf/core'
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Auxiliary
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Exploit::Remote::Tcp
|
|
|
|
include Msf::Auxiliary::Scanner
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'Modbus Version Scanner',
|
|
|
|
'Description' => %q{
|
|
|
|
This module detects the Modbus service, tested on a SAIA PCD1.M2 system.
|
|
|
|
Modbus is a clear text protocol used in common SCADA systems, developed
|
|
|
|
originally as a serial-line (RS232) async protocol, and later transformed to IP,
|
|
|
|
which is called ModbusTCP.
|
|
|
|
},
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
[ 'URL', 'http://www.saia-pcd.com/en/products/plc/pcd-overview/Pages/pcd1-m2.aspx' ],
|
|
|
|
[ 'URL', 'http://en.wikipedia.org/wiki/Modbus:TCP' ]
|
|
|
|
],
|
|
|
|
'Author' => [ 'EsMnemon <esm[at]mnemonic.no>' ],
|
|
|
|
'DisclosureDate' => 'Nov 1 2011',
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
Opt::RPORT(502),
|
|
|
|
OptInt.new('UNIT_ID', [true, "ModBus Unit Identifier, 1..255, most often 1 ", 1]),
|
|
|
|
OptInt.new('TIMEOUT', [true, 'Timeout for the network probe', 10])
|
|
|
|
], self.class)
|
|
|
|
end
|
2012-05-29 18:34:33 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def run_host(ip)
|
2015-04-03 11:12:23 +00:00
|
|
|
# read input register=func:04, register 1
|
2013-08-30 21:28:54 +00:00
|
|
|
sploit="\x21\x00\x00\x00\x00\x06\x01\x04\x00\x01\x00\x00"
|
|
|
|
sploit[6] = [datastore['UNIT_ID']].pack("C")
|
|
|
|
connect()
|
|
|
|
sock.put(sploit)
|
|
|
|
data = sock.get_once
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
# Theory: When sending a modbus request of some sort, the endpoint will return
|
|
|
|
# with at least the same transaction-id, and protocol-id
|
|
|
|
if data
|
|
|
|
if data[0,4] == "\x21\x00\x00\x00"
|
|
|
|
print_good("#{ip}:#{rport} - MODBUS - received correct MODBUS/TCP header (unit-ID: #{datastore['UNIT_ID']})")
|
|
|
|
else
|
|
|
|
print_error("#{ip}:#{rport} - MODBUS - received incorrect data #{data[0,4].inspect} (not modbus/tcp?)")
|
|
|
|
end
|
|
|
|
else
|
|
|
|
vprint_status("#{ip}:#{rport} - MODBUS - did not receive data.")
|
|
|
|
end
|
2012-06-05 16:47:44 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
disconnect()
|
|
|
|
end
|
2012-05-29 18:34:33 +00:00
|
|
|
end
|