metasploit-framework/modules/auxiliary/gather/external_ip.rb

53 lines
1.4 KiB
Ruby
Raw Normal View History

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
# Exploit mixins should be called first
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report
def initialize
super(
'Name' => 'Discover External IP via Ifconfig.me',
'Description' => %q{
This module checks for the public source IP address of the current
route to the RHOST by querying the public web application at ifconfig.me.
It should be noted this module will register activity on ifconfig.me,
which is not affiliated with Metasploit.
2013-03-20 20:04:31 +00:00
},
'Author' => ['RageLtMan'],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://ifconfig.me/ip' ],
]
)
register_options(
[
2013-03-11 19:35:25 +00:00
Opt::RHOST('ifconfig.me'),
OptBool.new('REPORT_HOST', [false, 'Add the found IP to the database', false])
], self.class)
end
def run
2013-03-11 19:35:25 +00:00
connect
2013-03-11 19:36:47 +00:00
res = send_request_cgi({'uri' => '/ip', 'method' => 'GET' })
2013-03-11 19:35:25 +00:00
our_addr = res.body.strip
if Rex::Socket.is_ipv4?(our_addr) or Rex::Socket.is_ipv6?(our_addr)
print_good("Source ip to #{rhost} is #{our_addr}")
report_host(our_addr) if datastore['REPORT_HOST']
end
end
2013-03-11 19:35:25 +00:00
end