2011-01-12 18:29:56 +00:00
|
|
|
##
|
|
|
|
# $Id$
|
|
|
|
##
|
2011-01-12 02:16:06 +00:00
|
|
|
|
2011-01-12 18:29:56 +00:00
|
|
|
##
|
|
|
|
# This file is part of the Metasploit Framework and may be subject to
|
2011-01-12 02:16:06 +00:00
|
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
2012-02-21 01:40:50 +00:00
|
|
|
# web site for more information on licensing and terms of use.
|
|
|
|
# http://metasploit.com/
|
2011-01-12 18:29:56 +00:00
|
|
|
##
|
2011-01-12 02:16:06 +00:00
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
require 'rex'
|
|
|
|
require 'msf/core/post/windows/registry'
|
2012-01-30 06:44:45 +00:00
|
|
|
require 'msf/core/post/common'
|
2011-01-12 02:16:06 +00:00
|
|
|
|
|
|
|
class Metasploit3 < Msf::Post
|
|
|
|
|
2011-06-21 00:38:04 +00:00
|
|
|
include Msf::Post::Windows::Registry
|
2012-01-30 06:44:45 +00:00
|
|
|
include Msf::Post::Common
|
2011-01-12 02:16:06 +00:00
|
|
|
|
|
|
|
def initialize(info={})
|
|
|
|
super( update_info( info,
|
2011-04-27 16:25:15 +00:00
|
|
|
'Name' => 'Windows Gather Virtual Environment Detection',
|
2011-02-26 02:47:40 +00:00
|
|
|
'Description' => %q{
|
|
|
|
This module attempts to determine whether the system is running
|
|
|
|
inside of a virtual environment and if so, which one. This
|
|
|
|
module supports detectoin of Hyper-V, VMWare, Virtual PC,
|
2011-04-02 13:03:43 +00:00
|
|
|
VirtualBox, Xen, and QEMU.
|
2011-02-23 04:42:02 +00:00
|
|
|
},
|
2011-01-12 02:16:06 +00:00
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
|
|
|
'Version' => '$Revision$',
|
|
|
|
'Platform' => [ 'windows' ],
|
|
|
|
'SessionTypes' => [ 'meterpreter' ]
|
|
|
|
))
|
|
|
|
end
|
|
|
|
|
|
|
|
# Method for detecting if it is a Hyper-V VM
|
|
|
|
def hypervchk(session)
|
|
|
|
begin
|
|
|
|
vm = false
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SOFTWARE\Microsoft', KEY_READ)
|
|
|
|
sfmsvals = key.enum_key
|
|
|
|
if sfmsvals.include?("Hyper-V")
|
|
|
|
vm = true
|
|
|
|
elsif sfmsvals.include?("VirtualMachine")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
key.close
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SYSTEM\ControlSet001\Services', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("vmicheartbeat")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("vmicvss")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("vmicshutdown")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("vmicexchange")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
|
|
|
print_status("This is a Hyper-V Virtual Machine")
|
|
|
|
return "MS Hyper-V"
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Method for checking if it is a VMware VM
|
|
|
|
def vmwarechk(session)
|
|
|
|
vm = false
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SYSTEM\ControlSet001\Services', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("vmdebug")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("vmmouse")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("VMTools")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("VMMEMCTL")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
key.close
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0')
|
|
|
|
if key.query_value('Identifier').data.downcase =~ /vmware/
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
2011-01-29 01:55:47 +00:00
|
|
|
key.close
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
vmwareprocs = [
|
|
|
|
"vmwareuser.exe",
|
|
|
|
"vmwaretray.exe"
|
|
|
|
]
|
2011-01-29 01:55:47 +00:00
|
|
|
session.sys.process.get_processes().each do |x|
|
|
|
|
vmwareprocs.each do |p|
|
2011-01-12 02:16:06 +00:00
|
|
|
if p == (x['name'].downcase)
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
|
|
|
print_status("This is a VMware Virtual Machine")
|
|
|
|
return "VMWare"
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Method for checking if it is a Virtual PC VM
|
|
|
|
def checkvrtlpc(session)
|
|
|
|
vm = false
|
|
|
|
vpcprocs = [
|
|
|
|
"vmusrvc.exe",
|
|
|
|
"vmsrvc.exe"
|
|
|
|
]
|
2011-01-29 01:55:47 +00:00
|
|
|
session.sys.process.get_processes().each do |x|
|
|
|
|
vpcprocs.each do |p|
|
2011-01-12 02:16:06 +00:00
|
|
|
if p == (x['name'].downcase)
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SYSTEM\ControlSet001\Services', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
2011-11-20 01:53:25 +00:00
|
|
|
|
2011-06-12 14:50:55 +00:00
|
|
|
if srvvals.include?("vpc-s3")
|
2011-01-12 02:16:06 +00:00
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("vpcuhub")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("msvmmouf")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
key.close
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
|
|
|
print_status("This is a VirtualPC Virtual Machine")
|
|
|
|
return "VirtualPC"
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Method for checking if it is a VirtualBox VM
|
|
|
|
def vboxchk(session)
|
|
|
|
vm = false
|
|
|
|
vboxprocs = [
|
|
|
|
"vboxservice.exe",
|
|
|
|
"vboxtray.exe"
|
|
|
|
]
|
2011-01-29 01:55:47 +00:00
|
|
|
session.sys.process.get_processes().each do |x|
|
|
|
|
vboxprocs.each do |p|
|
2011-01-12 02:16:06 +00:00
|
|
|
if p == (x['name'].downcase)
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\DSDT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("VBOX__")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\FADT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("VBOX__")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\RSDT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("VBOX__")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0')
|
|
|
|
if key.query_value('Identifier').data.downcase =~ /vbox/
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\DESCRIPTION\System')
|
|
|
|
if key.query_value('SystemBiosVersion').data.downcase =~ /vbox/
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SYSTEM\ControlSet001\Services', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("VBoxMouse")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("VBoxGuest")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("VBoxService")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("VBoxSF")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
key.close
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
2012-06-06 05:36:17 +00:00
|
|
|
print_status("This is a Sun VirtualBox Virtual Machine")
|
2012-01-26 19:02:39 +00:00
|
|
|
return "VirtualBox"
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Method for checking if it is a Xen VM
|
|
|
|
def xenchk(session)
|
|
|
|
vm = false
|
|
|
|
xenprocs = [
|
|
|
|
"xenservice.exe"
|
|
|
|
]
|
2011-01-29 01:55:47 +00:00
|
|
|
session.sys.process.get_processes().each do |x|
|
|
|
|
xenprocs.each do |p|
|
2011-01-12 02:16:06 +00:00
|
|
|
if p == (x['name'].downcase)
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\DSDT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("Xen")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\FADT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("Xen")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\ACPI\RSDT', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("Xen")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'SYSTEM\ControlSet001\Services', KEY_READ)
|
|
|
|
srvvals = key.enum_key
|
|
|
|
if srvvals.include?("xenevtchn")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("xennet")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("xennet6")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("xensvc")
|
|
|
|
vm = true
|
|
|
|
elsif srvvals.include?("xenvdb")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
key.close
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
|
|
|
print_status("This is a Xen Virtual Machine")
|
|
|
|
return "Xen"
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
|
|
|
|
2011-04-02 13:03:43 +00:00
|
|
|
def qemuchk(session)
|
|
|
|
vm = false
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0')
|
|
|
|
if key.query_value('Identifier').data.downcase =~ /qemu/
|
|
|
|
print_status("This is a QEMU/KVM Virtual Machine")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if not vm
|
|
|
|
begin
|
|
|
|
key = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, 'HARDWARE\DESCRIPTION\System\CentralProcessor\0')
|
|
|
|
if key.query_value('ProcessorNameString').data.downcase =~ /qemu/
|
|
|
|
print_status("This is a QEMU/KVM Virtual Machine")
|
|
|
|
vm = true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2012-01-26 19:02:39 +00:00
|
|
|
if vm
|
|
|
|
return "Qemu/KVM"
|
|
|
|
end
|
2011-04-02 13:03:43 +00:00
|
|
|
end
|
|
|
|
|
2011-01-12 02:16:06 +00:00
|
|
|
# run Method
|
|
|
|
def run
|
|
|
|
print_status("Checking if #{sysinfo['Computer']} is a Virtual Machine .....")
|
|
|
|
found = hypervchk(session)
|
2012-01-26 19:02:39 +00:00
|
|
|
found ||= vmwarechk(session)
|
|
|
|
found ||= checkvrtlpc(session)
|
|
|
|
found ||= vboxchk(session)
|
|
|
|
found ||= xenchk(session)
|
|
|
|
found ||= qemuchk(session)
|
|
|
|
if found
|
|
|
|
report_vm(found)
|
|
|
|
else
|
|
|
|
print_status("#{sysinfo['Computer']} appears to be a Physical Machine")
|
|
|
|
end
|
2011-01-12 02:16:06 +00:00
|
|
|
end
|
2012-01-26 19:02:39 +00:00
|
|
|
|
2011-01-12 18:29:56 +00:00
|
|
|
end
|