metasploit-framework/modules/auxiliary/scanner/snmp/snmp_enumusers.rb

70 lines
1.7 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::SNMPClient
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
2013-08-30 21:28:54 +00:00
def initialize
super(
'Name' => 'SNMP Windows Username Enumeration',
'Description' => "This module will use LanManager/psProcessUsername OID values to enumerate local user accounts on a Windows/Solaris system via SNMP",
2013-08-30 21:28:54 +00:00
'Author' => ['tebo[at]attackresearch.com'],
'License' => MSF_LICENSE
)
2013-08-30 21:28:54 +00:00
end
2013-08-30 21:28:54 +00:00
def run_host(ip)
begin
snmp = connect_snmp
2014-07-17 19:29:26 +00:00
sys_desc = snmp.get_value('sysDescr.0')
@users = []
case sys_desc
when /Windows/
2013-08-30 21:28:54 +00:00
snmp.walk("1.3.6.1.4.1.77.1.2.25") do |row|
row.each { |val| @users << val.value.to_s }
end
2014-07-17 19:29:26 +00:00
when /Sun/
snmp.walk("1.3.6.1.4.1.42.3.12.1.8") do |row|
row.each { |val| @users << val.value.to_s }
end
2014-07-17 19:29:26 +00:00
end
unless @users.empty?
@users.sort!
@users.uniq!
print_good("#{ip} Found Users: #{@users.size} users: #{@users.join(', ')}")
end
2013-08-30 21:28:54 +00:00
disconnect_snmp
2013-08-30 21:28:54 +00:00
report_note(
:host => rhost,
:port => datastore['RPORT'],
:proto => 'udp',
:sname => 'snmp',
:update => :unique_data,
:type => 'snmp.users',
:data => @users
)
2011-11-20 02:12:07 +00:00
2013-08-30 21:28:54 +00:00
rescue ::SNMP::UnsupportedVersion
rescue ::SNMP::RequestTimeout
rescue ::Interrupt
raise $!
rescue ::Exception => e
print_error("Unknown error: #{e.class} #{e}")
end
2013-08-30 21:28:54 +00:00
end
end