2012-01-24 16:16:56 +00:00
|
|
|
##
|
2013-10-15 18:50:46 +00:00
|
|
|
# This module requires Metasploit: http//metasploit.com/download
|
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2013-03-07 23:53:19 +00:00
|
|
|
##
|
|
|
|
|
2012-01-24 16:16:56 +00:00
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Auxiliary::Scanner
|
2014-08-22 17:49:28 +00:00
|
|
|
include Msf::Auxiliary::NATPMP
|
2014-08-22 18:01:17 +00:00
|
|
|
include Rex::Proto::NATPMP
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'NAT-PMP External Port Scanner',
|
|
|
|
'Description' => 'Scan NAT devices for their external listening ports using NAT-PMP',
|
|
|
|
'Author' => 'Jon Hart <jhart[at]spoofed.org>',
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
OptString.new('PORTS', [true, "Ports to scan (e.g. 22-25,80,110-900)", "1-1000"]),
|
|
|
|
OptEnum.new('PROTOCOL', [true, "Protocol to scan", 'TCP', %w(TCP UDP)]),
|
|
|
|
], self.class)
|
|
|
|
end
|
|
|
|
|
2014-10-14 21:20:24 +00:00
|
|
|
def run_host(host)
|
|
|
|
begin
|
|
|
|
|
|
|
|
udp_sock = Rex::Socket::Udp.create({
|
|
|
|
'LocalHost' => datastore['CHOST'] || nil,
|
|
|
|
'Context' => {'Msf' => framework, 'MsfExploit' => self}
|
|
|
|
})
|
|
|
|
add_socket(udp_sock)
|
|
|
|
|
|
|
|
# new
|
|
|
|
external_address = get_external_address(udp_sock, host, datastore['RPORT']) || host
|
|
|
|
actual_ext_port = map_port(udp_sock, host, datastore['RPORT'], datastore['INTERNAL_PORT'], datastore['EXTERNAL_PORT'], Rex::Proto::NATPMP.const_get(datastore['PROTOCOL']), datastore['LIFETIME'])
|
|
|
|
|
|
|
|
if actual_ext_port
|
|
|
|
map_target = Rex::Socket.source_address(host)
|
|
|
|
if (datastore['EXTERNAL_PORT'] != actual_ext_port)
|
|
|
|
print_status( "#{external_address} " +
|
|
|
|
"#{datastore['EXTERNAL_PORT']}/#{datastore['PROTOCOL']} -> #{map_target} " +
|
|
|
|
"#{datastore['INTERNAL_PORT']}/#{datastore['PROTOCOL']} couldn't be forwarded")
|
|
|
|
end
|
|
|
|
print_status( "#{external_address} " +
|
|
|
|
"#{actual_ext_port}/#{datastore['PROTOCOL']} -> #{map_target} " +
|
|
|
|
"#{datastore['INTERNAL_PORT']}/#{datastore['PROTOCOL']} forwarded")
|
|
|
|
|
|
|
|
# report NAT-PMP as being open
|
|
|
|
report_service(
|
|
|
|
:host => host,
|
|
|
|
:port => datastore['RPORT'],
|
|
|
|
:proto => 'udp',
|
|
|
|
:name => 'natpmp',
|
|
|
|
:state => Msf::ServiceState::Open
|
|
|
|
)
|
|
|
|
end
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionRefused
|
|
|
|
nil
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error("Unknown error: #{e.class} #{e.backtrace}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def run_host(host)
|
|
|
|
begin
|
|
|
|
udp_sock = Rex::Socket::Udp.create({
|
|
|
|
'LocalHost' => datastore['CHOST'] || nil,
|
|
|
|
'Context' => {'Msf' => framework, 'MsfExploit' => self} }
|
|
|
|
)
|
|
|
|
add_socket(udp_sock)
|
2014-08-26 19:27:12 +00:00
|
|
|
peer = "#{host}:#{datastore['RPORT']}"
|
|
|
|
vprint_status("#{peer} Scanning #{datastore['PROTOCOL']} ports #{datastore['PORTS']} using NATPMP")
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
# first, send a request to get the external address
|
2014-08-26 19:27:12 +00:00
|
|
|
udp_sock.sendto(external_address_request, host, datastore['RPORT'], 0)
|
2013-08-30 21:28:54 +00:00
|
|
|
external_address = nil
|
|
|
|
while (r = udp_sock.recvfrom(12, 0.25) and r[1])
|
2014-08-22 18:01:17 +00:00
|
|
|
(ver,op,result,epoch,external_address) = parse_external_address_response(r[0])
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
if (external_address)
|
2014-08-26 19:27:12 +00:00
|
|
|
print_good("#{peer} responded with external address of #{external_address}")
|
2013-08-30 21:28:54 +00:00
|
|
|
else
|
2014-08-26 19:34:10 +00:00
|
|
|
vprint_status("#{peer} didn't respond with an external address")
|
2013-08-30 21:28:54 +00:00
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
Rex::Socket.portspec_crack(datastore['PORTS']).each do |port|
|
|
|
|
# send one request to clear the mapping if *we've* created it before
|
2014-08-22 18:01:17 +00:00
|
|
|
clear_req = map_port_request(port, port, Rex::Proto::NATPMP.const_get(datastore['PROTOCOL']), 0)
|
2014-08-26 19:27:12 +00:00
|
|
|
udp_sock.sendto(clear_req, host, datastore['RPORT'], 0)
|
2013-08-30 21:28:54 +00:00
|
|
|
while (r = udp_sock.recvfrom(16, 1.0) and r[1])
|
|
|
|
end
|
|
|
|
|
|
|
|
# now try the real mapping
|
2014-08-22 18:01:17 +00:00
|
|
|
map_req = map_port_request(port, port, Rex::Proto::NATPMP.const_get(datastore['PROTOCOL']), 1)
|
2014-08-26 19:27:12 +00:00
|
|
|
udp_sock.sendto(map_req, host, datastore['RPORT'], 0)
|
2013-08-30 21:28:54 +00:00
|
|
|
while (r = udp_sock.recvfrom(16, 1.0) and r[1])
|
|
|
|
handle_reply(host, external_address, r)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
rescue ::Interrupt
|
|
|
|
raise $!
|
|
|
|
rescue ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionRefused
|
|
|
|
nil
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error("Unknown error: #{e.class} #{e.backtrace}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def handle_reply(host, external_addr, pkt)
|
|
|
|
return if not pkt[1]
|
|
|
|
|
|
|
|
if(pkt[1] =~ /^::ffff:/)
|
|
|
|
pkt[1] = pkt[1].sub(/^::ffff:/, '')
|
|
|
|
end
|
|
|
|
host = pkt[1]
|
|
|
|
protocol = datastore['PROTOCOL'].to_s.downcase
|
|
|
|
|
2014-08-22 18:01:17 +00:00
|
|
|
(ver, op, result, epoch, int, ext, lifetime) = parse_map_port_response(pkt[0])
|
2014-08-26 19:27:12 +00:00
|
|
|
peer = "#{host}:#{datastore['RPORT']}"
|
2013-08-30 21:28:54 +00:00
|
|
|
if (result == 0)
|
|
|
|
# we always ask to map an external port to the same port on us. If
|
|
|
|
# we get a successful reponse back but the port we requested be forwarded
|
|
|
|
# is different, that means that someone else already has it open
|
|
|
|
if (int != ext)
|
|
|
|
state = Msf::ServiceState::Open
|
2014-08-26 19:27:12 +00:00
|
|
|
print_good("#{peer} #{external_addr} - #{int}/#{protocol} #{state} because of successful mapping with unmatched ports")
|
2013-08-30 21:28:54 +00:00
|
|
|
else
|
|
|
|
state = Msf::ServiceState::Closed
|
2014-08-26 19:27:12 +00:00
|
|
|
print_status("#{peer} #{external_addr} - #{int}/#{protocol} #{state} because of successful mapping with matched ports") if (datastore['DEBUG'])
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
|
|
|
else
|
|
|
|
state = Msf::ServiceState::Closed
|
2014-08-26 19:27:12 +00:00
|
|
|
print_status("#{peer} #{external_addr} - #{int}/#{protocol} #{state} because of code #{result} response") if (datastore['DEBUG'])
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
|
|
|
|
2014-02-24 20:46:08 +00:00
|
|
|
if inside_workspace_boundary?(external_addr)
|
2013-08-30 21:28:54 +00:00
|
|
|
report_service(
|
|
|
|
:host => external_addr,
|
|
|
|
:port => int,
|
|
|
|
:proto => protocol,
|
|
|
|
:state => state
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
report_service(
|
|
|
|
:host => host,
|
|
|
|
:port => pkt[2],
|
|
|
|
:name => 'natpmp',
|
|
|
|
:proto => 'udp',
|
|
|
|
:state => Msf::ServiceState::Open
|
|
|
|
)
|
|
|
|
end
|
2012-01-24 16:16:56 +00:00
|
|
|
end
|