Land #4489, Update SMB admin modules to use Scanner & fixes

bug/bundler_fix
wchen-r7 2015-12-08 14:49:26 -06:00
commit 080ec26afb
No known key found for this signature in database
GPG Key ID: 2384DB4EF06F730B
8 changed files with 272 additions and 54 deletions

View File

@ -30,7 +30,9 @@ require 'msf/core/exploit/ntlm'
require 'msf/core/exploit/dcerpc'
require 'msf/core/exploit/smb/client'
require 'msf/core/exploit/smb/client/authenticated'
require 'msf/core/exploit/smb/client/local_paths'
require 'msf/core/exploit/smb/client/psexec'
require 'msf/core/exploit/smb/client/remote_paths'
require 'msf/core/exploit/smb/server'
require 'msf/core/exploit/smb/server/share'
require 'msf/core/exploit/ftp'

View File

@ -0,0 +1,29 @@
# -*- coding: binary -*-
module Msf
# Mixin for handling options related to local files in SMB modules
module Exploit::Remote::SMB::Client::LocalPaths
def initialize(info = {})
super
register_options(
[
OptString.new('LPATH', [false, 'The path of the local file to utilize']),
OptPath.new('FILE_LPATHS', [false, 'A file containing a list of local files to utilize'])
], self.class)
end
def setup
unless (datastore['FILE_LPATHS'] && !datastore['LPATH']) || (!datastore['FILE_LPATHS'] && datastore['LPATH'])
fail_with(::Msf::Module::Failure::BadConfig, 'One and only one of FILE_LPATHS or LPATH must be specified')
end
end
def local_paths
if datastore['FILE_LPATHS']
IO.readlines(datastore['FILE_LPATHS']).map(&:strip)
elsif datastore['LPATH']
[datastore['LPATH']]
end
end
end
end

View File

@ -0,0 +1,29 @@
# -*- coding: binary -*-
module Msf
# Mixin for handling options related to remote files in SMB modules
module Exploit::Remote::SMB::Client::RemotePaths
def initialize(info = {})
super
register_options(
[
OptString.new('RPATH', [false, 'The name of the remote file relative to the share to operate on']),
OptPath.new('FILE_RPATHS', [false, 'A file containing a list remote files relative to the share to operate on'])
], self.class)
end
def setup
unless (datastore['FILE_RPATHS'] && !datastore['RPATH']) || (!datastore['FILE_RPATHS'] && datastore['RPATH'])
fail_with(::Msf::Module::Failure::BadConfig, 'One and only one of FILE_RPATHS or RPATH must be specified')
end
end
def remote_paths
if datastore['FILE_RPATHS']
IO.readlines(datastore['FILE_RPATHS']).map(&:strip)
elsif datastore['RPATH']
[datastore['RPATH']]
end
end
end
end

View File

@ -10,7 +10,9 @@ class Metasploit3 < Msf::Auxiliary
# Exploit mixins should be called first
include Msf::Exploit::Remote::SMB::Client
include Msf::Exploit::Remote::SMB::Client::Authenticated
include Msf::Exploit::Remote::SMB::Client::RemotePaths
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
# Aliases for common classes
SIMPLE = Rex::Proto::SMB::SimpleClient
@ -34,32 +36,41 @@ class Metasploit3 < Msf::Auxiliary
)
register_options([
OptString.new('SMBSHARE', [true, 'The name of a share on the RHOST', 'C$']),
OptString.new('RPATH', [true, 'The name of the remote file relative to the share'])
OptString.new('SMBSHARE', [true, 'The name of a share on the RHOST', 'C$'])
], self.class)
end
def smb_delete_file
print_status("Connecting to the server...")
def peer
"#{rhost}:#{rport}"
end
def smb_delete_files
vprint_status("#{peer}: Connecting to the server...")
connect()
smb_login()
print_status("Mounting the remote share \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}'...")
vprint_status("#{peer}: Mounting the remote share \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}'...")
self.simple.connect("\\\\#{rhost}\\#{datastore['SMBSHARE']}")
simple.delete("\\#{datastore['RPATH']}")
remote_paths.each do |remote_path|
begin
simple.delete("\\#{remote_path}")
# If there's no exception raised at this point, we assume the file has been removed.
print_status("File deleted: #{datastore['RPATH']}...")
end
def run
begin
smb_delete_file
rescue Rex::Proto::SMB::Exceptions::LoginError => e
print_error("Unable to login: #{e.message}")
print_good("#{peer}: Deleted: #{remote_path}")
rescue Rex::Proto::SMB::Exceptions::ErrorCode => e
print_error("Cannot delete the file: #{e.message}")
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer}: Cannot delete #{remote_path}: #{e.message}")
end
end
end
def run_host(_ip)
begin
smb_delete_files
rescue Rex::Proto::SMB::Exceptions::LoginError => e
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer}: Unable to login: #{e.message}")
end
end

View File

@ -10,7 +10,9 @@ class Metasploit3 < Msf::Auxiliary
# Exploit mixins should be called first
include Msf::Exploit::Remote::SMB::Client
include Msf::Exploit::Remote::SMB::Client::Authenticated
include Msf::Exploit::Remote::SMB::Client::RemotePaths
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
# Aliases for common classes
SIMPLE = Rex::Proto::SMB::SimpleClient
@ -34,42 +36,50 @@ class Metasploit3 < Msf::Auxiliary
)
register_options([
OptString.new('SMBSHARE', [true, 'The name of a share on the RHOST', 'C$']),
OptString.new('RPATH', [true, 'The name of the remote file relative to the share'])
OptString.new('SMBSHARE', [true, 'The name of a share on the RHOST', 'C$'])
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def smb_download
print_status("Connecting to the #{rhost}:#{rport}...")
vprint_status("#{peer}: Connecting...")
connect()
smb_login()
print_status("Mounting the remote share \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}'...")
vprint_status("#{peer}: Mounting the remote share \\\\#{rhost}\\#{datastore['SMBSHARE']}'...")
self.simple.connect("\\\\#{rhost}\\#{datastore['SMBSHARE']}")
print_status("Trying to download #{datastore['RPATH']}...")
remote_paths.each do |remote_path|
begin
vprint_status("#{peer}: Trying to download #{remote_path}...")
data = ''
fd = simple.open("\\#{datastore['RPATH']}", 'ro')
fd = simple.open("\\#{remote_path}", 'ro')
begin
data = fd.read
ensure
fd.close
end
fname = datastore['RPATH'].split("\\")[-1]
fname = remote_path.split("\\")[-1]
path = store_loot("smb.shares.file", "application/octet-stream", rhost, data, fname)
print_good("#{fname} saved as: #{path}")
print_good("#{peer}: #{remote_path} saved as: #{path}")
rescue Rex::Proto::SMB::Exceptions::ErrorCode => e
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer} Unable to download #{remote_path}: #{e.message}")
end
end
end
def run
def run_host(ip)
begin
smb_download
rescue Rex::Proto::SMB::Exceptions::LoginError => e
print_error("Unable to login: #{e.message}")
rescue Rex::Proto::SMB::Exceptions::ErrorCode => e
print_error("Unable to download the file: #{e.message}")
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer} Unable to login: #{e.message}")
end
end

View File

@ -11,7 +11,11 @@ class Metasploit3 < Msf::Auxiliary
# Exploit mixins should be called first
include Msf::Exploit::Remote::SMB::Client
include Msf::Exploit::Remote::SMB::Client::Authenticated
include Msf::Exploit::Remote::SMB::Client::LocalPaths
include Msf::Exploit::Remote::SMB::Client::RemotePaths
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
# Aliases for common classes
SIMPLE = Rex::Proto::SMB::SimpleClient
@ -38,32 +42,43 @@ class Metasploit3 < Msf::Auxiliary
)
register_options([
OptString.new('SMBSHARE', [true, 'The name of a writeable share on the server', 'C$']),
OptString.new('RPATH', [true, 'The name of the remote file relative to the share']),
OptString.new('LPATH', [true, 'The path of the local file to upload'])
OptString.new('SMBSHARE', [true, 'The name of a writeable share on the server', 'C$'])
], self.class)
end
def run
def peer
"#{rhost}:#{rport}"
end
data = ::File.read(datastore['LPATH'], ::File.size(datastore['LPATH']))
print_status("Read #{data.length} bytes from #{datastore['LPATH']}...")
print_status("Connecting to the server...")
def run_host(_ip)
begin
vprint_status("#{peer}: Connecting to the server...")
connect()
smb_login()
print_status("Mounting the remote share \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}'...")
vprint_status("#{peer}: Mounting the remote share \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}'...")
self.simple.connect("\\\\#{rhost}\\#{datastore['SMBSHARE']}")
print_status("Trying to upload #{datastore['RPATH']}...")
remote_path = remote_paths.first
local_paths.each do |local_path|
begin
vprint_status("#{peer}: Trying to upload #{local_path} to #{remote_path}...")
fd = simple.open("\\#{datastore['RPATH']}", 'rwct')
fd = simple.open("\\#{remote_path}", 'rwct')
data = ::File.read(datastore['LPATH'], ::File.size(datastore['LPATH']))
fd.write(data)
fd.close
print_status("The file has been uploaded to #{datastore['RPATH']}...")
print_good("#{peer}: #{local_path} uploaded to #{remote_path}")
rescue Rex::Proto::SMB::Exceptions::ErrorCode => e
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer} Unable to upload #{local_path} to #{remote_path} : #{e.message}")
end
end
rescue Rex::Proto::SMB::Exceptions::LoginError => e
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
print_error("#{peer} Unable to login: #{e.message}")
end
end
end

View File

@ -0,0 +1,61 @@
# -*- coding:binary -*-
require 'spec_helper'
require 'msf/core'
require 'msf/core/data_store'
describe Msf::Exploit::Remote::SMB::Client::LocalPaths do
subject do
mod = ::Msf::Module.new
mod.extend described_class
mod
end
before(:all) do
prefix = "local_#{Rex::Text.rand_text_alpha(10)}"
# create a single random file to be used for LPATH
@lpath = prefix
# create file containing several random file names to be used for FILE_LPATHS
@indices = Array(0..(1 + rand(5))).map(&:to_s)
@file_lpaths = Tempfile.new(prefix)
File.open(@file_lpaths, 'wb') do |f|
@indices.map do |i|
f.puts(i)
end
end
end
describe '#setup' do
context 'when PATH and FILE_LPATHS are not set correctly' do
it 'raises if both are set' do
subject.datastore['LPATH'] = @lpath
subject.datastore['FILE_LPATHS'] = @file_lpaths
expect { subject.setup }.to raise_error(RuntimeError, /bad\-config/)
end
it 'should raise if neither are set' do
expect { subject.setup }.to raise_error(RuntimeError, /bad\-config/)
end
end
end
describe '#local_paths' do
context 'when LPATH and FILE_LPATHS are set correctly' do
it 'returns one remote file if LPATH is set' do
subject.datastore['LPATH'] = @lpath
expect(subject.local_paths).to eql([@lpath])
end
it 'returns all files if FILE_LPATHS is set' do
subject.datastore['FILE_LPATHS'] = @file_lpaths
expect(subject.local_paths).to eql(@indices)
end
end
end
after(:all) do
@file_lpaths.unlink
end
end

View File

@ -0,0 +1,61 @@
# -*- coding:binary -*-
require 'spec_helper'
require 'msf/core'
require 'msf/core/data_store'
describe Msf::Exploit::Remote::SMB::Client::RemotePaths do
subject do
mod = ::Msf::Module.new
mod.extend described_class
mod
end
before(:all) do
prefix = "remote_#{Rex::Text.rand_text_alpha(10)}"
# create a single random file to be used for RPATH
@rpath = prefix
# create file containing several random file names to be used for FILE_RPATHS
@indices = Array(0..(1 + rand(5))).map(&:to_s)
@file_rpaths = Tempfile.new(prefix)
File.open(@file_rpaths, 'wb') do |f|
@indices.map do |i|
f.puts(i)
end
end
end
describe '#setup' do
context 'when RPATH and FILE_RPATHS are not set correctly' do
it 'raises if both are set' do
subject.datastore['RPATH'] = @rpath
subject.datastore['FILE_RPATHS'] = @file_rpaths
expect { subject.setup }.to raise_error(RuntimeError, /bad\-config/)
end
it 'raises if neither are set' do
expect { subject.setup }.to raise_error(RuntimeError, /bad\-config/)
end
end
end
describe '#remote_paths' do
context 'when RPATH and FILE_RPATHS are set correctly' do
it 'returns one remote file if rpath is set' do
subject.datastore['RPATH'] = @rpath
expect(subject.remote_paths).to eql([@rpath])
end
it 'returns all files if FILE_RPATHS is set' do
subject.datastore['FILE_RPATHS'] = @file_rpaths
expect(subject.remote_paths).to eql(@indices)
end
end
end
after(:all) do
@file_rpaths.unlink
end
end