Fixes Cred Sourcing in report_auth_info() for post modules.

git-svn-id: file:///home/svn/framework3/trunk@14187 4d416f70-5f16-0410-b530-b9f4589650da
unstable
David Maloney 2011-11-08 03:34:49 +00:00
parent 28c2408fdd
commit 2d80d1e144
14 changed files with 43 additions and 3 deletions

View File

@ -59,9 +59,15 @@ class Metasploit3 < Msf::Post
print_good("Host: #{host} Port: #{port} User: #{user} Password: #{pass}")
auth =
{
:host => host, :port => port, :sname => 'ftp',
:user => user, :pass => pass,
:type => 'password', :active => true
:host => host,
:port => port,
:sname => 'ftp',
:user => user,
:pass => pass,
:type => 'password',
:source_id => session.db_record.id,
:source_type => "exploit",
:active => true
}
report_auth_info(auth)
end

View File

@ -63,6 +63,8 @@ class Metasploit3 < Msf::Post
data[:user] = hash.user_name
data[:pass] = hash.lanman + ":" + hash.ntlm
data[:type] = "smb_hash"
data[:source_id] = session.db_record.id,
data[:source_type] = "exploit",
data[:active] = true
print_line " Extracted: #{data[:user]}:#{data[:pass]}"

View File

@ -166,6 +166,8 @@ class Metasploit3 < Msf::Post
:user => cred["username"],
:pass => cred["password"],
:type => 'password',
:source_id => session.db_record.id,
:source_type => "exploit",
:active => true
}

View File

@ -148,6 +148,8 @@ class Metasploit3 < Msf::Post
:sname => 'mssql',
:user => full_user,
:pass => plaintext_passwd,
:source_id => session.db_record.id,
:source_type => "exploit",
:active => true
)
print_good("Added credentials to report database")

View File

@ -157,6 +157,8 @@ class Metasploit3 < Msf::Post
:user => cred['user'],
:pass => cred['password'],
:ptype => "MD5 hash",
:source_id => session.db_record.id,
:source_type => "exploit",
:target_host => config['ftp_bindip'],
:target_port => config['ftp_port']
)
@ -190,6 +192,8 @@ class Metasploit3 < Msf::Post
:user => 'admin',
:pass => config['admin_pass'],
:type => "password",
:source_id => session.db_record.id,
:source_type => "exploit",
:target_host => config['admin_bindip'],
:target_port => config['admin_port']
)

View File

@ -93,6 +93,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => port,
:sname => 'FTP',
:source_id => session.db_record.id,
:source_type => "exploit",
:user => username,
:pass => passwd)
end

View File

@ -79,6 +79,8 @@ class Metasploit3 < Msf::Post
:host => server,
:port => port,
:sname => 'ftp',
:source_id => session.db_record.id,
:source_type => "exploit",
:user => username,
:pass => dpass
)

View File

@ -91,6 +91,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => port,
:sname => proto,
:source_id => session.db_record.id,
:source_type => "exploit",
:user => user,
:pass => pass)
end

View File

@ -308,6 +308,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => portnum,
:sname => type,
:source_id => session.db_record.id,
:source_type => "exploit",
:user => user,
:pass => pass)
#print_status("CHK report_auth_info: host = #{host}, port= #{portnum}, sname= #{type}, user= #{user}, pass= #{pass}")
@ -318,6 +320,8 @@ class Metasploit3 < Msf::Post
:host => smtp_server,
:port => smtp_port,
:sname => "SMTP",
:source_id => session.db_record.id,
:source_type => "exploit",
:user => smtp_user,
:pass => smtp_decrypted_password)
#print_status("SMTP report_auth_info: host = #{smtp_server}, port= #{smtp_port}, sname= SMTP, user= #{smtp_user}, pass= #{smtp_decrypted_password}")

View File

@ -116,6 +116,8 @@ class Metasploit3 < Msf::Post
report_auth_info(
:host => host,
:port => port,
:source_id => session.db_record.id,
:source_type => "exploit",
:user => user,
:pass => pass
)

View File

@ -160,6 +160,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => port,
:sname => 'FTP',
:source_id => session.db_record.id,
:source_type => "exploit",
:user => username,
:pass => passwd
)

View File

@ -231,6 +231,8 @@ class Metasploit3 < Msf::Post
:sname => 'vnc',
:pass => "#{e[:pass]}",
:port => "#{e[:port]}",
:source_id => session.db_record.id,
:source_type => "exploit",
:type => 'password'
)
end
@ -241,6 +243,8 @@ class Metasploit3 < Msf::Post
:sname => 'vnc',
:viewonly_pass => "#{e[:viewonly_pass]}",
:port => "#{e[:port]}",
:source_id => session.db_record.id,
:source_type => "exploit",
:type => 'password_ro'
)
end

View File

@ -99,6 +99,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => portnum,
:sname => proto,
:source_id => session.db_record.id,
:source_type => "exploit",
:user => user,
:pass => pass
)
@ -164,6 +166,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => portnum,
:sname => proto,
:source_id => session.db_record.id,
:source_type => "exploit",
:user => user,
:pass => pass
)

View File

@ -76,6 +76,8 @@ class Metasploit3 < Msf::Post
:host => host,
:port => port,
:sname => 'FTP',
:source_id => session.db_record.id,
:source_type => "exploit",
:user => username,
:pass => passwd)
end