Fixes Cred Sourcing in report_auth_info() for post modules.
git-svn-id: file:///home/svn/framework3/trunk@14187 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
28c2408fdd
commit
2d80d1e144
|
@ -59,9 +59,15 @@ class Metasploit3 < Msf::Post
|
|||
print_good("Host: #{host} Port: #{port} User: #{user} Password: #{pass}")
|
||||
auth =
|
||||
{
|
||||
:host => host, :port => port, :sname => 'ftp',
|
||||
:user => user, :pass => pass,
|
||||
:type => 'password', :active => true
|
||||
:host => host,
|
||||
:port => port,
|
||||
:sname => 'ftp',
|
||||
:user => user,
|
||||
:pass => pass,
|
||||
:type => 'password',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:active => true
|
||||
}
|
||||
report_auth_info(auth)
|
||||
end
|
||||
|
|
|
@ -63,6 +63,8 @@ class Metasploit3 < Msf::Post
|
|||
data[:user] = hash.user_name
|
||||
data[:pass] = hash.lanman + ":" + hash.ntlm
|
||||
data[:type] = "smb_hash"
|
||||
data[:source_id] = session.db_record.id,
|
||||
data[:source_type] = "exploit",
|
||||
data[:active] = true
|
||||
|
||||
print_line " Extracted: #{data[:user]}:#{data[:pass]}"
|
||||
|
|
|
@ -166,6 +166,8 @@ class Metasploit3 < Msf::Post
|
|||
:user => cred["username"],
|
||||
:pass => cred["password"],
|
||||
:type => 'password',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:active => true
|
||||
}
|
||||
|
||||
|
|
|
@ -148,6 +148,8 @@ class Metasploit3 < Msf::Post
|
|||
:sname => 'mssql',
|
||||
:user => full_user,
|
||||
:pass => plaintext_passwd,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:active => true
|
||||
)
|
||||
print_good("Added credentials to report database")
|
||||
|
|
|
@ -157,6 +157,8 @@ class Metasploit3 < Msf::Post
|
|||
:user => cred['user'],
|
||||
:pass => cred['password'],
|
||||
:ptype => "MD5 hash",
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:target_host => config['ftp_bindip'],
|
||||
:target_port => config['ftp_port']
|
||||
)
|
||||
|
@ -190,6 +192,8 @@ class Metasploit3 < Msf::Post
|
|||
:user => 'admin',
|
||||
:pass => config['admin_pass'],
|
||||
:type => "password",
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:target_host => config['admin_bindip'],
|
||||
:target_port => config['admin_port']
|
||||
)
|
||||
|
|
|
@ -93,6 +93,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => port,
|
||||
:sname => 'FTP',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => username,
|
||||
:pass => passwd)
|
||||
end
|
||||
|
|
|
@ -79,6 +79,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => server,
|
||||
:port => port,
|
||||
:sname => 'ftp',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => username,
|
||||
:pass => dpass
|
||||
)
|
||||
|
|
|
@ -91,6 +91,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => port,
|
||||
:sname => proto,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => user,
|
||||
:pass => pass)
|
||||
end
|
||||
|
|
|
@ -308,6 +308,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => portnum,
|
||||
:sname => type,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => user,
|
||||
:pass => pass)
|
||||
#print_status("CHK report_auth_info: host = #{host}, port= #{portnum}, sname= #{type}, user= #{user}, pass= #{pass}")
|
||||
|
@ -318,6 +320,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => smtp_server,
|
||||
:port => smtp_port,
|
||||
:sname => "SMTP",
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => smtp_user,
|
||||
:pass => smtp_decrypted_password)
|
||||
#print_status("SMTP report_auth_info: host = #{smtp_server}, port= #{smtp_port}, sname= SMTP, user= #{smtp_user}, pass= #{smtp_decrypted_password}")
|
||||
|
|
|
@ -116,6 +116,8 @@ class Metasploit3 < Msf::Post
|
|||
report_auth_info(
|
||||
:host => host,
|
||||
:port => port,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => user,
|
||||
:pass => pass
|
||||
)
|
||||
|
|
|
@ -160,6 +160,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => port,
|
||||
:sname => 'FTP',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => username,
|
||||
:pass => passwd
|
||||
)
|
||||
|
|
|
@ -231,6 +231,8 @@ class Metasploit3 < Msf::Post
|
|||
:sname => 'vnc',
|
||||
:pass => "#{e[:pass]}",
|
||||
:port => "#{e[:port]}",
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:type => 'password'
|
||||
)
|
||||
end
|
||||
|
@ -241,6 +243,8 @@ class Metasploit3 < Msf::Post
|
|||
:sname => 'vnc',
|
||||
:viewonly_pass => "#{e[:viewonly_pass]}",
|
||||
:port => "#{e[:port]}",
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:type => 'password_ro'
|
||||
)
|
||||
end
|
||||
|
|
|
@ -99,6 +99,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => portnum,
|
||||
:sname => proto,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => user,
|
||||
:pass => pass
|
||||
)
|
||||
|
@ -164,6 +166,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => portnum,
|
||||
:sname => proto,
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => user,
|
||||
:pass => pass
|
||||
)
|
||||
|
|
|
@ -76,6 +76,8 @@ class Metasploit3 < Msf::Post
|
|||
:host => host,
|
||||
:port => port,
|
||||
:sname => 'FTP',
|
||||
:source_id => session.db_record.id,
|
||||
:source_type => "exploit",
|
||||
:user => username,
|
||||
:pass => passwd)
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue