Adding mubix's post modules
Fixes #5916 Fixes #5913 Fixes #5915 git-svn-id: file:///home/svn/framework3/trunk@14148 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
7c9608e8a2
commit
7091fc1eea
|
@ -0,0 +1,69 @@
|
|||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
# post/windows/gather/dig.rb
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# Framework web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
require 'rex'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Dig',
|
||||
'Description' => %q{ This module looks up a IP for a hostname via the victim},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Rob Fuller <mubix@hak5.org>'],
|
||||
'Version' => '$Revision$',
|
||||
'Platform' => [ 'windows' ],
|
||||
'SessionTypes' => [ 'meterpreter' ]
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('HOSTNAME', [true, 'Hostname to lookup', nil]),
|
||||
], self.class)
|
||||
end
|
||||
|
||||
def run
|
||||
### MAIN ###
|
||||
client.railgun.add_function( 'ws2_32', 'getaddrinfo', 'DWORD',[["PCHAR","pNodeName","in"],["PCHAR","pServiceName","in"],["PDWORD","pHints","in"],["PDWORD","ppResult","out"]])
|
||||
|
||||
if client.platform =~ /^x64/
|
||||
size = 64
|
||||
addrinfoinmem = 32
|
||||
else
|
||||
size = 32
|
||||
addrinfoinmem = 24
|
||||
end
|
||||
|
||||
hostname = datastore['HOSTNAME']
|
||||
|
||||
## get IP for host
|
||||
begin
|
||||
vprint_status("Looking up IP for #{hostname}")
|
||||
result = client.railgun.ws2_32.getaddrinfo(hostname, nil, nil, 4 )
|
||||
if result['GetLastError'] == 11001
|
||||
next
|
||||
end
|
||||
addrinfo = client.railgun.memread( result['ppResult'], size )
|
||||
ai_addr_pointer = addrinfo[addrinfoinmem,4].unpack('L').first
|
||||
sockaddr = client.railgun.memread( ai_addr_pointer, size/2 )
|
||||
ip = sockaddr[4,4].unpack('N').first
|
||||
hostip = Rex::Socket.addr_itoa(ip)
|
||||
print_status("#{hostname} resolves to #{hostip}")
|
||||
rescue ::Exception => e
|
||||
print_error(e)
|
||||
print_status('Windows 2000 and prior does not support getaddrinfo')
|
||||
end
|
||||
end
|
||||
end
|
|
@ -0,0 +1,119 @@
|
|||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# Framework web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
require 'rex'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Domain Enumeration',
|
||||
'Description' => %q{
|
||||
This module enumerates currently the domains a host can see and the domain
|
||||
controllers for that domain.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Rob Fuller <mubix@hak5.org>'],
|
||||
'Version' => '$Revision$',
|
||||
'Platform' => [ 'windows' ],
|
||||
'SessionTypes' => [ 'meterpreter' ]
|
||||
))
|
||||
end
|
||||
|
||||
def run
|
||||
#structure
|
||||
=begin
|
||||
NET_API_STATUS NetServerEnum(
|
||||
__in_opt LPCWSTR servername,
|
||||
__in DWORD level,
|
||||
__out LPBYTE *bufptr,
|
||||
__in DWORD prefmaxlen,
|
||||
__out LPDWORD entriesread,
|
||||
__out LPDWORD totalentries,
|
||||
__in DWORD servertype,
|
||||
__in_opt LPCWSTR domain,
|
||||
__inout_opt LPDWORD resume_handle
|
||||
);
|
||||
=end
|
||||
|
||||
client.railgun.add_function('netapi32', 'NetServerEnum', 'DWORD',[
|
||||
['PWCHAR','servername','in'],
|
||||
['DWORD','level','in'],
|
||||
['PDWORD','bufptr','out'],
|
||||
['DWORD','prefmaxlen','in'],
|
||||
['PDWORD','entriesread','out'],
|
||||
['PDWORD','totalentries','out'],
|
||||
['DWORD','servertype','in'],
|
||||
['PWCHAR','domain','in'],
|
||||
['PDWORD','resume_handle','inout']
|
||||
])
|
||||
|
||||
domain_enum = 2147483648 # SV_TYPE_DOMAIN_ENUM = hex 80000000
|
||||
buffersize = 500
|
||||
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil)
|
||||
print_status("Finding the right buffersize...")
|
||||
while result['return'] == 234
|
||||
print_status("Tested #{buffersize}, got #{result['entriesread']} of #{result['totalentries']}")
|
||||
buffersize = buffersize + 500
|
||||
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil)
|
||||
end
|
||||
|
||||
count = result['totalentries']
|
||||
print_status("#{count} domain(s) found.")
|
||||
startmem = result['bufptr']
|
||||
|
||||
base = 0
|
||||
domains = []
|
||||
mem = client.railgun.memread(startmem, 8*count)
|
||||
count.times{|i|
|
||||
x = {}
|
||||
x[:platform] = mem[(base + 0),4].unpack("V*")[0]
|
||||
nameptr = mem[(base + 4),4].unpack("V*")[0]
|
||||
x[:domain] = client.railgun.memread(nameptr,255).split("\0\0")[0].split("\0").join
|
||||
domains << x
|
||||
base = base + 8
|
||||
}
|
||||
|
||||
domaincontrollers = 24 # 10 + 8 (SV_TYPE_DOMAIN_BAKCTRL || SV_TYPE_DOMAIN_CTRL)
|
||||
|
||||
domains.each do |x|
|
||||
print_status("Enumerating DCs for #{x[:domain]}")
|
||||
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,x[:domain],nil)
|
||||
while result['return'] == 234
|
||||
buffersize = buffersize + 500
|
||||
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,x[:domain],nil)
|
||||
end
|
||||
if result['totalentries'] == 0
|
||||
print_error("No Domain Controllers found...")
|
||||
next
|
||||
end
|
||||
|
||||
count = result['totalentries']
|
||||
startmem = result['bufptr']
|
||||
|
||||
base = 0
|
||||
x[:dc] = []
|
||||
mem = client.railgun.memread(startmem, 8*count)
|
||||
count.times{|i|
|
||||
t = {}
|
||||
t[:platform] = mem[(base + 0),4].unpack("V*")[0]
|
||||
nameptr = mem[(base + 4),4].unpack("V*")[0]
|
||||
t[:dc_hostname] = client.railgun.memread(nameptr,255).split("\0\0")[0].split("\0").join
|
||||
x[:dc] << t
|
||||
base = base + 8
|
||||
print_status(t[:dc_hostname])
|
||||
}
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
@ -0,0 +1,187 @@
|
|||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
# post/windows/gather/netdiscovery.rb
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# Framework web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
require 'rex'
|
||||
|
||||
class Metasploit3 < Msf::Post
|
||||
|
||||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Net Discovery',
|
||||
'Description' => %q{ This module uses railgun to discover hostnames and IPs on the network \n
|
||||
WK = All Workstations -
|
||||
SVR = All Servers -
|
||||
SQL = All SQL Servers -
|
||||
DC = All Domain Controllers -
|
||||
DCBKUP = All Domain Backup Servers -
|
||||
NOVELL = All Novell Servers -
|
||||
PRINTSVR = All Print Que Servers -
|
||||
MASTERBROWSER = All Master Browswers -
|
||||
WINDOWS = All Windows Hosts -
|
||||
UNIX = All Unix Hosts
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Rob Fuller <mubix@hak5.org>'],
|
||||
'Version' => '$Revision$',
|
||||
'Platform' => [ 'windows' ],
|
||||
'SessionTypes' => [ 'meterpreter' ]
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('LTYPE', [true, 'Account informations (type info for known types)', 'WK']),
|
||||
OptString.new('DOMAIN', [false, 'Domain to perform lookups on, default is current domain',nil]),
|
||||
], self.class)
|
||||
end
|
||||
|
||||
def parse_netserverenum(startmem,count)
|
||||
base = 0
|
||||
sys_list = []
|
||||
mem = client.railgun.memread(startmem, 24*count)
|
||||
|
||||
count.times{|i|
|
||||
x = {}
|
||||
x[:platform_id] = mem[(base + 0),4].unpack("V*")[0]
|
||||
cnameptr = mem[(base + 4),4].unpack("V*")[0]
|
||||
x[:major_ver] = mem[(base + 8),4].unpack("V*")[0]
|
||||
x[:minor_ver] = mem[(base + 12),4].unpack("V*")[0]
|
||||
x[:type] = mem[(base + 16),4].unpack("V*")[0]
|
||||
commentptr = mem[(base + 20),4].unpack("V*")[0]
|
||||
|
||||
x[:cname] = client.railgun.memread(cnameptr,27).split("\0\0")[0].split("\0").join
|
||||
x[:comment] = client.railgun.memread(commentptr,255).split("\0\0")[0].split("\0").join
|
||||
sys_list << x
|
||||
base = base + 24
|
||||
vprint_status("Identified: #{x[:cname]} - #{x[:comment]}")
|
||||
}
|
||||
return sys_list
|
||||
end
|
||||
|
||||
|
||||
def run
|
||||
### MAIN ###
|
||||
client = session
|
||||
|
||||
=begin
|
||||
NET_API_STATUS NetUserEnum(
|
||||
__in LPCWSTR servername,
|
||||
__in DWORD level,
|
||||
__in DWORD filter,
|
||||
__out LPBYTE *bufptr,
|
||||
__in DWORD prefmaxlen,
|
||||
__out LPDWORD entriesread,
|
||||
__out LPDWORD totalentries,
|
||||
__inout LPDWORD resume_handle
|
||||
);
|
||||
|
||||
client.railgun.add_function( 'netapi32', 'NetUserEnum', 'DWORD',[
|
||||
["PWCHAR","servername","in"],
|
||||
["DWORD","level","in"],
|
||||
["DWORD","filter","in"],
|
||||
["PDWORD","bufptr","out"],
|
||||
["DWORD","prefmaxlen","in"],
|
||||
["PDWORD","entriesread","out"],
|
||||
["PDWORD","totalentries","out"],
|
||||
["PDWORD","resume_handle","inout"]])
|
||||
|
||||
=end
|
||||
|
||||
client.railgun.add_function( 'netapi32', 'NetServerEnum', 'DWORD',[["PBLOB","servername","in"],["DWORD","level","in"],["PDWORD","bufptr","out"],["DWORD","prefmaxlen","in"],["PDWORD","entriesread","out"],["PDWORD","totalentries","out"],["DWORD","servertype","in"],["PWCHAR","domain","in"],["DWORD","resume_handle","inout"]])
|
||||
client.railgun.add_function( 'ws2_32', 'getaddrinfo', 'DWORD',[["PCHAR","pNodeName","in"],["PCHAR","pServiceName","in"],["PDWORD","pHints","in"],["PDWORD","ppResult","out"]])
|
||||
|
||||
domain = nil
|
||||
|
||||
# Default = SV_TYPE_NT
|
||||
# Servers = SV_TYPE_ALL
|
||||
# Workstations = SV_TYPE_WORKSTATION
|
||||
# Domain Controllers = SV_TYPE_DOMAINCTRL
|
||||
# Novell Server = SV_TYPE_NOVELL
|
||||
# Terminal Servers = SV_TYPE_TERMINALSERVER
|
||||
# SQL Servers = SV_TYPE_SQLSERVER
|
||||
lookuptype = 1
|
||||
|
||||
case datastore['LTYPE']
|
||||
when 'WK' then lookuptype = "1".hex
|
||||
when 'SVR' then lookuptype = "2".hex
|
||||
when 'SQL' then lookuptype = "4".hex
|
||||
when 'DC' then lookuptype = "8".hex
|
||||
when 'DCBKUP' then lookuptype = "10".hex
|
||||
when 'TIME' then lookuptype = "20".hex
|
||||
when 'NOVELL' then lookuptype = "80".hex
|
||||
when 'PRINTSVR' then lookuptype = "200".hex
|
||||
when 'MASTERBROWSER' then lookuptype = "40000".hex
|
||||
when 'WINDOWS' then lookuptype = "400000".hex
|
||||
when 'UNIX' then lookuptype = "800".hex
|
||||
when 'LOCAL' then lookuptype = "40000000".hex
|
||||
end
|
||||
if client.platform =~ /^x64/
|
||||
nameiterator = 8
|
||||
size = 64
|
||||
addrinfoinmem = 32
|
||||
else
|
||||
nameiterator = 4
|
||||
size = 32
|
||||
addrinfoinmem = 24
|
||||
end
|
||||
result = client.railgun.netapi32.NetServerEnum(nil,101,4,-1,4,4,lookuptype,datastore['DOMAIN'],0)
|
||||
# print_error(result.inspect)
|
||||
if result['totalentries'] == 0
|
||||
print_error("No systems found of that type")
|
||||
return
|
||||
end
|
||||
print_status("Found #{result['totalentries']} systems.")
|
||||
|
||||
endofline = 0
|
||||
i = nameiterator
|
||||
netview = parse_netserverenum(result['bufptr'],result['totalentries'])
|
||||
|
||||
|
||||
## get IP for host
|
||||
begin
|
||||
netview.each do |x|
|
||||
vprint_status("Looking up IP for #{x[:cname]}")
|
||||
print '.'
|
||||
result = client.railgun.ws2_32.getaddrinfo(x[:cname], nil, nil, 4 )
|
||||
if result['GetLastError'] == 11001
|
||||
next
|
||||
end
|
||||
addrinfo = client.railgun.memread( result['ppResult'], size )
|
||||
ai_addr_pointer = addrinfo[addrinfoinmem,4].unpack('L').first
|
||||
sockaddr = client.railgun.memread( ai_addr_pointer, size/2 )
|
||||
ip = sockaddr[4,4].unpack('N').first
|
||||
x[:ip] = Rex::Socket.addr_itoa(ip)
|
||||
end
|
||||
rescue ::Exception => e
|
||||
print_error(e)
|
||||
print_status('Windows 2000 and prior does not support getaddrinfo')
|
||||
end
|
||||
|
||||
netview = netview.sort_by {|e| e[:type]}
|
||||
|
||||
results = Rex::Ui::Text::Table.new(
|
||||
'Header' => 'Netdiscovery Results',
|
||||
'Indent' => 2,
|
||||
'Columns' => ['TYPE', 'IP', 'COMPUTER NAME', 'VERSION', 'COMMENT']
|
||||
)
|
||||
|
||||
netview.each do |x|
|
||||
results << [x[:type], x[:ip], x[:cname], "#{x[:major_ver]}.#{x[:minor_ver]}", x[:comment]]
|
||||
end
|
||||
print_status(results.inspect)
|
||||
|
||||
print_status('If none of the IP addresses show up you are running this from a Win2k or older system')
|
||||
print_status("If a host doesn't have an IP it either timed out or only has an IPv6 address assinged to it")
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue