move rservices mixin to aux instead of exploit
git-svn-id: file:///home/svn/framework3/trunk@11142 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b56e7852e9
commit
778040ec5b
|
@ -13,5 +13,7 @@ require 'msf/core/auxiliary/scanner'
|
|||
require 'msf/core/auxiliary/timed'
|
||||
require 'msf/core/auxiliary/wmapmodule'
|
||||
require 'msf/core/auxiliary/crawler'
|
||||
|
||||
require 'msf/core/auxiliary/commandshell'
|
||||
require 'msf/core/auxiliary/login'
|
||||
require 'msf/core/auxiliary/rservices'
|
||||
|
|
|
@ -0,0 +1,88 @@
|
|||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
#
|
||||
# This Auxiliary Mixin provides functionality for dealing with BSD R*Services
|
||||
#
|
||||
##
|
||||
|
||||
module Msf
|
||||
module Auxiliary::RServices
|
||||
|
||||
def initialize(info = {})
|
||||
super
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('FROMUSER', [ false, 'The username to login from' ]),
|
||||
OptPath.new( 'FROMUSER_FILE', [ false, 'File containing from usernames, one per line',
|
||||
File.join(Msf::Config.data_directory, "wordlists", "rservices_from_users.txt") ])
|
||||
], Msf::Auxiliary::RServices)
|
||||
|
||||
register_advanced_options(
|
||||
[
|
||||
OptBool.new('REMOVE_FROMUSER_FILE', [ true, "Automatically delete the FROMUSER_FILE on module completion", false])
|
||||
], Msf::Auxiliary::RServices)
|
||||
end
|
||||
|
||||
|
||||
def connect_from_privileged_port(start_port = 1023)
|
||||
cport = start_port
|
||||
while cport > 512
|
||||
#vprint_status("Trying to connect from port #{cport} ...")
|
||||
sd = nil
|
||||
begin
|
||||
sd = connect(true, { 'CPORT' => cport })
|
||||
|
||||
#
|
||||
# XXX: This is NOT optimal. Unfortunately, unreachable hosts will be
|
||||
# retried around 512 times :-/ Ticket #3206 tracks this.
|
||||
#
|
||||
rescue Rex::HostUnreachable
|
||||
# Ignore and try again
|
||||
|
||||
rescue Rex::AddressInUse
|
||||
# Ignore and try again
|
||||
|
||||
rescue Rex::ConnectionError
|
||||
vprint_error("Unable to connect: #{$!}")
|
||||
return false
|
||||
|
||||
end
|
||||
|
||||
break if sd
|
||||
cport -= 1
|
||||
end
|
||||
|
||||
if not sock
|
||||
print_error("#{target_host}:#{rport} - Unable to bind to privileged port")
|
||||
return false
|
||||
end
|
||||
|
||||
#vprint_status("Connected from #{cport}")
|
||||
return true
|
||||
end
|
||||
|
||||
|
||||
def load_fromuser_vars
|
||||
fromusers = extract_words(datastore['FROMUSER_FILE'])
|
||||
if datastore['FROMUSER']
|
||||
fromusers.unshift datastore['FROMUSER']
|
||||
end
|
||||
fromusers
|
||||
end
|
||||
|
||||
|
||||
def cleanup_files
|
||||
super
|
||||
|
||||
path = datastore['FROMUSER_FILE']
|
||||
if path and datastore['REMOVE_FROMUSER_FILE']
|
||||
::File.unlink(path) rescue nil
|
||||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
|
@ -51,7 +51,6 @@ require 'msf/core/exploit/db2'
|
|||
require 'msf/core/exploit/postgres'
|
||||
require 'msf/core/exploit/wdbrpc'
|
||||
require 'msf/core/exploit/wdbrpc_client'
|
||||
require 'msf/core/exploit/rservices'
|
||||
|
||||
# Telephony
|
||||
require 'msf/core/exploit/dialup'
|
||||
|
|
|
@ -1,52 +0,0 @@
|
|||
module Msf
|
||||
module Exploit::RServices
|
||||
|
||||
def initialize(info = {})
|
||||
super
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('LOCALUSER', [ false, 'The remote username to test' ]),
|
||||
], Msf::Exploit::RServices
|
||||
)
|
||||
end
|
||||
|
||||
def connect_from_privileged_port(start_port = 1023)
|
||||
cport = start_port
|
||||
while cport > 512
|
||||
#vprint_status("Trying to connect from port #{cport} ...")
|
||||
sd = nil
|
||||
begin
|
||||
sd = connect(true, { 'CPORT' => cport })
|
||||
|
||||
#
|
||||
# XXX: This is NOT optimal. Unfortunately, unreachable hosts will be
|
||||
# retried around 512 times :-/ Ticket #3206 tracks this.
|
||||
#
|
||||
rescue Rex::HostUnreachable
|
||||
# Ignore and try again
|
||||
|
||||
rescue Rex::AddressInUse
|
||||
# Ignore and try again
|
||||
|
||||
rescue Rex::ConnectionError
|
||||
vprint_error("Unable to connect: #{$!}")
|
||||
return false
|
||||
|
||||
end
|
||||
|
||||
break if sd
|
||||
cport -= 1
|
||||
end
|
||||
|
||||
if not sock
|
||||
print_error("#{target_host}:#{rport} - Unable to bind to privileged port")
|
||||
return false
|
||||
end
|
||||
|
||||
#vprint_status("Connected from #{cport}")
|
||||
return true
|
||||
end
|
||||
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue