## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Auxiliary include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report include Msf::Exploit::Remote::Udp def initialize super( 'Name' => 'Chargen Probe Utility', 'Description' => %q{ Chargen is a debugging and measurement tool and a character generator service. A character generator service simply sends data without regard to the input. Chargen is susceptible to spoofing the source of transmissions as well as use in a reflection attack vector. The misuse of the testing features of the Chargen service may allow attackers to craft malicious network payloads and reflect them by spoofing the transmission source to effectively direct it to a target. This can result in traffic loops and service degradation with large amounts of network traffic. }, 'Author' => 'Matteo Cantoni ', 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood. [ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ], [ 'URL', 'http://tools.ietf.org/html/rfc864' ], ], 'DisclosureDate' => 'Feb 08 1996') register_options([ Opt::RPORT(19) ]) deregister_options('RHOST') end def run_host(rhost) begin connect_udp pkt = Rex::Text.rand_text_alpha_lower(1) udp_sock.write(pkt) r = udp_sock.recvfrom(65535, 0.1) if r and r[1] vprint_status("#{rhost}:#{rport} - Response: #{r[0].to_s}") res = r[0].to_s.strip if (res.match(/ABCDEFGHIJKLMNOPQRSTUVWXYZ/i) || res.match(/0123456789/)) print_good("#{rhost}:#{rport} answers with #{res.length} bytes (headers + UDP payload)") report_service(:host => rhost, :port => rport, :proto => "udp", :name => "chargen", :info => res.length) end end rescue ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionRefused nil ensure disconnect_udp if self.udp_sock end end end