## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rex' class MetasploitModule < Msf::Post include Msf::Post::File include Msf::Post::Solaris::Priv def initialize(info={}) super( update_info( info, 'Name' => 'Solaris Gather Virtual Environment Detection', 'Description' => %q{ This module attempts to determine whether the system is running inside of a virtual environment and if so, which one. This module supports detectoin of Solaris Zone, VMWare, VirtualBox, Xen, and QEMU/KVM.}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], 'Platform' => [ 'solaris' ], 'SessionTypes' => [ 'shell' ] )) end # Run Method for when run command is issued def run print_status("Gathering System info ....") vm = nil kernel_type = cmd_exec("uname -v") if kernel_type =~ /Generic_Virtual/i vm = "Solaris Zone" end if not vm prt_diag = cmd_exec("/usr/sbin/prtdiag -v").gsub("\n"," ") case prt_diag when /virtualbox/i vm = "VirtualBox" when /vmware/i vm = "VMware" when /xen/i vm = "Xen" when /qemu/i vm = "Qemu/KVM" end end if vm print_good("This appears to be a #{vm} Virtual Machine") else print_status("This appears to be a Physical Machine") end end end