## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Auxiliary # Exploit mixins should be called first include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report def initialize super( 'Name' => 'Discover External IP via Ifconfig.me', 'Description' => %q{ This module checks for the public source IP address of the current route to the RHOST by querying the public web application at ifconfig.me. It should be noted this module will register activity on ifconfig.me, which is not affiliated with Metasploit. }, 'Author' => ['RageLtMan'], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'http://ifconfig.me/ip' ], ] ) register_options( [ Opt::RHOST('ifconfig.me'), OptBool.new('REPORT_HOST', [false, 'Add the found IP to the database', false]) ], self.class) end def run connect res = send_request_cgi({'uri' => '/ip', 'method' => 'GET' }) our_addr = res.body.strip if Rex::Socket.is_ipv4?(our_addr) or Rex::Socket.is_ipv6?(our_addr) print_good("Source ip to #{rhost} is #{our_addr}") report_host(our_addr) if datastore['REPORT_HOST'] end end end