1324 lines
34 KiB
Ruby
1324 lines
34 KiB
Ruby
module Msf
|
|
module Ui
|
|
module Console
|
|
module CommandDispatcher
|
|
module Wmap
|
|
|
|
require 'rabal/tree'
|
|
require 'rexml/document'
|
|
require 'tempfile'
|
|
|
|
# Load ActiveRecord
|
|
require 'rubygems'
|
|
require 'active_record'
|
|
|
|
#
|
|
# MSF WMAP Web scanner ET
|
|
# et[cron]metasploit.com
|
|
#
|
|
|
|
#
|
|
# Constants
|
|
#
|
|
|
|
WMAP_PATH = '/'
|
|
WMAP_CHECK = true
|
|
WMAP_RUNEXPL = true
|
|
WMAP_EXITIFSESS = true
|
|
WMAP_SHOW = 2**0
|
|
WMAP_EXPL = 2**1
|
|
|
|
# Command line does not allow multiline strings so we paas headers header:valueSEPARATOR
|
|
STR_HEADER_SEPARATOR = '&'
|
|
|
|
# Exclude files can be modified by setting datastore['WMAP_EXCLUDE_FILE']
|
|
WMAP_EXCLUDE_FILE = '.*\.(gif|jpg|png*)$'
|
|
|
|
#
|
|
# The dispatcher's name.
|
|
#
|
|
def name
|
|
"Wmap Database Backend"
|
|
end
|
|
|
|
#
|
|
# Returns the hash of commands supported by this dispatcher.
|
|
#
|
|
def commands
|
|
{
|
|
"wmap_website" => "List website structure",
|
|
"wmap_targets" => "List all targets in the database",
|
|
"wmap_sql" => "Query the database",
|
|
"wmap_run" => "Automatically test/exploit everything",
|
|
"wmap_proxy" => "Run mitm proxy",
|
|
}
|
|
end
|
|
|
|
def cmd_wmap_website(*args)
|
|
print_status("Website structure")
|
|
if selected_host == nil
|
|
print_error("Target not selected.")
|
|
else
|
|
print_status("#{selected_host}:#{selected_port} SSL:#{selected_ssl}")
|
|
print_tree(load_tree)
|
|
end
|
|
print_status("Done.")
|
|
end
|
|
|
|
def cmd_wmap_targets(*args)
|
|
# Default behavior to handle hosts names in the db as RHOSTS only
|
|
# accepts IP addresses
|
|
accept_hostnames = true
|
|
resolv_hosts = false
|
|
|
|
|
|
args.push("-h") if args.length == 0
|
|
|
|
while (arg = args.shift)
|
|
case arg
|
|
when '-a'
|
|
target_url = args.shift
|
|
|
|
if target_url == nil
|
|
print_error("URI required.")
|
|
else
|
|
puri = uri_parse(target_url)
|
|
|
|
scheme, authority, path, query = puri[2], puri[4], puri[5], puri[7]
|
|
|
|
uri_ssl= 0
|
|
if scheme == 'https'
|
|
uri_ssl = 1
|
|
end
|
|
|
|
uri_auth = authority.split(':')
|
|
|
|
uri_host = uri_auth[0]
|
|
|
|
uri_port = 80
|
|
if uri_auth[1]
|
|
uri_port = uri_auth[1]
|
|
end
|
|
|
|
uri_path = path
|
|
if path == nil or path == ''
|
|
uri_path = '/'
|
|
end
|
|
|
|
if Rex::Socket.dotted_ip?(uri_host)
|
|
hip = uri_host
|
|
framework.db.create_target(hip, uri_port, uri_ssl, 0)
|
|
print_status("Added target #{hip} #{uri_port} #{uri_ssl}")
|
|
|
|
framework.db.create_request(hip,uri_port,uri_ssl,'GET',uri_path,'',query,'','','','')
|
|
print_status("Added request #{uri_path} #{query}")
|
|
else
|
|
if accept_hostnames
|
|
framework.db.create_target(uri_host, uri_port, uri_ssl, 0)
|
|
print_status("Added target #{uri_host} #{uri_port} #{uri_ssl}")
|
|
|
|
framework.db.create_request(uri_host,uri_port,uri_ssl,'GET',uri_path,'',query,'','','','')
|
|
print_status("Added request #{uri_host} #{query}")
|
|
else
|
|
print_error("RHOSTS only accepts IP addresses: #{req.host}")
|
|
|
|
if resolv_hosts
|
|
hip = Rex::Socket.resolv_to_dotted(req.host)
|
|
|
|
framework.db.create_target(hip, uri_port, uri_ssl, 0)
|
|
print_status("Added target #{hip} #{uri_port} #{uri_ssl}")
|
|
|
|
framework.db.create_request(hip,uri_port,uri_ssl,'GET',uri_path,'',query,'','','','')
|
|
print_status("Added request #{uri_path} #{query}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
when '-p'
|
|
print_status(" Id. Host\t\t\t\t\tPort\tSSL")
|
|
|
|
framework.db.each_target do |tgt|
|
|
if tgt.ssl == 1
|
|
usessl = "[*]"
|
|
else
|
|
usessl = ""
|
|
end
|
|
|
|
maxcols = 35
|
|
cols = maxcols - tgt.host.length
|
|
|
|
thost = "#{tgt.host.to_s[0..maxcols]}"+(" "*cols)
|
|
|
|
if tgt.selected == 1
|
|
print_status("=> #{tgt.id}. #{thost}\t#{tgt.port}\t#{usessl}")
|
|
else
|
|
print_status(" #{tgt.id}. #{thost}\t#{tgt.port}\t#{usessl}")
|
|
end
|
|
end
|
|
print_status("Done.")
|
|
when '-r'
|
|
framework.db.delete_all_targets
|
|
framework.db.each_distinct_target do |req|
|
|
if Rex::Socket.dotted_ip?(req.host)
|
|
framework.db.create_target(req.host, req.port, req.ssl, 0)
|
|
print_status("Added. #{req.host} #{req.port} #{req.ssl}")
|
|
else
|
|
if accept_hostnames
|
|
framework.db.create_target(req.host, req.port, req.ssl, 0)
|
|
print_status("Added host #{req.host}")
|
|
else
|
|
print_error("RHOSTS only accepts IP addresses: #{req.host}")
|
|
|
|
if resolv_hosts
|
|
hip = Rex::Socket.resolv_to_dotted(req.host)
|
|
framework.db.create_target(hip, req.port, req.ssl, 0)
|
|
print_status("Added host #{req.host} resolved as #{hip}.")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
when '-s'
|
|
framework.db.each_target do |tgt|
|
|
tgt.selected = 0
|
|
tgt.save
|
|
end
|
|
seltgt = framework.db.get_target(args.shift)
|
|
if seltgt == nil
|
|
print_error("Target id not found.")
|
|
else
|
|
seltgt.selected = 1
|
|
seltgt.save
|
|
end
|
|
when '-h'
|
|
print_status("Usage: wmap_targets [options]")
|
|
print_line("\t-h Display this help text")
|
|
print_line("\t-p Print all available targets")
|
|
print_line("\t-r Reload targets table")
|
|
print_line("\t-s [id] Select target for testing")
|
|
print_line("\t-a [url] Add new target")
|
|
|
|
print_line("")
|
|
return
|
|
end
|
|
end
|
|
end
|
|
|
|
def cmd_wmap_sql(*args)
|
|
qsql = args.join(" ")
|
|
|
|
args.push("-h") if args.length == 0
|
|
|
|
while (arg = args.shift)
|
|
case arg
|
|
when '-h'
|
|
print_status("Usage: wmap_sql [sql query]")
|
|
print_line("\t-h Display this help text")
|
|
|
|
print_line("")
|
|
return
|
|
end
|
|
end
|
|
|
|
print_line("SQL: #{qsql}")
|
|
|
|
begin
|
|
res =framework.db.sql_query(qsql)
|
|
res.each do |o|
|
|
line = ''
|
|
o.each do |k, v|
|
|
if v
|
|
line << v
|
|
end
|
|
line << '|'
|
|
end
|
|
print_line(line)
|
|
end
|
|
rescue ::Exception
|
|
print_error("SQL Error #{$!}")
|
|
return
|
|
end
|
|
end
|
|
|
|
#
|
|
# A copy of the shotgun approach to website exploitation
|
|
#
|
|
def cmd_wmap_run(*args)
|
|
|
|
stamp = Time.now.to_f
|
|
mode = 0
|
|
|
|
eprofile = []
|
|
using_p = false
|
|
|
|
args.push("-h") if args.length == 0
|
|
|
|
while (arg = args.shift)
|
|
case arg
|
|
when '-t'
|
|
mode |= WMAP_SHOW
|
|
when '-e'
|
|
mode |= WMAP_EXPL
|
|
|
|
profile = args.shift
|
|
|
|
if profile
|
|
print_status("Using profile #{profile}.")
|
|
|
|
begin
|
|
File.open(profile).each do |str|
|
|
if not str.include? '#'
|
|
# Not a comment
|
|
modname = str.strip
|
|
if not modname.empty?
|
|
eprofile << modname
|
|
end
|
|
end
|
|
using_p = true
|
|
end
|
|
rescue
|
|
print_error("Profile not found or invalid.")
|
|
return
|
|
end
|
|
else
|
|
print_status("Using ALL wmap enabled modules.")
|
|
end
|
|
|
|
|
|
when '-h'
|
|
print_status("Usage: wmap_run [options]")
|
|
print_line("\t-h Display this help text")
|
|
print_line("\t-t Show all matching exploit modules")
|
|
print_line("\t-e [profile] Launch profile test modules against all matched targets.")
|
|
print_line("\t No profile runs all enabled modules.")
|
|
|
|
print_line("")
|
|
return
|
|
end
|
|
end
|
|
|
|
if selected_host == nil
|
|
print_error("Target not selected.")
|
|
return
|
|
end
|
|
|
|
# WMAP_DIR, WMAP_FILE
|
|
matches = {}
|
|
|
|
# WMAP_SERVER
|
|
matches1 = {}
|
|
|
|
# WMAP_QUERY
|
|
matches2 = {}
|
|
|
|
# WMAP_BODY
|
|
matches3 = {}
|
|
|
|
# WMAP_HEADERS
|
|
matches4 = {}
|
|
|
|
# WMAP_UNIQUE_QUERY
|
|
matches5 = {}
|
|
|
|
# WMAP_GENERIC
|
|
matches10 = {}
|
|
|
|
# EXPLOIT OPTIONS
|
|
opt_str = nil
|
|
bg = false
|
|
jobify = false
|
|
|
|
[ [ framework.auxiliary, 'auxiliary' ], [framework.exploits, 'exploit' ] ].each do |mtype|
|
|
|
|
# Scan all exploit modules for matching references
|
|
mtype[0].each_module do |n,m|
|
|
e = m.new
|
|
|
|
# Only include wmap_enabled plugins
|
|
if e.respond_to?("wmap_enabled")
|
|
|
|
penabled = e.wmap_enabled
|
|
|
|
if penabled
|
|
if not using_p or eprofile.include? n.split('/').last
|
|
#
|
|
# First run the WMAP_SERVER plugins
|
|
#
|
|
case e.wmap_type
|
|
when :WMAP_SERVER
|
|
matches1[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_QUERY
|
|
matches2[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_BODY
|
|
matches3[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_HEADERS
|
|
matches4[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_UNIQUE_QUERY
|
|
matches5[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_GENERIC
|
|
matches10[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
when :WMAP_DIR, :WMAP_FILE
|
|
matches[[selected_host,selected_port,selected_ssl,mtype[1]+'/'+n]]=true
|
|
else
|
|
# Black Hole
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
#
|
|
# Handle modules that need to be run before all tests, once usually again the web server.
|
|
# :WMAP_SERVER
|
|
#
|
|
idx = 0
|
|
matches1.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# For exploits
|
|
#
|
|
payload = mod.datastore['PAYLOAD']
|
|
encoder = mod.datastore['ENCODER']
|
|
target = mod.datastore['TARGET']
|
|
nop = mod.datastore['NOP']
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins that only need to be
|
|
# launched once.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
if wtype == :WMAP_SERVER
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
|
|
if session
|
|
stat = '[*]'
|
|
|
|
if (session == Msf::Exploit::CheckCode::Vulnerable)
|
|
stat = '[+]'
|
|
end
|
|
|
|
print_line(stat + ' ' + session[1])
|
|
|
|
#
|
|
# Exploit if WMAP_RUNEXPL
|
|
#
|
|
|
|
if (session == Msf::Exploit::CheckCode::Vulnerable) and WMAP_RUNEXPL
|
|
print_status("Exploiting...")
|
|
|
|
begin
|
|
session = mod.exploit_simple(
|
|
'Encoder' => encoder,
|
|
'Payload' => payload,
|
|
'Target' => target,
|
|
'Nop' => nop,
|
|
'OptionStr' => opt_str,
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => jobify)
|
|
rescue ::Interrupt
|
|
raise $!
|
|
rescue ::Exception => e
|
|
print_error("Exploit failed: #{e.class} #{e}")
|
|
if(e.class.to_s != 'Msf::OptionValidateError')
|
|
print_error("Call stack:")
|
|
e.backtrace.each do |line|
|
|
break if line =~ /lib.msf.base.simple/
|
|
print_error(" #{line}")
|
|
end
|
|
end
|
|
end
|
|
|
|
# If we were given a session, let's see what we can do with it
|
|
if (session)
|
|
|
|
# If we aren't told to run in the background and the session can be
|
|
# interacted with, start interacting with it by issuing the session
|
|
# interaction command.
|
|
if (bg == false and session.interactive?)
|
|
print_line
|
|
|
|
driver.run_single("sessions -q -i #{session.sid}")
|
|
# Otherwise, log that we created a session
|
|
else
|
|
print_status("Session #{session.sid} created in the background.")
|
|
end
|
|
# If we ran the exploit as a job, indicate such so the user doesn't
|
|
# wonder what's up.
|
|
|
|
if WMAP_EXITIFSESS
|
|
return
|
|
end
|
|
elsif (jobify)
|
|
print_status("Exploit running as background job.")
|
|
# Worst case, the exploit ran but we got no session, bummer.
|
|
else
|
|
print_status("Exploit completed, but no session was created.")
|
|
end
|
|
|
|
end
|
|
|
|
else
|
|
print_error("Check failed: The state could not be determined.")
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
|
|
else
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Handle modules to be run at every path/file
|
|
# WMAP_DIR, WMAP_FILE
|
|
#
|
|
idx = 0
|
|
matches.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins that only need to be
|
|
# launched once.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
#
|
|
#Here is where the fun begins
|
|
#
|
|
test_tree = load_tree()
|
|
test_tree.each do |node|
|
|
|
|
testpath = Pathname.new(node.current_path)
|
|
strpath = testpath.cleanpath(false).to_s
|
|
|
|
#
|
|
# Fixing paths
|
|
#
|
|
|
|
if node.is_leaf? and not node.is_root?
|
|
#
|
|
# Later we can add here more checks to see if its a file
|
|
#
|
|
else
|
|
if node.is_root?
|
|
strpath = "/"
|
|
else
|
|
strpath = strpath.chomp + "/"
|
|
end
|
|
end
|
|
|
|
strpath = strpath.gsub("//", "/")
|
|
#print_status("Testing path: #{strpath}")
|
|
|
|
#
|
|
# Launch plugin depending module type.
|
|
# Module type depends on main input type.
|
|
# Code may be the same but it depend on final
|
|
# versions of plugins
|
|
#
|
|
|
|
case wtype
|
|
when :WMAP_FILE
|
|
if node.is_leaf? and not node.is_root?
|
|
#
|
|
# Check if an exclusion regex has been defined
|
|
#
|
|
if self.framework.datastore['WMAP_EXCLUDE_FILE']
|
|
excludefilestr = self.framework.datastore['WMAP_EXCLUDE_FILE']
|
|
else
|
|
excludefilestr = WMAP_EXCLUDE_FILE
|
|
end
|
|
|
|
if not strpath.match(excludefilestr)
|
|
mod.datastore['PATH'] = strpath
|
|
print_status("Launching #{xref[3]} #{wtype} #{strpath} against #{xref[0]}:#{xref[1]}...")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{name}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
when :WMAP_DIR
|
|
if not node.is_leaf? or node.is_root?
|
|
mod.datastore['PATH'] = strpath
|
|
print_status("Launching #{xref[3]} #{wtype} #{strpath} against #{xref[0]}:#{xref[1]}...")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{name}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Run modules for each request to play with URI with UNIQUE query parameters.
|
|
# WMAP_UNIQUE_QUERY
|
|
#
|
|
idx = 0
|
|
matches5.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins for each request that have a distinct
|
|
# GET/POST URI QUERY string.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
utest_query = {}
|
|
|
|
framework.db.each_request_target_with_query do |req|
|
|
#
|
|
# Only test unique query strings by comparing signature to previous tested signatures 'path,p1,p2,pn'
|
|
#
|
|
if (utest_query.has_key?(mod.signature(req.path,req.query)) == false)
|
|
#
|
|
# Weird bug req.method doesnt work
|
|
# collides with some method named 'method'
|
|
# column table renamed to 'meth'.
|
|
#
|
|
mod.datastore['METHOD'] = req.meth.upcase
|
|
mod.datastore['PATH'] = req.path
|
|
mod.datastore['QUERY'] = req.query
|
|
mod.datastore['HEADER_SEP'] = STR_HEADER_SEPARATOR
|
|
mod.datastore['HEADERS'] = headers_to_s(req.headers,STR_HEADER_SEPARATOR)
|
|
mod.datastore['COOKIE'] = header(req.headers,"Cookie")
|
|
mod.datastore['DATA'] = req.body
|
|
#
|
|
# TODO: Add method, headers, etc.
|
|
#
|
|
|
|
if wtype == :WMAP_UNIQUE_QUERY
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
|
|
#
|
|
# Unique query tested, actually the value does not matter
|
|
#
|
|
# print_status("#{mod.signature(req.path,req.query)}")
|
|
utest_query[mod.signature(req.path,req.query)]=1
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Run modules for each request to play with URI query parameters.
|
|
# This approach will reduce the complexity of the Tree used before
|
|
# and will make this shotgun implementation much simple.
|
|
# WMAP_QUERY
|
|
#
|
|
idx = 0
|
|
matches2.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins for each request that have a distinct
|
|
# GET/POST URI QUERY string.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
|
|
framework.db.each_request_target_with_query do |req|
|
|
#
|
|
# Weird bug req.method doesnt work
|
|
# collides with some method named 'method'
|
|
# column table renamed to 'meth'.
|
|
#
|
|
mod.datastore['METHOD'] = req.meth.upcase
|
|
mod.datastore['PATH'] = req.path
|
|
mod.datastore['QUERY'] = req.query
|
|
mod.datastore['HEADER_SEP'] = STR_HEADER_SEPARATOR
|
|
mod.datastore['HEADERS'] = headers_to_s(req.headers,STR_HEADER_SEPARATOR)
|
|
mod.datastore['COOKIE'] = header(req.headers,"Cookie")
|
|
mod.datastore['DATA'] = req.body
|
|
|
|
#
|
|
# TODO: Add method, headers, etc.
|
|
#
|
|
|
|
if wtype == :WMAP_QUERY
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Run modules for each request to play with request bodies.
|
|
# WMAP_BODY
|
|
#
|
|
idx = 0
|
|
matches3.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins for each request for all headers
|
|
# This can be improved alot . Later versions
|
|
# Should only tests on unique requests.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
|
|
framework.db.each_request_target_with_body do |req|
|
|
#
|
|
# Weird bug req.method doesnt work
|
|
# collides with some method named 'method'
|
|
# column table renamed to 'meth'.
|
|
#
|
|
mod.datastore['METHOD'] = req.meth.upcase
|
|
mod.datastore['PATH'] = req.path
|
|
mod.datastore['QUERY'] = req.query
|
|
mod.datastore['HEADER_SEP'] = STR_HEADER_SEPARATOR
|
|
mod.datastore['HEADERS'] = headers_to_s(req.headers,STR_HEADER_SEPARATOR)
|
|
mod.datastore['COOKIE'] = header(req.headers,"Cookie")
|
|
mod.datastore['DATA'] = req.body
|
|
#
|
|
# TODO: Add method, headers, etc.
|
|
#
|
|
|
|
if wtype == :WMAP_BODY
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Run modules for each request to play with request headers.
|
|
# WMAP_HEADERS
|
|
#
|
|
idx = 0
|
|
matches4.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins for each request for all headers
|
|
# This can be improved alot . Later versions
|
|
# Should only tests on unique requests.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
|
|
framework.db.each_request_target_with_headers do |req|
|
|
#
|
|
# Weird bug req.method doesnt work
|
|
# collides with some method named 'method'
|
|
# column table renamed to 'meth'.
|
|
#
|
|
mod.datastore['METHOD'] = req.meth.upcase
|
|
mod.datastore['PATH'] = req.path
|
|
mod.datastore['QUERY'] = req.query
|
|
mod.datastore['HEADER_SEP'] = STR_HEADER_SEPARATOR
|
|
mod.datastore['HEADERS'] = headers_to_s(req.headers,STR_HEADER_SEPARATOR)
|
|
mod.datastore['COOKIE'] = header(req.headers,"Cookie")
|
|
mod.datastore['DATA'] = req.body
|
|
#
|
|
# TODO: Add method, headers, etc.
|
|
#
|
|
|
|
if wtype == :WMAP_HEADERS
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
#
|
|
# Handle modules that need to be after all tests, once.
|
|
# Good place to have modules that analize the test results and/or
|
|
# launch exploits.
|
|
# :WMAP_GENERIC
|
|
#
|
|
idx = 0
|
|
matches10.each_key do |xref|
|
|
idx += 1
|
|
|
|
begin
|
|
mod = nil
|
|
|
|
#Carefull with the references on this one
|
|
if ((mod = framework.modules.create(xref[3])) == nil)
|
|
print_status("Failed to initialize #{xref[3]}")
|
|
next
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Loaded #{xref[3]} ...")
|
|
end
|
|
|
|
#
|
|
# The code is just a proof-of-concept and will be expanded in the future
|
|
#
|
|
if (mode & WMAP_EXPL != 0)
|
|
|
|
#
|
|
# For modules to have access to the global datastore
|
|
# i.e. set -g DOMAIN test.com
|
|
#
|
|
self.framework.datastore.each do |gkey,gval|
|
|
mod.datastore[gkey]=gval
|
|
end
|
|
|
|
#
|
|
# Parameters passed in hash xref
|
|
#
|
|
mod.datastore['RHOST'] = xref[0]
|
|
mod.datastore['RHOSTS'] = xref[0]
|
|
mod.datastore['RPORT'] = xref[1].to_s
|
|
mod.datastore['SSL'] = xref[2].to_s
|
|
|
|
#
|
|
# Run the plugins that only need to be
|
|
# launched once.
|
|
#
|
|
|
|
wtype = mod.wmap_type
|
|
|
|
if wtype == :WMAP_GENERIC
|
|
print_status("Launching #{xref[3]} #{wtype} against #{xref[0]}:#{xref[1]}")
|
|
|
|
# To run check function for modules that are exploits
|
|
if mod.respond_to?("check") and WMAP_CHECK
|
|
begin
|
|
session = mod.check_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during check launch from #{xref[3]}: #{$!}")
|
|
end
|
|
else
|
|
|
|
begin
|
|
session = mod.run_simple(
|
|
'LocalInput' => driver.input,
|
|
'LocalOutput' => driver.output,
|
|
'RunAsJob' => false)
|
|
rescue ::Exception
|
|
print_status(" >> Exception during launch from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
rescue ::Exception
|
|
print_status(" >> Exception from #{xref[3]}: #{$!}")
|
|
end
|
|
end
|
|
|
|
if (mode & WMAP_SHOW != 0)
|
|
print_status("Analysis completed in #{(Time.now.to_f - stamp)} seconds.")
|
|
print_status("Done.")
|
|
end
|
|
|
|
# EOM
|
|
end
|
|
|
|
#
|
|
# Run msf proxy
|
|
#
|
|
|
|
def cmd_wmap_proxy(*args)
|
|
cmdline = "ruby " + File.join(Msf::Config.install_root,"tools", "msfproxy.rb")
|
|
defaultopts = ""
|
|
|
|
proxyopts = defaultopts + " " + args.join(" ")
|
|
|
|
tpid = 0
|
|
proxypid = Process.fork
|
|
if proxypid.nil?
|
|
exec cmdline + " " + proxyopts
|
|
else
|
|
tpid = proxypid
|
|
Process.detach(proxypid)
|
|
end
|
|
print_status("Cmd: #{cmdline}")
|
|
print_status("Options: #{proxyopts}")
|
|
print_status("Executing proxy. pid: #{tpid}")
|
|
print_status("Done.")
|
|
end
|
|
|
|
|
|
#
|
|
# Load website structure into a tree
|
|
#
|
|
|
|
def load_tree
|
|
wtree = Tree.new("ROOT_TREE")
|
|
|
|
if selected_host == nil
|
|
print_error("Target not selected")
|
|
else
|
|
framework.db.each_request_target do |req|
|
|
tarray = req.path.to_s.split(WMAP_PATH)
|
|
tarray.delete("")
|
|
tpath = Pathname.new(WMAP_PATH)
|
|
|
|
tarray.each do |df|
|
|
wtree.add_at_path(tpath.to_s,df)
|
|
tpath = tpath + Pathname.new(df.to_s)
|
|
end
|
|
end
|
|
end
|
|
return wtree
|
|
end
|
|
|
|
#
|
|
# Print Tree structure. Ugly
|
|
#
|
|
|
|
def print_tree(tree)
|
|
if tree.is_leaf? and tree.depth > 0
|
|
print_line(("|\t"*(tree.depth-1))+"+------"+tree.name)
|
|
else
|
|
print_line(("|\t"*tree.depth)+tree.name)
|
|
end
|
|
tree.children.each_pair do |name,child|
|
|
print_tree(child)
|
|
end
|
|
end
|
|
|
|
#
|
|
# Method to parse URIs Regex RFC3986
|
|
#
|
|
def uri_parse(uri)
|
|
if uri == ''
|
|
print_error("URI required")
|
|
return
|
|
end
|
|
|
|
regexstr = '^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?'
|
|
|
|
regexurl = Regexp.new(regexstr, false, 'N')
|
|
ret = regexurl.match(uri)
|
|
|
|
return ret
|
|
end
|
|
|
|
#
|
|
# Method to transfor headers to string
|
|
#
|
|
def headers_to_s(nheaders,hsep)
|
|
hstr = ""
|
|
nheaders.each_line do |lh|
|
|
if hstr.empty?
|
|
hstr = lh
|
|
else
|
|
hstr = lh + hsep + hstr
|
|
end
|
|
end
|
|
return hstr
|
|
end
|
|
|
|
#
|
|
# Method to grab a specific header
|
|
#
|
|
def header(nheaders,hname)
|
|
nheaders.each_line do |lh|
|
|
n,v = lh.split(": ")
|
|
if n == hname
|
|
return v
|
|
end
|
|
end
|
|
return hstr
|
|
end
|
|
|
|
#
|
|
# Selected target
|
|
#
|
|
def selected_host
|
|
framework.db.selected_host
|
|
end
|
|
|
|
def selected_port
|
|
framework.db.selected_port
|
|
end
|
|
|
|
def selected_ssl
|
|
framework.db.selected_ssl
|
|
end
|
|
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|