69 lines
1.5 KiB
Ruby
69 lines
1.5 KiB
Ruby
##
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::DECT_COA
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'DECT Base Station Scanner',
|
|
'Description' => 'This module scans for DECT base stations',
|
|
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
|
|
'License' => MSF_LICENSE
|
|
)
|
|
|
|
end
|
|
|
|
|
|
def print_results
|
|
print_line("RFPI\t\tChannel")
|
|
@base_stations.each do |rfpi, data|
|
|
print_line("#{data['rfpi']}\t#{data['channel']}")
|
|
end
|
|
end
|
|
|
|
def run
|
|
@base_stations = {}
|
|
|
|
print_status("Opening interface: #{datastore['INTERFACE']}")
|
|
print_status("Using band: #{datastore['BAND']}")
|
|
|
|
open_coa
|
|
|
|
begin
|
|
|
|
print_status("Changing to fp scan mode.")
|
|
fp_scan_mode
|
|
print_status("Scanning...")
|
|
|
|
while(true)
|
|
data = poll_coa()
|
|
|
|
if (data)
|
|
parsed_data = parse_station(data)
|
|
if (not @base_stations.key?(parsed_data['rfpi']))
|
|
print_status("Found New RFPI: #{parsed_data['rfpi']}")
|
|
@base_stations[parsed_data['rfpi']] = parsed_data
|
|
end
|
|
end
|
|
|
|
next_channel
|
|
|
|
vprint_status("Switching to channel: #{channel}")
|
|
select(nil,nil,nil,1)
|
|
end
|
|
ensure
|
|
print_status("Closing interface")
|
|
stop_coa()
|
|
close_coa()
|
|
end
|
|
|
|
print_results
|
|
end
|
|
end
|