85 lines
1.7 KiB
Ruby
85 lines
1.7 KiB
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::DECT_COA
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'DECT Call Scanner',
|
|
'Version' => '$Revision$',
|
|
'Description' => 'This module scans for active DECT calls',
|
|
'Author' => [ 'DK <privilegedmode[at]gmail.com>' ],
|
|
'License' => MSF_LICENSE,
|
|
'References' => [ ['URL', 'http://www.dedected.org'] ]
|
|
)
|
|
end
|
|
|
|
def print_results
|
|
print_line("Time\t\t\t\tRFPI\t\tChannel")
|
|
@calls.each do |rfpi, data|
|
|
print_line("#{data['time']}\t#{data['rfpi']}\t#{data['channel']}")
|
|
end
|
|
end
|
|
|
|
|
|
=begin
|
|
def record_call(data)
|
|
print_status("Synchronizing..")
|
|
pp_scan_mode(data['rfpi_raw'])
|
|
while(true)
|
|
data = poll_coa()
|
|
puts data
|
|
end
|
|
end
|
|
=end
|
|
|
|
def run
|
|
@calls = {}
|
|
|
|
print_status("Opening interface: #{datastore['INTERFACE']}")
|
|
print_status("Using band: #{datastore['band']}")
|
|
|
|
open_coa
|
|
|
|
begin
|
|
|
|
print_status("Changing to call scan mode.")
|
|
call_scan_mode
|
|
print_status("Scanning...")
|
|
|
|
while (true)
|
|
data = poll_coa()
|
|
if (data)
|
|
parsed_data = parse_call(data)
|
|
parsed_data['time'] = Time.now
|
|
print_status("Found active call on: #{parsed_data['rfpi']}")
|
|
@calls[parsed_data['time']] = parsed_data
|
|
end
|
|
|
|
next_channel
|
|
|
|
vprint_status("Switching to channel: #{channel}")
|
|
select(nil,nil,nil,1)
|
|
end
|
|
ensure
|
|
print_status("Closing interface")
|
|
stop_coa()
|
|
close_coa()
|
|
end
|
|
|
|
print_results
|
|
end
|
|
end
|