Add keepass_discover module
parent
5cf1a4a171
commit
8248e6007d
|
@ -0,0 +1,65 @@
|
|||
import csv
|
||||
|
||||
class CMEModule:
|
||||
"""
|
||||
Search for KeePass-related files and process
|
||||
|
||||
Module by @JulienBedel
|
||||
Inspired by @harmj0y https://raw.githubusercontent.com/GhostPack/KeeThief/master/PowerShell/KeePassConfig.ps1
|
||||
"""
|
||||
|
||||
name = 'keepass_discover'
|
||||
description = "Search for KeePass-related files and process."
|
||||
supported_protocols = ['smb']
|
||||
opsec_safe = True # only legitimate commands are executed on the remote host (search process and files)
|
||||
multiple_hosts = True
|
||||
|
||||
def __init__(self):
|
||||
self.search_type = 'ALL'
|
||||
self.search_path = "'C:\\Users\\','$env:PROGRAMFILES','env:ProgramFiles(x86)'"
|
||||
|
||||
def options(self, context, module_options):
|
||||
"""
|
||||
SEARCH_TYPE Specify what to search, between:
|
||||
PROCESS Look for running KeePass.exe process only
|
||||
FILES Look for KeePass-related files (KeePass.config.xml, .kdbx, KeePass.exe) only, may take some time
|
||||
ALL Look for running KeePass.exe process and KeePass-related files (default)
|
||||
|
||||
SEARCH_PATH Comma-separated remote locations where to search for KeePass-related files (you must add single quotes around the paths if they include spaces)
|
||||
Default: 'C:\\Users\\','$env:PROGRAMFILES','env:ProgramFiles(x86)'
|
||||
"""
|
||||
|
||||
if 'SEARCH_PATH' in module_options:
|
||||
self.search_path = module_options['SEARCH_PATH']
|
||||
|
||||
if 'SEARCH_TYPE' in module_options:
|
||||
self.search_type = module_options['SEARCH_TYPE']
|
||||
|
||||
def on_admin_login(self, context, connection):
|
||||
|
||||
if self.search_type == 'ALL' or self.search_type == 'PROCESS':
|
||||
# search for keepass process
|
||||
search_keepass_process_command_str = 'powershell.exe "Get-Process kee* -IncludeUserName | Select-Object -Property Id,UserName,ProcessName | ConvertTo-CSV -NoTypeInformation"'
|
||||
search_keepass_process_output_csv = connection.execute(search_keepass_process_command_str, True) # we return the powershell command as a CSV for easier column parsing
|
||||
csv_reader = csv.reader(search_keepass_process_output_csv.split('\n'), delimiter=',')
|
||||
next(csv_reader) # to skip the csv header line
|
||||
row_number = 0 # as csv_reader is an iterator we can't get its length without exhausting it
|
||||
for row in csv_reader:
|
||||
row_number += 1
|
||||
keepass_process_id = row[0]
|
||||
keepass_process_username = row[1]
|
||||
keepass_process_name = row[2]
|
||||
context.log.highlight('Found process "{}" with PID {} (user {})'.format(keepass_process_name, keepass_process_id, keepass_process_username))
|
||||
if row_number == 0:
|
||||
context.log.info('No KeePass-related process was found')
|
||||
|
||||
# search for keepass-related files
|
||||
if self.search_type == 'ALL' or self.search_type == 'FILES':
|
||||
search_keepass_files_payload = "Get-ChildItem -Path {} -Recurse -Force -Include ('KeePass.config.xml','KeePass.exe','*.kdbx') -ErrorAction SilentlyContinue | Select FullName -ExpandProperty FullName".format(self.search_path)
|
||||
search_keepass_files_cmd = 'powershell.exe "{}"'.format(search_keepass_files_payload)
|
||||
search_keepass_files_output = connection.execute(search_keepass_files_cmd, True).split("\r\n")
|
||||
if search_keepass_files_output:
|
||||
for file in search_keepass_files_output:
|
||||
context.log.highlight('Found {}'.format(file))
|
||||
else:
|
||||
context.log.info('No KeePass-related file were found')
|
Loading…
Reference in New Issue