834 B
834 B
Vulnerable Application
This module is able to extract a zip file sent through Modbus from a pcap.
Tested with Schneider TM221CE16R
Verification Steps
- Do:
use auxiliary/analyze/modbus_zip
- Do:
set PCAPFILE <PATH_TO_PCAP>
where PATH_TO_PCAP is the PATH to the pcap file - Do:
exploit
extract the zip file
Options
MODE
Default: UPLOAD. Changes offset within a packet that is used to check for a zip header.
Scenarios
msf > use auxiliary/analyze/modbus_zip
msf auxiliary(analyze/modbus_zip) > set PCAPFILE file.pcap
PCAPFILE => file.pcap
auxiliary(analyze/modbus_zip) > set MODE DOWNLOAD
MODE => DOWNLOAD
msf auxiliary(analyze/modbus_zip) > exploit
[*] Running module against 0.0.0.0
[*] Zip start on packet 1370
[*] Zip end on packet 1452
[*] Done!
[*] Auxiliary module execution completed