rapid7/metasploit-framework

View on GitHub
modules/post/hardware/automotive/identifymodules.rb

Summary

Maintainability
A
1 hr
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Post
  include Msf::Post::Hardware::Automotive::UDS

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Scan CAN Bus for Diagnostic Modules',
        'Description' => %q{ Post Module to scan the CAN bus for any modules that can respond to UDS DSC queries},
        'License' => MSF_LICENSE,
        'Author' => ['Craig Smith'],
        'Platform' => ['hardware'],
        'SessionTypes' => ['hwbridge']
      )
    )
    register_options([
      OptInt.new('STARTID', [true, 'Start scan from this ID', 0x600]),
      OptInt.new('ENDID', [true, 'End scan at this ID', 0x7F7]),
      OptString.new('CANBUS', [false, 'CAN Bus to perform scan on, defaults to connected bus', nil])
    ])
    @found_id = []
  end

  def run
    scanned_ids = 0
    print_line('Starting scan...')
    (datastore['STARTID']..datastore['ENDID']).each do |id|
      res = set_dsc(datastore['CANBUS'], id, id + 8, 1)
      scanned_ids += 1
      next if res.nil?
      next unless res.key? 'Packets'
      next unless res['Packets'].empty?

      if (res['Packets'][0].key? 'DATA') && res['Packets'][0]['DATA'].size > 3 && (res['Packets'][0]['DATA'][0].hex == 3 && res['Packets'][0]['DATA'][1].hex == 0x7f && res['Packets'][0]['DATA'][2].hex == 0x10)
        print_status("Identified module #{'%3x' % id}")
        @found_id << id
      end
    end
    print_line("Scanned #{scanned_ids} IDs and found #{@found_id.size} modules that responded")
    @found_id.each do |id|
      print_line("  #{'%3x' % id}")
    end
  end
end