rapid7/metasploit-framework

View on GitHub
modules/post/windows/gather/enum_domains.rb

Summary

Maintainability
A
0 mins
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Post
  include Msf::Post::Windows::NetAPI

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Windows Gather Domain Enumeration',
        'Description' => %q{
          This module enumerates currently the domains a host can see and the domain
          controllers for that domain.
        },
        'License' => MSF_LICENSE,
        'Author' => [ 'mubix' ],
        'Platform' => [ 'win' ],
        'SessionTypes' => [ 'meterpreter' ]
      )
    )
  end

  def run
    domains = net_server_enum(SV_TYPE_DOMAIN_ENUM)
    return if domains.nil?

    domains.each do |domain|
      print_status("Enumerating DCs for #{domain[:name]}")
      dcs = net_server_enum(SV_TYPE_DOMAIN_BAKCTRL | SV_TYPE_DOMAIN_CTRL, domain[:name])

      if dcs.count == 0
        print_error('No Domain Controllers found...')
        next
      end

      dcs.each do |dc|
        print_good("Domain Controller: #{dc[:name]}")

        report_note(
          host: session,
          type: 'domain.hostnames',
          data: dc[:name],
          update: :unique_data
        )
      end
    end
  end
end