����JFIF��� ( %"1"%)+...383,7(-.- 404 Not Found
Sh3ll
OdayForums


Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20
System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64
User : apache ( 48)
PHP Version : 7.4.20
Disable Function : NONE
Directory :  /usr/share/nmap/scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/nmap/scripts/metasploit-info.nse
local nmap = require "nmap"
local shortport = require "shortport"
local stdnse = require "stdnse"
local string = require "string"
local http = require "http"
local bin = require "bin"

description = [[
Gathers info from the Metasploit rpc service.
It requires a valid login pair. After authentication it 
tries to determine Metasploit version and deduce the OS type.
Then it creates a new console and executes few commands
to get additional info. 
References:
 * http://wiki.msgpack.org/display/MSGPACK/Format+specification 
 *  https://community.rapid7.com/docs/DOC-1516 Metasploit RPC API Guide
]]

---
--@usage
-- nmap <target> --script=metasploit-info --script-args username=root,password=root
--@output
-- 55553/tcp open  metasploit-msgrpc syn-ack
-- | metasploit-info:
-- |   Metasploit version: 4.4.0-dev Ruby version: 1.9.3 i386-mingw32 2012-02-16 API version: 1.0
-- |   Additional info:
-- |   Host Name:                 WIN
-- |   OS Name:                   Microsoft Windows XP Professional
-- |   OS Version:                5.1.2600 Service Pack 3 Build 2600
-- |   OS Manufacturer:           Microsoft Corporation
-- |   OS Configuration:          Standalone Workstation
-- |   OS Build Type:             Uniprocessor Free
-- |  ..... lots of other info ....
-- |   Domain:                    WORKGROUP
-- |_  Logon Server:              \\BLABLA
-- 
-- @args metasploit-info.username  Valid metasploit rpc username (required)
-- @args metasploit-info.password  Valid metasploit rpc password (required)
-- @args metasploit-info.command   Custom command to run on the server (optional)



author = "Aleksandar Nikolic"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"intrusive","safe"}

portrule = shortport.port_or_service(55553,"metasploit-msgrpc")
local arg_username 		= stdnse.get_script_args(SCRIPT_NAME .. ".username")
local arg_password 		= stdnse.get_script_args(SCRIPT_NAME .. ".password")
local arg_command 		= stdnse.get_script_args(SCRIPT_NAME .. ".command")
local os_type

-- returns a "prefix" that msgpack uses for strings 
local get_prefix = function(data)
	if string.len(data) <= 31 then
		return bin.pack("C",0xa0 + string.len(data))
	else 
		return bin.pack("C",0xda)  .. bin.pack("s",string.len(data))
	end	
	
end

-- returns a msgpacked data for console.read
local encode_console_read = function(method,token, console_id)
	return bin.pack("C",0x93) .. get_prefix(method) .. method .. bin.pack("H","da0020") .. token .. get_prefix(console_id) .. console_id
end

-- returns a msgpacked data for console.write
local encode_console_write = function(method, token, console_id, command)
	return bin.pack("C",0x94) .. get_prefix(method) .. method .. bin.pack("H","da0020") .. token .. get_prefix(console_id) .. console_id .. get_prefix(command) .. command
end

-- returns a msgpacked data for auth.login
local encode_auth = function(username, password)
	local method = "auth.login"
	return bin.pack("C",0x93) .. bin.pack("C",0xaa) .. method .. get_prefix(username) .. username .. get_prefix(password) .. password
end

-- returns a msgpacked data for any method without exstra parameters
local encode_noparam = function(token,method)
	-- token is always the same length
	return bin.pack("C",0x92) .. get_prefix(method) .. method .. bin.pack("H","da0020") .. token
end 

-- does the actuall call with specified, pre-packed data
-- and returns the response
local msgrpc_call = function(host, port, msg)
	local data
	local options = {
		header = {
			["Content-Type"] = "binary/message-pack"
		}
	}
	data = http.post(host,port, "/api/",options, nil , msg)
	if data and data.status and tostring( data.status ):match( "200" )  then
		return data.body
	end
	return nil
end

-- auth.login wraper, returns the auth token
local login = function(username, password,host,port)
	
	local data  = msgrpc_call(host, port, encode_auth(username,password))
	
	if data then
		local start = string.find(data,"success")
		if  start > -1 then
			-- get token
			local token = string.sub(string.sub(data,start),17) -- "manualy" unpack token
			return true, token
		else
			return false, nil
		end
	end
	stdnse.print_debug("something is wrong:" .. data )
	return false, nil
end

-- core.version wraper, returns version info, and sets the OS type
-- so we can decide which commands to send later
local get_version = function(host, port, token)
	local msg = encode_noparam(token,"core.version")

	local data = msgrpc_call(host, port, msg)
	-- unpack data 
	if data then
		-- get version, ruby version, api version
		local start = string.find(data,"version")
		local metasploit_version
		local ruby_version 
		local api_version
		if start then 
			metasploit_version = string.sub(string.sub(data,start),9)
			start = string.find(metasploit_version,"ruby")
			start = start - 2
			metasploit_version = string.sub(metasploit_version,1,start)
			start = string.find(data,"ruby")
			ruby_version = string.sub(string.sub(data,start),6)
			start = string.find(ruby_version,"api")
			start = start - 2 			
			ruby_version = string.sub(ruby_version,1,start)
			start = string.find(data,"api")
			api_version = string.sub(string.sub(data,start),5)
			-- put info in a table and parse for OS detection and other info
			port.version.name = "metasploit-msgrpc"
			port.version.product = metasploit_version
			port.version.name_confidence = 100
			nmap.set_port_version(host,port)
			local info = "Metasploit version: " .. metasploit_version .. " Ruby version: " .. ruby_version .. " API version: " .. api_version
			if string.find(ruby_version,"mingw") < 0 then
				os_type = "linux" -- assume linux for now
			else -- mingw compiler means it's a windows build
				os_type = "windows"
			end
			stdnse.print_debug(info)
			return info
		end
	end
	return nil
end

-- console.create wraper, returns console_id 
-- which we can use to interact with metasploit further
local create_console = function(host,port,token)
	local msg = encode_noparam(token,"console.create")
	local data = msgrpc_call(host, port, msg)
	-- unpack data 
	if data then
		--get console id
		local start = string.find(data,"id")
		local console_id 
		if start then
			console_id = string.sub(string.sub(data,start),4)
			local next_token = string.find(console_id,"prompt")
			console_id = string.sub(console_id,1,next_token-2)
			return console_id
		end
	end
	return nil

end

-- console.read wraper
local read_console = function(host,port,token,console_id)
	local msg = encode_console_read("console.read",token,console_id)
	local data = msgrpc_call(host, port, msg)
	-- unpack data 
	if data then
		-- check if busy
		while string.byte(data,string.len(data)) == 0xc3 do
			-- console is busy , let's retry in one second
			stdnse.sleep(1)
			data = msgrpc_call(host, port, msg)
		end
		local start = string.find(data,"data")
		local read_data 
		if start then
			read_data = string.sub(string.sub(data,start),8)
			local next_token = string.find(read_data,"prompt")
			read_data = string.sub(read_data,1,next_token-2)
			return read_data
		end		
	end 
end

-- console.write wraper
local write_console = function(host,port,token,console_id,command)
	local msg = encode_console_write("console.write",token,console_id,command .. "\n")
	local data = msgrpc_call(host, port, msg)
	-- unpack data 
	if data then
		return true
	end
	return false
end

-- console.destroy wraper, just to be nice, we don't want console to hang ...
local destroy_console = function(host,port,token,console_id)
	local msg = encode_console_read("console.destroy",token,console_id)
	local data = msgrpc_call(host, port, msg)
end

-- write command and read result helper
local write_read_console = function(host,port,token, console_id,command)
	if write_console(host,port,token,console_id, command) then 
		local read_data = read_console(host,port,token,console_id)
		if read_data then
			read_data = string.sub(read_data,string.find(read_data,"\n")+1) -- skip command echo
			return read_data
		end
	end
	return nil
end

action = function( host, port )
	if not arg_username or not arg_password then
		stdnse.print_debug("This script requires username and password supplied as arguments")
		return false
	end
	
	-- authenticate
	local status, token = login(arg_username,arg_password,host,port)
	if  status then
		-- get version info
		local info = get_version(host,port,token)
		local console_id = create_console(host,port,token)
		if console_id then
			local read_data = read_console(host,port,token,console_id) -- first read the banner/ascii art
			stdnse.print_debug(2,read_data) -- print the nice looking banner if dbg level high enough :)
			if read_data then
				if os_type == "linux" then
					read_data = write_read_console(host,port,token,console_id, "uname -a")
					if read_data then
						info = info .. "\nAdditional info: " ..  read_data
					end
					read_data = write_read_console(host,port,token,console_id, "id")
					if read_data then
						info = info ..  read_data
					end
				elseif os_type == "windows" then 
					read_data = write_read_console(host,port,token,console_id, "systeminfo")
					if read_data then
						stdnse.print_debug(2,read_data) -- print whole info if dbg level high enough
						local stop = string.find(read_data,"Hotfix") -- trim data down , systeminfo return A LOT
						read_data = string.sub(read_data,1,stop-2)
						info = info .. "\nAdditional info: \n" ..  read_data
					end
				end
				if arg_command then
					read_data = write_read_console(host,port,token,console_id, arg_command)
					if read_data then
						info = info .. "\nCustom command output: " ..  read_data
					end
				end
				if read_data then
					-- let's be nice and close the console
					destroy_console(host,port,token,console_id)
				end
			end
		end 
		if info then
			return stdnse.format_output(true,info)
		end
	end
	return false
end

ZeroDay Forums Mini