Module: PWN::Plugins::Sock
- Defined in:
- lib/pwn/plugins/sock.rb
Overview
This plugin was created to support fuzzing various networking protocols
Constant Summary collapse
Class Method Summary collapse
-
.authors ⇒ Object
- Author(s)
-
0day Inc.
-
.check_port_in_use(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.check_port_in_use( server_ip: ‘optional - target host or ip to check (Defaults to 127.0.0.1)’, port: ‘required - target port’, protocol: ‘optional - :tcp || :udp (defaults to tcp)’ ).
-
.connect(opts = {}) ⇒ Object
- Supported Method Parameters
-
sock_obj = PWN::Plugins::Sock.connect( target: ‘required - target host or ip’, port: ‘required - target port’, protocol: ‘optional - :tcp || :udp (defaults to tcp)’, tls: ‘optional - boolean connect to target socket using TLS (defaults to false)’ ).
-
.disconnect(opts = {}) ⇒ Object
- Supported Method Parameters
-
sock_obj = PWN::Plugins::Sock.disconnect( sock_obj: ‘required - sock_obj returned from #connect method’ ).
-
.get_random_unused_port(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.get_random_unused_port( server_ip: ‘optional - target host or ip to check (Defaults to 127.0.0.1)’, protocol: ‘optional - :tcp || :udp (defaults to tcp)’ ).
-
.get_tls_cert(opts = {}) ⇒ Object
- Supported Method Parameters
-
cert_obj = PWN::Plugins::Sock.get_tls_cert( target: ‘required - target host or ip’, port: ‘optional - target port (defaults to 443)’ ).
-
.help ⇒ Object
Display Usage for this Module.
-
.listen(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.listen( server_ip: ‘required - target host or ip to listen’, port: ‘required - target port’, protocol: ‘optional - :tcp || :udp (defaults to tcp)’, tls: ‘optional - boolean listen on TLS-enabled socket (defaults to false)’ ).
Class Method Details
.authors ⇒ Object
- Author(s)
-
0day Inc. <[email protected]>
240 241 242 243 244 |
# File 'lib/pwn/plugins/sock.rb', line 240 public_class_method def self. "AUTHOR(S): 0day Inc. <[email protected]> " end |
.check_port_in_use(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.check_port_in_use(
server_ip: 'optional - target host or ip to check (Defaults to 127.0.0.1)', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)'
)
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 |
# File 'lib/pwn/plugins/sock.rb', line 121 public_class_method def self.check_port_in_use(opts = {}) server_ip = opts[:server_ip] server_ip ||= '127.0.0.1' port = opts[:port] protocol = opts[:protocol] protocol ||= :tcp # TODO: Add proxy support ct = 1 s = Socket.tcp(server_ip, port, connect_timeout: ct) if protocol == :tcp s = Socket.udp(server_ip, port, connect_timeout: ct) if protocol == :udp s.close true rescue Errno::ECONNREFUSED, Errno::EHOSTUNREACH, Errno::ETIMEDOUT false end |
.connect(opts = {}) ⇒ Object
- Supported Method Parameters
-
sock_obj = PWN::Plugins::Sock.connect(
target: 'required - target host or ip', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)', tls: 'optional - boolean connect to target socket using TLS (defaults to false)'
)
20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 |
# File 'lib/pwn/plugins/sock.rb', line 20 public_class_method def self.connect(opts = {}) target = opts[:target].to_s.scrub port = opts[:port].to_i protocol = opts[:protocol] protocol ||= :tcp # TODO: Add proxy support tls = true if opts[:tls] tls ||= false tls_min_version = OpenSSL::SSL::TLS1_VERSION if tls_min_version.nil? case protocol when :tcp if tls sock = TCPSocket.open(target, port) tls_context = OpenSSL::SSL::SSLContext.new tls_context.set_params(verify_mode: OpenSSL::SSL::VERIFY_NONE) tls_context.min_version = tls_min_version # tls_context.ciphers = tls_context.ciphers.select do |cipher| # cipher[1] == cipher_tls # end tls_sock = OpenSSL::SSL::SSLSocket.new(sock, tls_context) tls_sock.hostname = target sock_obj = tls_sock.connect sock_obj.sync_close = true else sock_obj = TCPSocket.open(target, port) end when :udp sock_obj = UDPSocket.new sock_obj.connect(target, port) else raise "Unsupported protocol: #{protocol}" end sock_obj rescue OpenSSL::SSL::SSLError => e case tls_min_version when OpenSSL::SSL::TLS1_VERSION puts 'Attempting OpenSSL::SSL::TLS1_1_VERSION...' # cipher_tls = 'TLSv1.0' tls_min_version = OpenSSL::SSL::TLS1_1_VERSION when OpenSSL::SSL::TLS1_1_VERSION puts 'Attempting OpenSSL::SSL::TLS1_2_VERSION...' # cipher_tls = 'TLSv1.2' tls_min_version = OpenSSL::SSL::TLS1_2_VERSION when OpenSSL::SSL::TLS1_2_VERSION puts 'Attempting OpenSSL::SSL::TLS1_3_VERSION...' # cipher_tls = 'TLSv1.3' tls_min_version = OpenSSL::SSL::TLS1_3_VERSION else tls_min_version = :abort end retry unless tls_min_version == :abort raise "\n#{e.inspect}" if tls_min_version == :abort rescue StandardError => e sock_obj = disconnect(sock_obj: sock_obj) unless sock_obj.nil? raise e end |
.disconnect(opts = {}) ⇒ Object
- Supported Method Parameters
-
sock_obj = PWN::Plugins::Sock.disconnect(
sock_obj: 'required - sock_obj returned from #connect method'
)
230 231 232 233 234 235 236 |
# File 'lib/pwn/plugins/sock.rb', line 230 public_class_method def self.disconnect(opts = {}) sock_obj = opts[:sock_obj] sock_obj.close sock_obj = nil rescue StandardError => e raise e end |
.get_random_unused_port(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.get_random_unused_port(
server_ip: 'optional - target host or ip to check (Defaults to 127.0.0.1)', protocol: 'optional - :tcp || :udp (defaults to tcp)'
)
90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 |
# File 'lib/pwn/plugins/sock.rb', line 90 public_class_method def self.get_random_unused_port(opts = {}) server_ip = opts[:server_ip] server_ip ||= '127.0.0.1' port = -1 protocol = opts[:protocol] protocol ||= :tcp port_in_use = true while port_in_use port = Random.rand(1024..65_535) port_in_use = check_port_in_use( server_ip: server_ip, port: port, protocol: protocol ) end port rescue Errno::ECONNREFUSED, Errno::EHOSTUNREACH, Errno::ETIMEDOUT false end |
.get_tls_cert(opts = {}) ⇒ Object
- Supported Method Parameters
-
cert_obj = PWN::Plugins::Sock.get_tls_cert(
target: 'required - target host or ip', port: 'optional - target port (defaults to 443)'
)
207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 |
# File 'lib/pwn/plugins/sock.rb', line 207 public_class_method def self.get_tls_cert(opts = {}) target = opts[:target].to_s.scrub port = opts[:port] port ||= 443 tls_sock_obj = connect( target: target, port: port, protocol: :tcp, tls: true ) tls_sock_obj.peer_cert rescue StandardError => e raise e ensure tls_sock_obj = disconnect(sock_obj: tls_sock_obj) unless tls_sock_obj.nil? end |
.help ⇒ Object
Display Usage for this Module
248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 |
# File 'lib/pwn/plugins/sock.rb', line 248 public_class_method def self.help puts "USAGE: sock_obj = #{self}.connect( target: 'required - target host or ip', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)', tls: 'optional - boolean connect to target socket using TLS (defaults to false)' ) port = #{self}.get_random_unused_port( server_ip: 'optional - target host or ip to check (Defaults to 127.0.0.1)', protocol: 'optional - :tcp || :udp (defaults to tcp)' ) #{self}.check_port_in_use( server_ip: 'optional - target host or ip to check (Defaults to 127.0.0.1)', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)' ) #{self}.listen( server_ip: 'required - target host or ip to listen', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)', tls: 'optional - boolean listen on TLS-enabled socket (defaults to false)' ) cert_obj = #{self}.get_tls_cert( target: 'required - target host or ip', port: 'optional - target port (defaults to 443)' ) sock_obj = #{self}.disconnect( sock_obj: 'required - sock_obj returned from #connect method' ) #{self}.authors " end |
.listen(opts = {}) ⇒ Object
- Supported Method Parameters
-
PWN::Plugins::Sock.listen(
server_ip: 'required - target host or ip to listen', port: 'required - target port', protocol: 'optional - :tcp || :udp (defaults to tcp)', tls: 'optional - boolean listen on TLS-enabled socket (defaults to false)'
)
150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 |
# File 'lib/pwn/plugins/sock.rb', line 150 public_class_method def self.listen(opts = {}) server_ip = opts[:server_ip].to_s.scrub port = opts[:port].to_i opts[:protocol].nil? ? protocol = :tcp : protocol = opts[:protocol].to_s.downcase.to_sym tls = true if opts[:tls] tls ||= false case protocol when :tcp if tls # Multi-threaded - Not working sock = TCPServer.open(server_ip, port) tls_context = OpenSSL::SSL::SSLContext.new tls_context.set_params(verify_mode: OpenSSL::SSL::VERIFY_NONE) listen_obj = OpenSSL::SSL::SSLServer.new(sock, tls_context) # loop do # Thread.start(listen_obj.accept) do |client_thread| # while (client_input = client_thread.gets) # puts client_input # end # client_thread.close # end # end else # Multi-threaded listen_obj = TCPServer.open(server_ip, port) loop do Thread.start(listen_obj.accept) do |client_thread| while (client_input = client_thread.gets) puts client_input end client_thread.close end end end when :udp # Single Threaded listen_obj = UDPSocket.new listen_obj.bind(server_ip, port) while (client_input = listen_obj.recvmsg) puts client_input[0] end else raise "Unsupported protocol: #{protocol}" end rescue StandardError => e raise e ensure listen_obj = disconnect(sock_obj: listen_obj) unless listen_obj.nil? end |