Class: Metasploit::Framework::LoginScanner::VMAUTHD
- Inherits:
-
Object
- Object
- Metasploit::Framework::LoginScanner::VMAUTHD
- Includes:
- Base, RexSocket, Tcp::Client
- Defined in:
- lib/metasploit/framework/login_scanner/vmauthd.rb
Overview
This is the LoginScanner class for dealing with vmware-auth. It is responsible for taking a single target, and a list of credentials and attempting them. It then saves the results.
Constant Summary collapse
- DEFAULT_PORT =
902
- LIKELY_PORTS =
[ DEFAULT_PORT, 903, 912 ]
- LIKELY_SERVICE_NAMES =
[ 'vmauthd', 'vmware-auth' ]
- PRIVATE_TYPES =
[ :password ]
- REALM_KEY =
nil
Instance Attribute Summary
Attributes included from Tcp::Client
#max_send_size, #send_delay, #sock
Instance Method Summary collapse
-
#attempt_login(credential) ⇒ Metasploit::Framework::LoginScanner::Result
This method attempts a single login with a single credential against the target.
Methods included from Tcp::Client
#chost, #connect, #cport, #disconnect, #proxies, #rhost, #rport, #set_tcp_evasions, #ssl, #ssl_version
Instance Method Details
#attempt_login(credential) ⇒ Metasploit::Framework::LoginScanner::Result
This method attempts a single login with a single credential against the target
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 |
# File 'lib/metasploit/framework/login_scanner/vmauthd.rb', line 26 def attempt_login(credential) = { credential: credential, status: Metasploit::Model::Login::Status::INCORRECT, proof: nil, host: host, port: port, service_name: 'vmauthd', protocol: 'tcp' } disconnect if self.sock begin connect select([sock], nil, nil, 0.4) # Check to see if we received an OK? [:proof] = sock.get_once if [:proof] && [:proof][/^220 VMware Authentication Daemon Version.*/] # Switch to SSL if required swap_sock_plain_to_ssl(sock) if [:proof] && [:proof][/SSL/] # If we received an OK we should send the USER sock.put("USER #{credential.public}\r\n") [:proof] = sock.get_once if [:proof] && [:proof][/^331.*/] # If we got an OK after the username we can send the PASS sock.put("PASS #{credential.private}\r\n") [:proof] = sock.get_once if [:proof] && [:proof][/^230.*/] # if the pass gives an OK, we're good to go [:status] = Metasploit::Model::Login::Status::SUCCESSFUL end end end rescue Rex::ConnectionError, EOFError, Timeout::Error, Errno::EPIPE => e .merge!( proof: e., status: Metasploit::Model::Login::Status::UNABLE_TO_CONNECT ) end disconnect if self.sock Result.new() end |