Module: Msf::Auxiliary::Juniper
- Includes:
- Report
- Defined in:
- lib/msf/core/auxiliary/juniper.rb
Overview
This module provides methods for working with Juniper equipment
Instance Method Summary collapse
- #juniper_junos_config_eater(thost, tport, config) ⇒ Object
- #juniper_screenos_config_eater(thost, tport, config) ⇒ Object
Methods included from Report
#active_db?, #create_cracked_credential, #create_credential, #create_credential_and_login, #create_credential_login, #db, #db_warning_given?, #get_client, #get_host, #inside_workspace_boundary?, #invalidate_login, #mytask, #myworkspace, #myworkspace_id, #report_auth_info, #report_client, #report_exploit, #report_host, #report_loot, #report_note, #report_service, #report_vuln, #report_web_form, #report_web_page, #report_web_site, #report_web_vuln, #store_cred, #store_local, #store_loot
Methods included from Metasploit::Framework::Require
optionally, optionally_active_record_railtie, optionally_include_metasploit_credential_creation, #optionally_include_metasploit_credential_creation, optionally_require_metasploit_db_gem_engines
Instance Method Details
#juniper_junos_config_eater(thost, tport, config) ⇒ Object
145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 |
# File 'lib/msf/core/auxiliary/juniper.rb', line 145 def juniper_junos_config_eater(thost, tport, config) report_host({ host: thost, os_name: 'Juniper JunOS' }) if framework.db.active credential_data = { address: thost, port: tport, protocol: 'tcp', workspace_id: myworkspace_id, origin_type: :service, private_type: :nonreplayable_hash, service_name: '', module_fullname: fullname, status: Metasploit::Model::Login::Status::UNTRIED } end store_loot('juniper.junos.config', 'text/plain', thost, config.strip, 'config.txt', 'Juniper JunOS Configuration') # we'll take out the pretty format so its easier to regex config = config.split("\n").join('') # Example: # system { # root-authentication { # encrypted-password "$1$pz9b1.fq$foo5r85Ql8mXdoRUe0C1E."; ## SECRET-DATA # } # } if /root-authentication\s+\{\s+encrypted-password "(?<root_hash>[^"]+)";/i =~ config root_hash = root_hash.strip jtr_format = Metasploit::Framework::Hashes.identify_hash root_hash print_good("root password hash: #{root_hash}") if framework.db.active cred = credential_data.dup cred[:username] = 'root' cred[:jtr_format] = jtr_format cred[:private_data] = root_hash create_credential_and_login(cred) end end # access privileges https://kb.juniper.net/InfoCenter/index?page=content&id=KB10902 config.scan(/user (?<user_name>[^\s]+) {(\s+ full-name (?<fullname>[^;]+);)?\s+ uid (?<user_uid>\d+);\s+ class (?<user_permission>super-user|operator|read-only|unauthorized|[^;]+);\s+ authentication {\s+encrypted-password "(?<user_hash>[^\s]+)";/i).each do |result| user_name = result[0].strip user_uid = result[2].strip = result[3].strip user_hash = result[4].strip jtr_format = Metasploit::Framework::Hashes.identify_hash user_hash print_good("User #{user_uid} named #{user_name} in group #{} found with password hash #{user_hash}.") next unless framework.db.active cred = credential_data.dup cred[:username] = user_name cred[:jtr_format] = jtr_format cred[:private_data] = user_hash create_credential_and_login(cred) end # https://supportf5.com/csp/article/K6449 special characters allowed in snmp community strings config.scan(%r{community "?(?<snmp_community>[\w\d\s().*/-:_?=@,&%$+!]+)"? \{(\s+view [\w\-]+;)?\s+authorization read-(?<snmp_permission>only|write)}i).each do |result| snmp_community = result[0].strip = result[1].strip print_good("SNMP community #{snmp_community} with permissions read-#{}") next unless framework.db.active cred = credential_data.dup if .downcase == 'write' cred[:access_level] = 'RW' else cred[:access_level] = 'RO' end cred[:protocol] = 'udp' cred[:port] = 161 cred[:private_data] = snmp_community cred[:private_type] = :password cred[:service_name] = 'snmp' create_credential_and_login(cred) end # radius-server config.scan(/\s*radius-server \{([^}]+)\}/i).each do |result_block| result_block[0].strip.scan(/(?<radius_server>[0-9.]{7,15}) secret "(?<radius_hash>[^"]+)";/i).each do |result| radius_hash = result[1].strip radius_server = result[0].strip print_good("radius server #{radius_server} password hash: #{radius_hash}") next unless framework.db.active cred = credential_data.dup cred[:address] = radius_server cred[:port] = 1812 cred[:protocol] = 'udp' cred[:private_data] = radius_hash cred[:service_name] = 'radius' create_credential_and_login(cred) end end # tacplus-server config.scan(/\s*tacplus-server \{([^}]+)\}/i).each do |result_block| result_block[0].strip.scan(/(?<tacplus_server>[0-9.]{7,15}) secret "(?<hash>[^"]+)";/i).each do |result| ip = result[0].strip hash = result[1].strip jtr_format = Metasploit::Framework::Hashes.identify_hash hash print_good("tacplus server #{ip} with password hash #{hash}") next unless framework.db.active cred = credential_data.dup cred[:jtr_format] = jtr_format cred[:private_data] = hash create_credential_and_login(cred) end end config.scan(/pap {\s+local-name "(?<ppp_username>.+)";\s+local-password "(?<ppp_hash>[^"]+)";/i).each do |result| ppp_username = result[0].strip ppp_hash = result[1].strip print_good("PPTP username #{ppp_username} hash #{ppp_hash} via PAP") next unless framework.db.active cred = credential_data.dup cred[:username] = ppp_username cred[:private_data] = ppp_hash cred[:service_name] = 'pptp' cred[:port] = 1723 create_credential_and_login(cred) end end |
#juniper_screenos_config_eater(thost, tport, config) ⇒ Object
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 |
# File 'lib/msf/core/auxiliary/juniper.rb', line 12 def juniper_screenos_config_eater(thost, tport, config) # this is for the netscreen OS, which came on SSG (ie SSG5) type devices. # It is similar to cisco, however it doesn't always put all fields we care # about on one line. # Docs: snmp -> https://kb.juniper.net/InfoCenter/index?page=content&id=KB4223 # ppp -> https://kb.juniper.net/InfoCenter/index?page=content&id=KB22592 # ike -> https://kb.juniper.net/KB4147 # https://github.com/h00die/MSF-Testing-Scripts/blob/master/juniper_strings.py#L171 report_host({ host: thost, os_name: 'Juniper ScreenOS' }) if framework.db.active credential_data = { address: thost, port: tport, protocol: 'tcp', workspace_id: myworkspace_id, origin_type: :service, service_name: '', private_type: :nonreplayable_hash, module_fullname: fullname, status: Metasploit::Model::Login::Status::UNTRIED } end store_loot('juniper.netscreen.config', 'text/plain', thost, config.strip, 'config.txt', 'Juniper Netscreen Configuration') # admin name and password # Example lines: # set admin name "netscreen" # set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn" config.scan(/set admin name "(?<admin_name>[a-z0-9]+)".+set admin password "(?<admin_password_hash>[a-z0-9]+)"/mi).each do |result| admin_name = result[0].strip admin_hash = result[1].strip print_good("Admin user #{admin_name} found with password hash #{admin_hash}") next unless framework.db.active cred = credential_data.dup cred[:username] = admin_name cred[:private_data] = admin_hash create_credential_and_login(cred) end # user account # Example lines: # set user "testuser" uid 1 # set user "testuser" type auth # set user "testuser" hash-password "02b0jt2gZGipCiIEgl4eainqZIKzjSNQYLIwE=" # set user "testuser" enable config.scan(/set user "(?<user_name>[a-z0-9]+)" uid (?<user_uid>\d+).+set user "\k<user_name>" type (?<user_type>\w+).+set user "\k<user_name>" hash-password "(?<user_hash>[0-9a-z=]{38})".+set user "\k<user_name>" (?<user_enable>enable).+/mi).each do |result| user_name = result[0].strip user_uid = result[1].strip user_enable = result[4].strip user_hash = result[3].strip print_good("User #{user_uid} named #{user_name} found with password hash #{user_hash}. Enable permission: #{user_enable}") next unless framework.db.active cred = credential_data.dup cred[:username] = user_name cred[:jtr_format] = 'sha1' cred[:private_data] = user_hash create_credential_and_login(cred) end # snmp # Example lines: # set snmp community "sales" Read-Write Trap-on traffic version v1 config.scan(/set snmp community "(?<snmp_community>[a-z0-9]+)" (?<snmp_permissions>Read-Write|Read-Only)/i).each do |result| snmp_community = result[0].strip = result[1].strip print_good("SNMP community #{snmp_community} with permissions #{}") next unless framework.db.active cred = credential_data.dup if .downcase == 'read-write' cred[:access_level] = 'RW' else cred[:access_level] = 'RO' end cred[:protocol] = 'udp' cred[:port] = 161 cred[:service_name] = 'snmp' cred[:private_data] = snmp_community cred[:private_type] = :password create_credential_and_login(cred) end # ppp # Example lines: # setppp profile "ISP" auth type pap # setppp profile "ISP" auth local-name "username" # setppp profile "ISP" auth secret "fzSzAn31N4Sbh/sukoCDLvhJEdn0DVK7vA==" config.scan(/setppp profile "(?<ppp_name>[a-z0-9]+)" auth type (?<ppp_authtype>[a-z]+).+setppp profile "\k<ppp_name>" auth local-name "(?<ppp_username>[a-z0-9]+)".+setppp profile "\k<ppp_name>" auth secret "(?<ppp_hash>.+)"/mi).each do |result| ppp_name = result[0].strip ppp_username = result[2].strip ppp_hash = result[3].strip ppp_authtype = result[1].strip print_good("PPTP Profile #{ppp_name} with username #{ppp_username} hash #{ppp_hash} via #{ppp_authtype}") next unless framework.db.active cred = credential_data.dup cred[:username] = ppp_username cred[:private_data] = ppp_hash cred[:service_name] = 'pptp' cred[:port] = 1723 create_credential_and_login(cred) end # ike # Example lines: # set ike gateway "To-Cisco" address 2.2.2.1 Main outgoing-interface "ethernet1" preshare "netscreen" proposal "pre-g2-des-sha" config.scan(/set ike gateway "(?<ike_name>.+)" address (?<ike_address>[0-9.]+) Main outgoing-interface ".+" preshare "(?<ike_password>.+)" proposal "(?<ike_method>.+)"/i).each do |result| ike_name = result[0].strip ike_address = result[1].strip ike_password = result[2].strip ike_method = result[3].strip print_good("IKE Profile #{ike_name} to #{ike_address} with password #{ike_password} via #{ike_method}") next unless framework.db.active cred = credential_data.dup cred[:private_data] = ike_password cred[:private_type] = :password cred[:service_name] = 'ike' cred[:port] = 500 cred[:address] = ike_address cred[:protocol] = 'udp' create_credential_and_login(cred) end end |