Module: Msf::Auxiliary::Ubiquiti
- Includes:
- Report
- Defined in:
- lib/msf/core/auxiliary/ubiquiti.rb
Overview
This module provides methods for working with Ubiquiti equipment
Instance Method Summary collapse
- #bson_to_json(byte_buffer) ⇒ Object
- #decrypt_unf(contents) ⇒ Object
- #extract_and_process_db(db_path) ⇒ Object
-
#process_admin(lines, credential_data) ⇒ Object
Example BSON lines “collection”=>“admin” “name”=>“adminuser”, “email”=>“[email protected]”, “x_shadow”=>“$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V.”, “time_created”=>1551825823, “last_site_name”=>“default”, “ubic_name”=>“[email protected]”, “ubic_uuid”=>“c23da064-3f4d-282f-1dc9-7e25f9c6812c”, “ui_settings”=>{“dashboardConfig”=>{“lastActiveDashboardId”=>“2c7f2d213813ce2487d1ac38”, “dashboards”=>{“3c7f678a3815ce2021d1d9c7”=>{“order”=>1, “5b4f2d269115ce2087d1abb9”=>{}}}}}.
-
#process_device(lines, _) ⇒ Object
Example lines “collection”=>“device” “ip” => “5.5.5.5”, “mac” => “cc:cc:cc:cc:cc:cc”, “model” => “UGW3”, “type” => “ugw”, “version” => “4.4.44.5213844”, “adopted” => true, “site_id” => “5aaaaaabaaaaae1117d1d1b6”, “x_authkey” => “eaaaaaaa63e59ab89c111e11d6e11aa1”, “cfgversion” => “aaa4b11b1df1a111”, “config_network” => {“type” => “dhcp”, “ip” => “1.1.1.1”, “license_state” => “registered”, “two_phase_adopt” => false, “unsupported” => false, “unsupported_reason” => 0, “x_fingerprint” => “aa:aa:11:aa:11:11:11:11:11:11:11:11:11:11:11:11”, “x_ssh_hostkey” => “MIIBIjANBgkAhkiG9w0AAQEFAAOCAQ8AMIIBCgKCAQEAAU4S/7r548xvtGuHlgAAAKzkrL+t97ZWAZru8wQFbltEB4111HiIAkzt041td8V+P7c1bQtn3YQdViAuH2h2sgt8feAvMWo56OskAoDvHwAEv5AWqmPKy/xmKbdfgA5wTzvSztPGFA4QuOuA1YxQICf1MgpoOtplAAA31JxAYF/t7n8qgvJlm1JRv2AAAZHHtSiz1IaxzOO9LAAAqCfHvHugPcZYk2yAAAP7JrnnR1fAVj9F4aaYaA0eSjvDTAglykXHCbh1EWAAAecqHZ/SWn9cjmuAAArZxxG6m6Eu/aj9we82/PmtKzQGN0RWUsgrxajQowtNpVsNTnaOglUsfQIDAAAA”, “x_ssh_hostkey_fingerprint” => “11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11”, “inform_url” => “1.1.2.2:8080/inform”, “inform_ip” => “1.1.1.1”, “serial” => “AAAAAAAAAAAA”, “required_version” => “4.0.0”, “ethernet_table” => [{ “mac” => “b4:fb:e4:cc:cc:cc”, “num_port” => 1, “name” => “eth0”}, => “b4:fb:e4:bb:bb:bb”, “num_port” => 1, “name” => “eth1”, => “b4:fb:e4:aa:aa:aa”, “num_port” => 1, “name” => “eth2”], “fw_caps” => 184323, “hw_caps” => 0, “usg_caps” => 786431, “board_rev” => 16, “x_aes_gcm” => true, “ethernet_overrides” => [=> “eth1”, “networkgroup” => “LAN”, => “eth0”, “networkgroup” => “WAN”], “led_override” => “default”, “led_override_color” => “#0000ff”, “led_override_color_brightness” => 100, “outdoor_mode_override” => “default”, “name” => “USG”, “map_id” => “1a111c2e1111ce2087d1e199”, “x” => -22.11111198630405, “y” => -41.1111113859866, “heightInMeters” => 2.4}.
-
#process_firewallgroup(lines, _) ⇒ Object
Example lines “collection”=>“firewallgroup” “name” => “Cameras”, “group_type” => “address-group”, “group_members” => [“1.1.1.1”], “site_id” => “5c7f111b3815ce208aaa111a”.
-
#process_firewallrule(lines, _) ⇒ Object
Example BSON lines “collection”=>“firewallrule” “ruleset” => “WAN_OUT”, “rule_index” => “2000”, “name” => “Block Example”, “enabled” => true, “action” => “reject”, “protocol_match_excepted” => false, “logging” => false, “state_new” => false, “state_established” => false, “state_invalid” => false, “state_related” => false, “ipsec” => “”, “src_firewallgroup_ids” => [“1a1c15a11111ce14b1f1111a”], “src_mac_address” => “”, “dst_firewallgroup_ids” => [], “dst_address” => “”, “src_address” => “”, “protocol” => “all”, “icmp_typename” => “”, “src_networkconf_id” => “”, “src_networkconf_type” => “NETv4”, “dst_networkconf_id” => “”, “dst_networkconf_type” => “NETv4”, “site_id” => “1c1f208b3815ce1111a1a1a1”.
-
#process_radiusprofile(lines, credential_data) ⇒ Object
Example BSON lines “collection”=>“radiusprofile” “attr_no_delete”=>true, “attr_hidden_id”=>“Default”, “name”=>“Default”, “site_id”=>“3c7f226b2315be2087a1d5b2”, “use_usg_auth_server”=>true, “auth_servers”=>[{“ip”=>“192.168.0.1”, “port”=>1812, “x_secret”=>“”], “acct_servers”=>[]}.
-
#process_setting(lines, credential_data) ⇒ Object
Example lines “collection”=>“setting” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“ntp”, “ntp_server_1”=>“0.ubnt.pool.ntp.org”, “ntp_server_2”=>“1.ubnt.pool.ntp.org”, “ntp_server_3”=>“2.ubnt.pool.ntp.org”, “ntp_server_4”=>“3.ubnt.pool.ntp.org” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“mgmt”, “advanced_feature_enabled”=>false, “x_ssh_enabled”=>true, “x_ssh_bind_wildcard”=>false, “x_ssh_auth_password_enabled”=>true, “unifi_idp_enabled”=>true, “x_mgmt_key”=>“ba6cbe170f8276cd86b24ac79ab29afc”, “x_ssh_username”=>“admin”, “x_ssh_password”=>“16xoB6F2UyAcU6fP”, “x_ssh_keys”=>[], “x_ssh_sha512passwd”=>“$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V.” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“connectivity”, “enabled”=>true, “uplink_type”=>“gateway”, “x_mesh_essid”=>“vwire-851237d214c8c6ba”, “x_mesh_psk”=>“523a9b872b4624c7894f96c3ae22cdfa” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“snmp”, “community”: “public”, “enabled”: true, “enabledV3”: true, “username”: “usernamesnmpv3”, “x_password”: “passwordsnmpv3”.
-
#process_user(lines, _) ⇒ Object
Example lines “collection”=>“user” “mac” => “00:0c:29:11:aa:11”, “site_id” => “5c7f111b1111aa2087d11111”, “oui” => “Vmware”, “is_guest” => false, “first_seen” => 1551111161, “last_seen” => 1561621747, “is_wired” => true, “hostname” => “android”, “usergroup_id” => “”, “name” => “example device”, “noted” => true, “use_fixedip” => true, “network_id” => “1c7f111a1115aa2087aaa9aa”, “fixed_ip” => “7.7.7.7”.
-
#process_wlanconf(lines, credential_data) ⇒ Object
Example lines “collection”=>“wlanconf” “enabled” => true, “security” => “wpapsk”, “wep_idx” => 1, “wpa_mode” => “wpa2”, “wpa_enc” => “ccmp”, “usergroup_id” => “5a7f111a3815ce1111a1d1c3”, “dtim_mode” => “default”, “dtim_ng” => 1, “dtim_na” => 1, “minrate_ng_enabled” => false, “minrate_ng_advertising_rates” => false, “minrate_ng_data_rate_kbps” => 1000, “minrate_ng_cck_rates_enabled” => true, “minrate_na_enabled” => false, “minrate_na_advertising_rates” => false, “minrate_na_data_rate_kbps” => 6000, “mac_filter_enabled” => false, “mac_filter_policy” => “allow”, “mac_filter_list” => [], “bc_filter_enabled” => false, “bc_filter_list” => [], “group_rekey” => 3600, “name” => “ssid_name”, “x_passphrase” => “supersecret”, “wlangroup_id” => “5c7f208c3815ce2087d1d9c4”, “schedule” => [], “minrate_ng_mgmt_rate_kbps” => 1000, “minrate_na_mgmt_rate_kbps” => 6000, “minrate_ng_beacon_rate_kbps” => 1000, “minrate_na_beacon_rate_kbps” => 6000, “site_id” => “5c7f208b3815ce2087d1d9b6”, “x_iapp_key” => “d11a1c86df1111be86aaa69e8aa1c57f”, “no2ghz_oui” => true.
- #repair_zip(fname) ⇒ Object
- #unifi_config_eater(thost, tport, config) ⇒ Object
Methods included from Report
#active_db?, #create_cracked_credential, #create_credential, #create_credential_and_login, #create_credential_login, #db, #db_warning_given?, #get_client, #get_host, #inside_workspace_boundary?, #invalidate_login, #mytask, #myworkspace, #myworkspace_id, #report_auth_info, #report_client, #report_exploit, #report_host, #report_loot, #report_note, #report_service, #report_vuln, #report_web_form, #report_web_page, #report_web_site, #report_web_vuln, #store_cred, #store_local, #store_loot
Methods included from Metasploit::Framework::Require
optionally, optionally_active_record_railtie, optionally_include_metasploit_credential_creation, #optionally_include_metasploit_credential_creation, optionally_require_metasploit_db_gem_engines
Instance Method Details
#bson_to_json(byte_buffer) ⇒ Object
54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 54 def bson_to_json(byte_buffer) # This function takes a byte buffer (db file from Unifi read in), which is a bson string # it then converts it to JSON, where it uses the 'select collection' documents # as keys. For instance a bson that contained the follow (displayed in json # for ease): # {"__cmd"=>"select", "collection"=>"heatmap"} # {'example'=>'example'} # {'example2'=>'example2'} # would become: # {'heatmap'=>[{'example'=>'example'}, {'example2'=>'example2'}]} # this is mainly done to ease the grouping of items for easy navigation later. buf = BSON::ByteBuffer.new(byte_buffer) output = {} key = '' while buf begin # read the document from the buffer bson = BSON::Document.from_bson(buf) if bson.has_key?('__cmd') key = bson['collection'] output[key] = [] next end output[key] << bson rescue RangeError break end end output end |
#decrypt_unf(contents) ⇒ Object
15 16 17 18 19 20 21 22 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 15 def decrypt_unf(contents) aes = OpenSSL::Cipher.new('aes-128-cbc') aes.decrypt aes.key = 'bcyangkmluohmars' # https://github.com/zhangyoufu/unifi-backup-decrypt/blob/master/E> aes.padding = 0 aes.iv = 'ubntenterpriseap' aes.update(contents) end |
#extract_and_process_db(db_path) ⇒ Object
36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 36 def extract_and_process_db(db_path) f = nil Zip::File.open(db_path) do |zip_file| # Handle entries one by one zip_file.each do |entry| # Extract to file next unless entry.name == 'db.gz' print_status('extracting db.gz') gz = Zlib::GzipReader.new(entry.get_input_stream) f = gz.read gz.close break end end f end |
#process_admin(lines, credential_data) ⇒ Object
Example BSON lines “collection”=>“admin” “name”=>“adminuser”, “email”=>“[email protected]”, “x_shadow”=>“$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V.”, “time_created”=>1551825823, “last_site_name”=>“default”, “ubic_name”=>“[email protected]”, “ubic_uuid”=>“c23da064-3f4d-282f-1dc9-7e25f9c6812c”, “ui_settings”=>{“dashboardConfig”=>{“lastActiveDashboardId”=>“2c7f2d213813ce2487d1ac38”, “dashboards”=>{“3c7f678a3815ce2021d1d9c7”=>{“order”=>1, “5b4f2d269115ce2087d1abb9”=>{}}}}}
123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 123 def process_admin(lines, credential_data) lines.each do |line| admin_name = line['name'] admin_email = line['email'] admin_password_hash = line['x_shadow'] print_good("Admin user #{admin_name} with email #{admin_email} found with password hash #{admin_password_hash}") next unless framework.db.active cred = credential_data.dup cred[:username] = admin_name cred[:private_data] = admin_password_hash cred[:private_type] = :nonreplayable_hash create_credential_and_login(cred) end end |
#process_device(lines, _) ⇒ Object
Example lines “collection”=>“device” “ip” => “5.5.5.5”, “mac” => “cc:cc:cc:cc:cc:cc”, “model” => “UGW3”, “type” => “ugw”, “version” => “4.4.44.5213844”, “adopted” => true, “site_id” => “5aaaaaabaaaaae1117d1d1b6”, “x_authkey” => “eaaaaaaa63e59ab89c111e11d6e11aa1”, “cfgversion” => “aaa4b11b1df1a111”, “config_network” => {“type” => “dhcp”, “ip” => “1.1.1.1”, “license_state” => “registered”, “two_phase_adopt” => false, “unsupported” => false, “unsupported_reason” => 0, “x_fingerprint” => “aa:aa:11:aa:11:11:11:11:11:11:11:11:11:11:11:11”, “x_ssh_hostkey” => “MIIBIjANBgkAhkiG9w0AAQEFAAOCAQ8AMIIBCgKCAQEAAU4S/7r548xvtGuHlgAAAKzkrL+t97ZWAZru8wQFbltEB4111HiIAkzt041td8V+P7c1bQtn3YQdViAuH2h2sgt8feAvMWo56OskAoDvHwAEv5AWqmPKy/xmKbdfgA5wTzvSztPGFA4QuOuA1YxQICf1MgpoOtplAAA31JxAYF/t7n8qgvJlm1JRv2AAAZHHtSiz1IaxzOO9LAAAqCfHvHugPcZYk2yAAAP7JrnnR1fAVj9F4aaYaA0eSjvDTAglykXHCbh1EWAAAecqHZ/SWn9cjmuAAArZxxG6m6Eu/aj9we82/PmtKzQGN0RWUsgrxajQowtNpVsNTnaOglUsfQIDAAAA”, “x_ssh_hostkey_fingerprint” => “11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11”, “inform_url” => “1.1.2.2:8080/inform”, “inform_ip” => “1.1.1.1”, “serial” => “AAAAAAAAAAAA”, “required_version” => “4.0.0”, “ethernet_table” => [{ “mac” => “b4:fb:e4:cc:cc:cc”, “num_port” => 1, “name” => “eth0”}, => “b4:fb:e4:bb:bb:bb”, “num_port” => 1, “name” => “eth1”, => “b4:fb:e4:aa:aa:aa”, “num_port” => 1, “name” => “eth2”], “fw_caps” => 184323, “hw_caps” => 0, “usg_caps” => 786431, “board_rev” => 16, “x_aes_gcm” => true, “ethernet_overrides” => [=> “eth1”, “networkgroup” => “LAN”, => “eth0”, “networkgroup” => “WAN”], “led_override” => “default”, “led_override_color” => “#0000ff”, “led_override_color_brightness” => 100, “outdoor_mode_override” => “default”, “name” => “USG”, “map_id” => “1a111c2e1111ce2087d1e199”, “x” => -22.11111198630405, “y” => -41.1111113859866, “heightInMeters” => 2.4}
296 297 298 299 300 301 302 303 304 305 306 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 296 def process_device(lines, _) lines.each do |line| report_host({ host: line['ip'], name: line['name'], mac: line['mac'], os_name: 'Ubiquiti Unifi' }) print_good("Unifi Device #{line['name']} of model #{line['model']} on #{line['ip']}") end end |
#process_firewallgroup(lines, _) ⇒ Object
Example lines “collection”=>“firewallgroup” “name” => “Cameras”, “group_type” => “address-group”, “group_members” => [“1.1.1.1”], “site_id” => “5c7f111b3815ce208aaa111a”
287 288 289 290 291 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 287 def process_firewallgroup(lines, _) lines.each do |line| print_status("Firewall Group: #{line['name']}, group type: #{line['group_type']}, members: #{line['group_members'].join(', ')}") end end |
#process_firewallrule(lines, _) ⇒ Object
Example BSON lines “collection”=>“firewallrule” “ruleset” => “WAN_OUT”, “rule_index” => “2000”, “name” => “Block Example”, “enabled” => true, “action” => “reject”, “protocol_match_excepted” => false, “logging” => false, “state_new” => false, “state_established” => false, “state_invalid” => false, “state_related” => false, “ipsec” => “”, “src_firewallgroup_ids” => [“1a1c15a11111ce14b1f1111a”], “src_mac_address” => “”, “dst_firewallgroup_ids” => [], “dst_address” => “”, “src_address” => “”, “protocol” => “all”, “icmp_typename” => “”, “src_networkconf_id” => “”, “src_networkconf_type” => “NETv4”, “dst_networkconf_id” => “”, “dst_networkconf_type” => “NETv4”, “site_id” => “1c1f208b3815ce1111a1a1a1”
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 142 def process_firewallrule(lines, _) lines.each do |line| rule = (line['action']).to_s unless line['dst_address'].empty? rule << " dst addresses: #{line['dst_address']}" end unless line['dst_firewallgroup_ids'].empty? rule << " dst group: #{line['dst_firewallgroup_ids'].join(', ')}" end unless line['src_address'].empty? rule << " src addresses: #{line['src_address']}" end unless line['src_firewallgroup_ids'].empty? rule << " src group: #{line['src_firewallgroup_ids'].join(', ')}" end rule << " protocol: #{line['protocol']}" print_status("#{line['enabled'] ? 'Enabled' : 'Disabled'} Firewall Rule '#{line['name']}': #{rule}") end end |
#process_radiusprofile(lines, credential_data) ⇒ Object
Example BSON lines “collection”=>“radiusprofile” “attr_no_delete”=>true, “attr_hidden_id”=>“Default”, “name”=>“Default”, “site_id”=>“3c7f226b2315be2087a1d5b2”, “use_usg_auth_server”=>true, “auth_servers”=>[{“ip”=>“192.168.0.1”, “port”=>1812, “x_secret”=>“”], “acct_servers”=>[]}
166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 166 def process_radiusprofile(lines, credential_data) lines.each do |line| line['auth_servers'].each do |server| report_service( host: server['ip'], port: server['port'], name: 'radius', proto: 'udp' ) next unless server['x_secret'] # no need to output if the secret is blank, therefore its not configured print_good("Radius server: #{server['ip']}:#{server['port']} with secret '#{server['x_secret']}'") next unless framework.db.active cred = credential_data.dup cred[:username] = '' cred[:private_data] = server['x_secret'] cred[:address] = server['ip'] cred[:port] = server['port'] create_credential_and_login(cred) end end end |
#process_setting(lines, credential_data) ⇒ Object
Example lines “collection”=>“setting” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“ntp”, “ntp_server_1”=>“0.ubnt.pool.ntp.org”, “ntp_server_2”=>“1.ubnt.pool.ntp.org”, “ntp_server_3”=>“2.ubnt.pool.ntp.org”, “ntp_server_4”=>“3.ubnt.pool.ntp.org” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“mgmt”, “advanced_feature_enabled”=>false, “x_ssh_enabled”=>true, “x_ssh_bind_wildcard”=>false, “x_ssh_auth_password_enabled”=>true, “unifi_idp_enabled”=>true, “x_mgmt_key”=>“ba6cbe170f8276cd86b24ac79ab29afc”, “x_ssh_username”=>“admin”, “x_ssh_password”=>“16xoB6F2UyAcU6fP”, “x_ssh_keys”=>[], “x_ssh_sha512passwd”=>“$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V.” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“connectivity”, “enabled”=>true, “uplink_type”=>“gateway”, “x_mesh_essid”=>“vwire-851237d214c8c6ba”, “x_mesh_psk”=>“523a9b872b4624c7894f96c3ae22cdfa” “site_id”=>“3c2f215b3825ca2087c1dfb6”, “key”=>“snmp”, “community”: “public”, “enabled”: true, “enabledV3”: true, “username”: “usernamesnmpv3”, “x_password”: “passwordsnmpv3”
201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 201 def process_setting(lines, credential_data) lines.each do |line| case line['key'] when 'snmp' if framework.db.active cred = credential_data.dup cred[:protocol] = 'udp' cred[:port] = 161 cred[:service_name] = 'snmp' else cred = {} # throw away end unless line['community'].blank? print_good("SNMP v2 #{line['enabled'] ? 'enabled' : 'disabled'} with password #{line['community']}") cred[:private_data] = line['community'] create_credential_and_login(cred) if framework.db.active end unless line['x_password'].blank? || line['username'].blank? print_good("SNMP v3 #{line['enabledV3'] ? 'enabled' : 'disabled'} with username #{line['username']} password #{line['x_password']}") cred[:username] = line['username'] cred[:private_data] = line['x_password'] create_credential_and_login(cred) if framework.db.active end when 'connectivity' print_good("Mesh Wifi Network #{line['x_mesh_essid']} password #{line['x_mesh_psk']}") next unless framework.db.active cred = credential_data.dup cred[:username] = line['x_mesh_essid'] cred[:private_data] = line['x_mesh_psk'] create_credential_and_login(cred) when 'ntp' ['ntp_server_1', 'ntp_server_2', 'ntp_server_3', 'ntp_server_4'].each do |ntp| next if line[ntp].empty? || line[ntp].ends_with?('ubnt.pool.ntp.org') report_service( host: line[ntp], port: '123', name: 'ntp', proto: 'udp' ) print_good("NTP Server: #{line[ntp]}") end when 'mgmt' admin_name = line['x_ssh_username'] admin_password_hash = line['x_ssh_sha512passwd'] admin_password = line['x_ssh_password'] print_good("SSH user #{admin_name} found with password #{admin_password} and hash #{admin_password_hash}") line['x_ssh_keys'].each do |key| print_good("SSH user #{admin_name} found with SSH key: #{key}") end next unless framework.db.active cred = credential_data.dup cred[:username] = admin_name cred[:private_data] = admin_password_hash cred[:private_type] = :nonreplayable_hash login = create_credential_and_login(cred) if login.present? && admin_password.present? create_cracked_credential(username: admin_name, password: admin_password, core_id: login.core.id) end end end end |
#process_user(lines, _) ⇒ Object
Example lines “collection”=>“user” “mac” => “00:0c:29:11:aa:11”, “site_id” => “5c7f111b1111aa2087d11111”, “oui” => “Vmware”, “is_guest” => false, “first_seen” => 1551111161, “last_seen” => 1561621747, “is_wired” => true, “hostname” => “android”, “usergroup_id” => “”, “name” => “example device”, “noted” => true, “use_fixedip” => true, “network_id” => “1c7f111a1115aa2087aaa9aa”, “fixed_ip” => “7.7.7.7”
311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 311 def process_user(lines, _) lines.each do |line| host_hash = { name: line['hostname'], mac: line['mac'] } desc = "#{line['hostname']} (#{line['mac']})" if line['fixed_ip'] host_hash[:host] = line['fixed_ip'] desc << " on IP #{line['fixed_ip']}" end if line['name'] host_hash[:info] = line['name'] desc << " with name #{line['name']}" end report_host(host_hash) print_good("Network Device #{desc} found") end end |
#process_wlanconf(lines, credential_data) ⇒ Object
Example lines “collection”=>“wlanconf” “enabled” => true, “security” => “wpapsk”, “wep_idx” => 1, “wpa_mode” => “wpa2”, “wpa_enc” => “ccmp”, “usergroup_id” => “5a7f111a3815ce1111a1d1c3”, “dtim_mode” => “default”, “dtim_ng” => 1, “dtim_na” => 1, “minrate_ng_enabled” => false, “minrate_ng_advertising_rates” => false, “minrate_ng_data_rate_kbps” => 1000, “minrate_ng_cck_rates_enabled” => true, “minrate_na_enabled” => false, “minrate_na_advertising_rates” => false, “minrate_na_data_rate_kbps” => 6000, “mac_filter_enabled” => false, “mac_filter_policy” => “allow”, “mac_filter_list” => [], “bc_filter_enabled” => false, “bc_filter_list” => [], “group_rekey” => 3600, “name” => “ssid_name”, “x_passphrase” => “supersecret”, “wlangroup_id” => “5c7f208c3815ce2087d1d9c4”, “schedule” => [], “minrate_ng_mgmt_rate_kbps” => 1000, “minrate_na_mgmt_rate_kbps” => 6000, “minrate_ng_beacon_rate_kbps” => 1000, “minrate_na_beacon_rate_kbps” => 6000, “site_id” => “5c7f208b3815ce2087d1d9b6”, “x_iapp_key” => “d11a1c86df1111be86aaa69e8aa1c57f”, “no2ghz_oui” => true
269 270 271 272 273 274 275 276 277 278 279 280 281 282 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 269 def process_wlanconf(lines, credential_data) lines.each do |line| ssid = line['name'] mode = line['security'] password = line['x_passphrase'] print_good("#{line['enabled'] ? 'Enabled' : 'Disabled'} wifi #{ssid} on #{mode}(#{line['wpa_mode']},#{line['wpa_enc']}) has password #{password}") next unless framework.db.active cred = credential_data.dup cred[:username] = ssid cred[:private_data] = password create_credential_and_login(cred) end end |
#repair_zip(fname) ⇒ Object
24 25 26 27 28 29 30 31 32 33 34 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 24 def repair_zip(fname) zip_exe = Msf::Util::Helper.which('zip') if zip_exe.nil? print_error('Zip utility not found.') return nil end print_status('Attempting to repair zip file (this is normal and takes some time)') temp_file = Rex::Quickfile.new('fixed_zip') system("yes | #{zip_exe} -FF #{fname} --out #{temp_file.path}.zip > /dev/null") return File.read("#{temp_file.path}.zip", mode: 'rb') end |
#unifi_config_eater(thost, tport, config) ⇒ Object
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 |
# File 'lib/msf/core/auxiliary/ubiquiti.rb', line 87 def unifi_config_eater(thost, tport, config) # This is for the Ubiquiti Unifi files. These are typically in the backup download zip file # then in the db.gz file as db. It is a MongoDB BSON file, which can be difficult to read. # https://stackoverflow.com/questions/51242412/undefined-method-read-bson-document-for-bsonmodule # The BSON file is a bunch of BSON Documents chained together. There doesn't seem to be a good # way to read these files directly, so looping through loading the content seems to work with # minimal repercussions. # The file format is broken into sections by __cmd select documents as such: # {"__cmd"=>"select", "collection"=>"heatmap"} # we can pull the relevant section name via the collection value. if framework.db.active creds_template = { address: thost, port: tport, protocol: 'tcp', workspace_id: myworkspace_id, origin_type: :service, private_type: :password, service_name: '', module_fullname: fullname, status: Metasploit::Model::Login::Status::UNTRIED } end report_host({ host: thost, info: 'Ubiquiti Unifi Controller' }) store_loot('unifi.json', 'application/json', thost, config.to_s.strip, 'unifi.json', 'Ubiquiti Unifi Configuration') # Example BSON lines # {"__cmd"=>"select", "collection"=>"admin"} # {"_id"=>BSON::ObjectId('5c7f23af3825ce2067a1d9ce'), "name"=>"adminuser", "email"=>"[email protected]", "x_shadow"=>"$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V.", "time_created"=>1551825823, "last_site_name"=>"default", "ubic_name"=>"[email protected]", "ubic_uuid"=>"c23da064-3f4d-282f-1dc9-7e25f9c6812c", "ui_settings"=>{"dashboardConfig"=>{"lastActiveDashboardId"=>"2c7f2d213813ce2487d1ac38", "dashboards"=>{"3c7f678a3815ce2021d1d9c7"=>{"order"=>1}, "5b4f2d269115ce2087d1abb9"=>{}}}}} def process_admin(lines, credential_data) lines.each do |line| admin_name = line['name'] admin_email = line['email'] admin_password_hash = line['x_shadow'] print_good("Admin user #{admin_name} with email #{admin_email} found with password hash #{admin_password_hash}") next unless framework.db.active cred = credential_data.dup cred[:username] = admin_name cred[:private_data] = admin_password_hash cred[:private_type] = :nonreplayable_hash create_credential_and_login(cred) end end # Example BSON lines # {"__cmd"=>"select", "collection"=>"firewallrule"} # {"_id"=>BSON::ObjectId('5c7f23af3825ce2067a1d9ce'), "ruleset" => "WAN_OUT", "rule_index" => "2000", "name" => "Block Example", "enabled" => true, "action" => "reject", "protocol_match_excepted" => false, "logging" => false, "state_new" => false, "state_established" => false, "state_invalid" => false, "state_related" => false, "ipsec" => "", "src_firewallgroup_ids" => ["1a1c15a11111ce14b1f1111a"], "src_mac_address" => "", "dst_firewallgroup_ids" => [], "dst_address" => "", "src_address" => "", "protocol" => "all", "icmp_typename" => "", "src_networkconf_id" => "", "src_networkconf_type" => "NETv4", "dst_networkconf_id" => "", "dst_networkconf_type" => "NETv4", "site_id" => "1c1f208b3815ce1111a1a1a1"} def process_firewallrule(lines, _) lines.each do |line| rule = (line['action']).to_s unless line['dst_address'].empty? rule << " dst addresses: #{line['dst_address']}" end unless line['dst_firewallgroup_ids'].empty? rule << " dst group: #{line['dst_firewallgroup_ids'].join(', ')}" end unless line['src_address'].empty? rule << " src addresses: #{line['src_address']}" end unless line['src_firewallgroup_ids'].empty? rule << " src group: #{line['src_firewallgroup_ids'].join(', ')}" end rule << " protocol: #{line['protocol']}" print_status("#{line['enabled'] ? 'Enabled' : 'Disabled'} Firewall Rule '#{line['name']}': #{rule}") end end # Example BSON lines # {"__cmd"=>"select", "collection"=>"radiusprofile"} # {"_id"=>BSON::ObjectId('2c7a318c38c5ce2f86d179cb'), "attr_no_delete"=>true, "attr_hidden_id"=>"Default", "name"=>"Default", "site_id"=>"3c7f226b2315be2087a1d5b2", "use_usg_auth_server"=>true, "auth_servers"=>[{"ip"=>"192.168.0.1", "port"=>1812, "x_secret"=>""}], "acct_servers"=>[]} def process_radiusprofile(lines, credential_data) lines.each do |line| line['auth_servers'].each do |server| report_service( host: server['ip'], port: server['port'], name: 'radius', proto: 'udp' ) next unless server['x_secret'] # no need to output if the secret is blank, therefore its not configured print_good("Radius server: #{server['ip']}:#{server['port']} with secret '#{server['x_secret']}'") next unless framework.db.active cred = credential_data.dup cred[:username] = '' cred[:private_data] = server['x_secret'] cred[:address] = server['ip'] cred[:port] = server['port'] create_credential_and_login(cred) end end end # settings has multiple items we care about: # x_mesh_essid/x_mesh_psk -> should contain the mesh network wifi name and password # ntp -> ntp servers # x_ssh_username/x_ssh_password/x_ssh_keys/x_ssh_sha512passwd # Example lines # {"__cmd"=>"select", "collection"=>"setting"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9ba'), "site_id"=>"3c2f215b3825ca2087c1dfb6", "key"=>"ntp", "ntp_server_1"=>"0.ubnt.pool.ntp.org", "ntp_server_2"=>"1.ubnt.pool.ntp.org", "ntp_server_3"=>"2.ubnt.pool.ntp.org", "ntp_server_4"=>"3.ubnt.pool.ntp.org"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9bb'), "site_id"=>"3c2f215b3825ca2087c1dfb6", "key"=>"mgmt", "advanced_feature_enabled"=>false, "x_ssh_enabled"=>true, "x_ssh_bind_wildcard"=>false, "x_ssh_auth_password_enabled"=>true, "unifi_idp_enabled"=>true, "x_mgmt_key"=>"ba6cbe170f8276cd86b24ac79ab29afc", "x_ssh_username"=>"admin", "x_ssh_password"=>"16xoB6F2UyAcU6fP", "x_ssh_keys"=>[], "x_ssh_sha512passwd"=>"$6$R4qnAaaF$AAAlL2t.fXu0aaa9z3uvcIm3ujbtJLhIO.lN1xZqHZPQoUAXs2BUTmI5UbuBo2/8t3epzbVLib17Ls7GCVx7V."} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9bc'), "site_id"=>"3c2f215b3825ca2087c1dfb6", "key"=>"connectivity", "enabled"=>true, "uplink_type"=>"gateway", "x_mesh_essid"=>"vwire-851237d214c8c6ba", "x_mesh_psk"=>"523a9b872b4624c7894f96c3ae22cdfa"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9bd'), "site_id"=>"3c2f215b3825ca2087c1dfb6", "key"=>"snmp", "community": "public", "enabled": true, "enabledV3": true, "username": "usernamesnmpv3", "x_password": "passwordsnmpv3"} def process_setting(lines, credential_data) lines.each do |line| case line['key'] when 'snmp' if framework.db.active cred = credential_data.dup cred[:protocol] = 'udp' cred[:port] = 161 cred[:service_name] = 'snmp' else cred = {} # throw away end unless line['community'].blank? print_good("SNMP v2 #{line['enabled'] ? 'enabled' : 'disabled'} with password #{line['community']}") cred[:private_data] = line['community'] create_credential_and_login(cred) if framework.db.active end unless line['x_password'].blank? || line['username'].blank? print_good("SNMP v3 #{line['enabledV3'] ? 'enabled' : 'disabled'} with username #{line['username']} password #{line['x_password']}") cred[:username] = line['username'] cred[:private_data] = line['x_password'] create_credential_and_login(cred) if framework.db.active end when 'connectivity' print_good("Mesh Wifi Network #{line['x_mesh_essid']} password #{line['x_mesh_psk']}") next unless framework.db.active cred = credential_data.dup cred[:username] = line['x_mesh_essid'] cred[:private_data] = line['x_mesh_psk'] create_credential_and_login(cred) when 'ntp' ['ntp_server_1', 'ntp_server_2', 'ntp_server_3', 'ntp_server_4'].each do |ntp| next if line[ntp].empty? || line[ntp].ends_with?('ubnt.pool.ntp.org') report_service( host: line[ntp], port: '123', name: 'ntp', proto: 'udp' ) print_good("NTP Server: #{line[ntp]}") end when 'mgmt' admin_name = line['x_ssh_username'] admin_password_hash = line['x_ssh_sha512passwd'] admin_password = line['x_ssh_password'] print_good("SSH user #{admin_name} found with password #{admin_password} and hash #{admin_password_hash}") line['x_ssh_keys'].each do |key| print_good("SSH user #{admin_name} found with SSH key: #{key}") end next unless framework.db.active cred = credential_data.dup cred[:username] = admin_name cred[:private_data] = admin_password_hash cred[:private_type] = :nonreplayable_hash login = create_credential_and_login(cred) if login.present? && admin_password.present? create_cracked_credential(username: admin_name, password: admin_password, core_id: login.core.id) end end end end # Example lines # {"__cmd"=>"select", "collection"=>"wlanconf"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9ba'), "enabled" => true, "security" => "wpapsk", "wep_idx" => 1, "wpa_mode" => "wpa2", "wpa_enc" => "ccmp", "usergroup_id" => "5a7f111a3815ce1111a1d1c3", "dtim_mode" => "default", "dtim_ng" => 1, "dtim_na" => 1, "minrate_ng_enabled" => false, "minrate_ng_advertising_rates" => false, "minrate_ng_data_rate_kbps" => 1000, "minrate_ng_cck_rates_enabled" => true, "minrate_na_enabled" => false, "minrate_na_advertising_rates" => false, "minrate_na_data_rate_kbps" => 6000, "mac_filter_enabled" => false, "mac_filter_policy" => "allow", "mac_filter_list" => [], "bc_filter_enabled" => false, "bc_filter_list" => [], "group_rekey" => 3600, "name" => "ssid_name", "x_passphrase" => "supersecret", "wlangroup_id" => "5c7f208c3815ce2087d1d9c4", "schedule" => [], "minrate_ng_mgmt_rate_kbps" => 1000, "minrate_na_mgmt_rate_kbps" => 6000, "minrate_ng_beacon_rate_kbps" => 1000, "minrate_na_beacon_rate_kbps" => 6000, "site_id" => "5c7f208b3815ce2087d1d9b6", "x_iapp_key" => "d11a1c86df1111be86aaa69e8aa1c57f", "no2ghz_oui" => true} def process_wlanconf(lines, credential_data) lines.each do |line| ssid = line['name'] mode = line['security'] password = line['x_passphrase'] print_good("#{line['enabled'] ? 'Enabled' : 'Disabled'} wifi #{ssid} on #{mode}(#{line['wpa_mode']},#{line['wpa_enc']}) has password #{password}") next unless framework.db.active cred = credential_data.dup cred[:username] = ssid cred[:private_data] = password create_credential_and_login(cred) end end # Example lines # {"__cmd"=>"select", "collection"=>"firewallgroup"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9ba'), "name" => "Cameras", "group_type" => "address-group", "group_members" => ["1.1.1.1"], "site_id" => "5c7f111b3815ce208aaa111a"} def process_firewallgroup(lines, _) lines.each do |line| print_status("Firewall Group: #{line['name']}, group type: #{line['group_type']}, members: #{line['group_members'].join(', ')}") end end # Example lines # {"__cmd"=>"select", "collection"=>"device"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9ba'), "ip" => "5.5.5.5", "mac" => "cc:cc:cc:cc:cc:cc", "model" => "UGW3", "type" => "ugw", "version" => "4.4.44.5213844", "adopted" => true, "site_id" => "5aaaaaabaaaaae1117d1d1b6", "x_authkey" => "eaaaaaaa63e59ab89c111e11d6e11aa1", "cfgversion" => "aaa4b11b1df1a111", "config_network" => {"type" => "dhcp", "ip" => "1.1.1.1"}, "license_state" => "registered", "two_phase_adopt" => false, "unsupported" => false, "unsupported_reason" => 0, "x_fingerprint" => "aa:aa:11:aa:11:11:11:11:11:11:11:11:11:11:11:11", "x_ssh_hostkey" => "MIIBIjANBgkAhkiG9w0AAQEFAAOCAQ8AMIIBCgKCAQEAAU4S/7r548xvtGuHlgAAAKzkrL+t97ZWAZru8wQFbltEB4111HiIAkzt041td8V+P7c1bQtn3YQdViAuH2h2sgt8feAvMWo56OskAoDvHwAEv5AWqmPKy/xmKbdfgA5wTzvSztPGFA4QuOuA1YxQICf1MgpoOtplAAA31JxAYF/t7n8qgvJlm1JRv2AAAZHHtSiz1IaxzOO9LAAAqCfHvHugPcZYk2yAAAP7JrnnR1fAVj9F4aaYaA0eSjvDTAglykXHCbh1EWAAAecqHZ/SWn9cjmuAAArZxxG6m6Eu/aj9we82/PmtKzQGN0RWUsgrxajQowtNpVsNTnaOglUsfQIDAAAA", "x_ssh_hostkey_fingerprint" => "11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11", "inform_url" => "http://1.1.2.2:8080/inform", "inform_ip" => "1.1.1.1", "serial" => "AAAAAAAAAAAA", "required_version" => "4.0.0", "ethernet_table" => [{ "mac" => "b4:fb:e4:cc:cc:cc", "num_port" => 1, "name" => "eth0"}, {"mac" => "b4:fb:e4:bb:bb:bb", "num_port" => 1, "name" => "eth1"}, {"mac" => "b4:fb:e4:aa:aa:aa", "num_port" => 1, "name" => "eth2"}], "fw_caps" => 184323, "hw_caps" => 0, "usg_caps" => 786431, "board_rev" => 16, "x_aes_gcm" => true, "ethernet_overrides" => [{"ifname" => "eth1", "networkgroup" => "LAN"}, {"ifname" => "eth0", "networkgroup" => "WAN"}], "led_override" => "default", "led_override_color" => "#0000ff", "led_override_color_brightness" => 100, "outdoor_mode_override" => "default", "name" => "USG", "map_id" => "1a111c2e1111ce2087d1e199", "x" => -22.11111198630405, "y" => -41.1111113859866, "heightInMeters" => 2.4} def process_device(lines, _) lines.each do |line| report_host({ host: line['ip'], name: line['name'], mac: line['mac'], os_name: 'Ubiquiti Unifi' }) print_good("Unifi Device #{line['name']} of model #{line['model']} on #{line['ip']}") end end # Example lines # {"__cmd"=>"select", "collection"=>"user"} # {"_id"=>BSON::ObjectId('3c3e21ac3715ce20a721d9ba'), "mac" => "00:0c:29:11:aa:11", "site_id" => "5c7f111b1111aa2087d11111", "oui" => "Vmware", "is_guest" => false, "first_seen" => 1551111161, "last_seen" => 1561621747, "is_wired" => true, "hostname" => "android", "usergroup_id" => "", "name" => "example device", "noted" => true, "use_fixedip" => true, "network_id" => "1c7f111a1115aa2087aaa9aa", "fixed_ip" => "7.7.7.7"} def process_user(lines, _) lines.each do |line| host_hash = { name: line['hostname'], mac: line['mac'] } desc = "#{line['hostname']} (#{line['mac']})" if line['fixed_ip'] host_hash[:host] = line['fixed_ip'] desc << " on IP #{line['fixed_ip']}" end if line['name'] host_hash[:info] = line['name'] desc << " with name #{line['name']}" end report_host(host_hash) print_good("Network Device #{desc} found") end end # here is where we actually process the file config.each do |key, value| next unless respond_to?("process_#{key}") credential_data = creds_template.dup send("process_#{key}", value, credential_data) end end |