Module: Msf::Post::Common
- Included in:
- Android::Priv, Android::System, File, Linux::BusyBox, Linux::Compile, Linux::Kernel, Linux::Priv, Linux::System, OSX::Priv, OSX::System, Solaris::Kernel, Solaris::Priv, Solaris::System, Windows::Dotnet, Windows::FileSystem, Windows::Powershell, Windows::System, Windows::TaskScheduler, SessionCompatibility, Rex::Post::Meterpreter::Extensions::Stdapi::Webcam::Webcam
- Defined in:
- lib/msf/core/post/common.rb
Instance Method Summary collapse
- #clear_screen ⇒ Object
-
#cmd_exec(cmd, args = nil, time_out = 15, opts = {}) ⇒ Object
Executes
cmd
on the remote system. - #cmd_exec_get_pid(cmd, args = nil, time_out = 15) ⇒ Object
-
#cmd_exec_with_result(cmd, args = nil, timeout = 15, opts = {}) ⇒ Array(String, Boolean)
Executes
cmd
on the remote system and return an array containing the output and if it was successful or not. -
#command_exists?(cmd) ⇒ Boolean
Checks if the specified command can be executed by the session.
-
#create_process(executable, args: [], time_out: 15, opts: {}) ⇒ Object
Create a new process, receiving the program’s output.
-
#get_env(env) ⇒ Object
Returns the value of the environment variable
env
. -
#get_envs(*envs) ⇒ Object
Returns a hash of environment variables
envs
. - #initialize(info = {}) ⇒ Object
- #peer ⇒ Object
-
#report_virtualization(virt) ⇒ Object
Reports to the database that the host is using virtualization and reports the type of virtualization it is (e.g VirtualBox, VMware, Xen, Docker).
- #rhost ⇒ Object
- #rport ⇒ Object
Instance Method Details
#clear_screen ⇒ Object
21 22 23 |
# File 'lib/msf/core/post/common.rb', line 21 def clear_screen Gem.win_platform? ? (system "cls") : (system "clear") end |
#cmd_exec(cmd, args = nil, time_out = 15, opts = {}) ⇒ Object
Executes cmd
on the remote system
On Windows meterpreter, this will go through CreateProcess as the “commandLine” parameter. This means it will follow the same rules as Windows’ path disambiguation. For example, if you were to call this method thusly:
cmd_exec("c:\\program files\\sub dir\\program name")
Windows would look for these executables, in this order, passing the rest of the line as arguments:
c:\program.exe
c:\program files\sub.exe
c:\program files\sub dir\program.exe
c:\program files\sub dir\program name.exe
On POSIX meterpreter, if args
is set or if cmd
contains shell metacharacters, the server will run the whole thing in /bin/sh. Otherwise, (cmd is a single path and there are no arguments), it will execve the given executable.
On Java, it is passed through Runtime.getRuntime().exec(String) and PHP uses proc_open() both of which have similar semantics to POSIX.
On shell sessions, this passes cmd
directly the session’s shell_command_token
method.
Returns a (possibly multi-line) String.
151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 |
# File 'lib/msf/core/post/common.rb', line 151 def cmd_exec(cmd, args=nil, time_out=15, opts = {}) case session.type when 'meterpreter' # # The meterpreter API requires arguments to come separately from the # executable path. This has no effect on Windows where the two are just # blithely concatenated and passed to CreateProcess or its brethren. On # POSIX, this allows the server to execve just the executable when a # shell is not needed. Determining when a shell is not needed is not # always easy, so it assumes anything with arguments needs to go through # /bin/sh. # # This problem was originally solved by using Shellwords.shellwords but # unfortunately, it is unsuitable. When a backslash occurs inside double # quotes (as is often the case with Windows commands) it inexplicably # removes them. So. Shellwords is out. # # By setting +args+ to an empty string, we can get POSIX to send it # through /bin/sh, solving all the pesky parsing troubles, without # affecting Windows. # if args.nil? and cmd =~ /[^a-zA-Z0-9\/._-]/ args = "" end session.response_timeout = time_out opts = { 'Hidden' => true, 'Channelized' => true, 'Subshell' => true }.merge(opts) if opts['Channelized'] o = session.sys.process.capture_output(cmd, args, opts, time_out) else session.sys.process.execute(cmd, args, opts) end when 'powershell' if args.nil? || args.empty? o = session.shell_command("#{cmd}", time_out) else o = session.shell_command("#{cmd} #{args}", time_out) end o.chomp! if o when 'shell' if args.nil? || args.empty? o = session.shell_command_token("#{cmd}", time_out) else o = session.shell_command_token("#{cmd} #{args}", time_out) end o.chomp! if o end return "" if o.nil? return o end |
#cmd_exec_get_pid(cmd, args = nil, time_out = 15) ⇒ Object
207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 |
# File 'lib/msf/core/post/common.rb', line 207 def cmd_exec_get_pid(cmd, args=nil, time_out=15) case session.type when 'meterpreter' if args.nil? and cmd =~ /[^a-zA-Z0-9\/._-]/ args = "" end session.response_timeout = time_out process = session.sys.process.execute(cmd, args, {'Hidden' => true, 'Channelized' => true, 'Subshell' => true }) process.channel.close pid = process.pid process.close pid else print_error "cmd_exec_get_pid is incompatible with non-meterpreter sessions" end end |
#cmd_exec_with_result(cmd, args = nil, timeout = 15, opts = {}) ⇒ Array(String, Boolean)
Executes cmd
on the remote system and return an array containing the output and if it was successful or not.
This is simply a wrapper around #cmd_exec that also checks the exit code to determine if the execution was successful or not.
331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 |
# File 'lib/msf/core/post/common.rb', line 331 def cmd_exec_with_result(cmd, args = nil, timeout = 15, opts = {}) # This token will be returned if the command succeeds. # Redirection operators (`&&` and `||`) are the most reliable methods to # detect success and failure. See these references for details: # - https://ss64.com/nt/errorlevel.html # - https://stackoverflow.com/questions/34936240/batch-goto-loses-errorlevel/34937706#34937706 # - https://stackoverflow.com/questions/10935693/foolproof-way-to-check-for-nonzero-error-return-code-in-windows-batch-file/10936093#10936093 verification_token = Rex::Text.rand_text_alphanumeric(8) _cmd = cmd.dup _cmd << " #{args}" if args if session.platform == 'windows' if session.type == 'powershell' # The & operator is reserved by Powershell and needs to be wrapped in double quotes result = cmd_exec('cmd', "/c #{_cmd} \"&&\" echo #{verification_token}", timeout, opts) else result = cmd_exec('cmd', "/c #{_cmd} && echo #{verification_token}", timeout, opts) end else result = cmd_exec('command', "#{_cmd} && echo #{verification_token}", timeout, opts) end if result.include?(verification_token) # Removing the verification token to cleanup the output string [result.lines[0...-1].join.strip, true] else [result.strip, false] end rescue Rex::TimeoutError => e [e., false] end |
#command_exists?(cmd) ⇒ Boolean
Checks if the specified command can be executed by the session. It should be noted that not all commands correspond to a binary file on disk. For example, a bash shell session will provide the ‘eval` command when there is no `eval` binary on disk. Likewise, a Powershell session will provide the `Get-Item` command when there is no `Get-Item` executable on disk.
300 301 302 303 304 305 306 307 308 309 310 311 312 313 |
# File 'lib/msf/core/post/common.rb', line 300 def command_exists?(cmd) verification_token = Rex::Text.rand_text_alpha_upper(8) if session.type == 'powershell' cmd_exec("try {if(Get-Command #{cmd}) {echo #{verification_token}}} catch {}").include?(verification_token) elsif session.platform == 'windows' # https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/where_1 # https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/if cmd_exec("cmd /c where /q #{cmd} & if not errorlevel 1 echo #{verification_token}").to_s.include?(verification_token) else cmd_exec("command -v #{cmd} || which #{cmd} && echo #{verification_token}").include?(verification_token) end rescue raise "Unable to check if command `#{cmd}' exists" end |
#create_process(executable, args: [], time_out: 15, opts: {}) ⇒ Object
Create a new process, receiving the program’s output
71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 |
# File 'lib/msf/core/post/common.rb', line 71 def create_process(executable, args: [], time_out: 15, opts: {}) case session.type when 'meterpreter' session.response_timeout = time_out opts = { 'Hidden' => true, 'Channelized' => true, # Well-behaving meterpreters will ignore the Subshell flag when using arg arrays. # This is still provided for supporting old meterpreters. 'Subshell' => true }.merge(opts) if session.platform == 'windows' if session.arch == 'php' opts[:legacy_args] = Msf::Sessions::CommandShellWindows.to_cmd(args) opts[:legacy_path] = Msf::Sessions::CommandShellWindows.to_cmd([executable]) elsif session.arch == 'python' opts[:legacy_path] = executable # Yes, Unix. Old Python meterp had a bug where it used posix shell splitting # syntax even on Windows. For backwards-compatibility, we can trick it into # doing the right thing by using Unix escaping. opts[:legacy_args] = Msf::Sessions::CommandShellUnix.to_cmd(args) else opts[:legacy_args] = Msf::Sessions::CommandShellWindows.argv_to_commandline(args) opts[:legacy_path] = Msf::Sessions::CommandShellWindows.escape_cmd(executable) end else opts[:legacy_args] = Msf::Sessions::CommandShellUnix.to_cmd(args) opts[:legacy_path] = Msf::Sessions::CommandShellUnix.to_cmd([executable]) end if opts['Channelized'] o = session.sys.process.capture_output(executable, args, opts, time_out) else session.sys.process.execute(executable, args, opts) end when 'powershell' cmd = session.to_cmd([executable] + args) o = session.shell_command(cmd, time_out) o.chomp! if o when 'shell' cmd = session.to_cmd([executable] + args) o = session.shell_command_token(cmd, time_out) o.chomp! if o end return "" if o.nil? return o end |
#get_env(env) ⇒ Object
Returns the value of the environment variable env
243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 |
# File 'lib/msf/core/post/common.rb', line 243 def get_env(env) case session.type when 'meterpreter' return session.sys.config.getenv(env) when 'powershell' return cmd_exec("echo $env:#{env}").strip when 'shell' if session.platform == 'windows' if env[0,1] == '%' unless env[-1,1] == '%' env << '%' end else env = "%#{env}%" end return cmd_exec("echo #{env}") else unless env[0,1] == '$' env = "$#{env}" end return cmd_exec("echo \"#{env}\"") end end nil end |
#get_envs(*envs) ⇒ Object
Returns a hash of environment variables envs
275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 |
# File 'lib/msf/core/post/common.rb', line 275 def get_envs(*envs) case session.type when 'meterpreter' return session.sys.config.getenvs(*envs) when 'shell', 'powershell' result = {} envs.each do |env| res = get_env(env) result[env] = res unless res.blank? end return result end nil end |
#initialize(info = {}) ⇒ Object
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
# File 'lib/msf/core/post/common.rb', line 5 def initialize(info = {}) super( update_info( info, 'Compat' => { 'Meterpreter' => { 'Commands' => %w[ stdapi_sys_config_getenv stdapi_sys_process_execute ] } } ) ) end |
#peer ⇒ Object
51 52 53 |
# File 'lib/msf/core/post/common.rb', line 51 def peer "#{rhost}:#{rport}" end |
#report_virtualization(virt) ⇒ Object
Reports to the database that the host is using virtualization and reports the type of virtualization it is (e.g VirtualBox, VMware, Xen, Docker)
228 229 230 231 232 233 234 235 236 237 238 |
# File 'lib/msf/core/post/common.rb', line 228 def report_virtualization(virt) return unless session return unless virt virt_normal = virt.to_s.strip return if virt_normal.empty? virt_data = { :host => session.target_host, :virtual_host => virt_normal } report_host(virt_data) end |
#rhost ⇒ Object
25 26 27 28 29 30 31 32 33 34 35 36 |
# File 'lib/msf/core/post/common.rb', line 25 def rhost return super unless defined?(session) and session case session.type.downcase when 'meterpreter' session.sock.peerhost when 'shell', 'powershell' session.session_host end rescue return nil end |
#rport ⇒ Object
38 39 40 41 42 43 44 45 46 47 48 49 |
# File 'lib/msf/core/post/common.rb', line 38 def rport return super unless defined?(session) and session case session.type.downcase when 'meterpreter' session.sock.peerport when 'shell', 'powershell' session.session_port end rescue return nil end |