Module: Msf::Post::Linux::System

Includes:
Common, File, Unix
Defined in:
lib/msf/core/post/linux/system.rb

Instance Method Summary collapse

Methods included from Unix

#enum_user_directories, #get_groups, #get_users, #is_root?, #whoami

Methods included from File

#_read_file_meterpreter, #_unix_max_line_length, #_write_file_unix_shell, #append_file, #attributes, #cd, #chmod, #dir, #directory?, #executable?, #exist?, #expand_path, #exploit_data, #file?, #file_local_write, #file_remote_digestmd5, #file_remote_digestsha1, #file_remote_digestsha2, #immutable?, #mkdir, #pwd, #read_file, #readable?, #rename_file, #rm_f, #rm_rf, #setuid?, #upload_and_chmodx, #upload_file, #writable?, #write_file

Methods included from Common

#clear_screen, #cmd_exec, #cmd_exec_get_pid, #command_exists?, #get_env, #get_envs, #has_pid?, #peer, #report_virtualization, #rhost, #rport

Instance Method Details

#get_cpu_infoHash

Gets basic information about the system's CPU.

Returns:

  • (Hash)

160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
# File 'lib/msf/core/post/linux/system.rb', line 160

def get_cpu_info
  info = {}
  orig = cmd_exec("cat /proc/cpuinfo").to_s
  cpuinfo = orig.split("\n\n")[0]
  # This is probably a more platform independent way to parse the results (compared to splitting and assigning preset indices to values)
  cpuinfo.split("\n").each do |l|
    info[:speed_mhz]   = l.split(': ')[1].to_i if l.include? 'cpu MHz'
    info[:product]     = l.split(': ')[1]      if l.include? 'model name'
    info[:vendor]      = l.split(': ')[1]      if l.include? 'vendor_id'
  end
  info[:cores] = orig.split("\n\n").size
  info
rescue
  raise "Could not get CPU information"
end

#get_hostnameString

Gets the hostname of the system

Returns:

  • (String)

180
181
182
183
184
185
186
187
188
189
190
# File 'lib/msf/core/post/linux/system.rb', line 180

def get_hostname
  if command_exists?("uname")
    hostname = cmd_exec('uname -n').to_s
  else
    hostname = read_file("/proc/sys/kernel/hostname").to_s.chomp
  end
  report_host({:host => rhost, :name => hostname})
  hostname
rescue
  raise 'Unable to retrieve hostname'
end

#get_mount_path(filepath) ⇒ String

Gets the mount point of `filepath`

Parameters:

  • filepath (String)

    The filepath to get the mount point

Returns:

  • (String)

321
322
323
324
325
# File 'lib/msf/core/post/linux/system.rb', line 321

def get_mount_path(filepath)
  cmd_exec("df \"#{filepath}\" | tail -1").split(' ')[5]
rescue
  raise "Unable to get mount path of #{filepath}"
end

#get_pathString

Gets the $PATH environment variable

Returns:

  • (String)

150
151
152
153
154
# File 'lib/msf/core/post/linux/system.rb', line 150

def get_path
  cmd_exec('echo $PATH').to_s
rescue
  raise "Unable to determine path"
end

#get_session_pidString

Gets the pid of the current session

Returns:

  • (String)

220
221
222
# File 'lib/msf/core/post/linux/system.rb', line 220

def get_session_pid
  cmd_exec("echo $PPID").to_s
end

#get_shell_nameString

Gets the name of the current shell

Returns:

  • (String)

196
197
198
199
200
201
202
203
204
205
206
# File 'lib/msf/core/post/linux/system.rb', line 196

def get_shell_name
  if command_exists?("ps")
    psout = cmd_exec('ps -p $$').to_s
    psout.split("\n").last.split(' ')[3]
  else
    str_shell = cmd_exec("echo $0").split("-")[1]
    return str_shell
  end
rescue
  raise 'Unable to gather shell name'
end

#get_shell_pidString

Gets the pid of the current shell

Returns:

  • (String)

212
213
214
# File 'lib/msf/core/post/linux/system.rb', line 212

def get_shell_pid
  cmd_exec("echo $$").to_s
end

#get_suid_files(findpath = '/') ⇒ Array

Gathers all SUID files on the filesystem. NOTE: This uses the Linux `find` command. It will most likely take a while to get all files. Consider specifying a more narrow find path.

Parameters:

  • findpath (defaults to: '/')

    The path on the system to start searching

Returns:

  • (Array)

140
141
142
143
144
145
# File 'lib/msf/core/post/linux/system.rb', line 140

def get_suid_files(findpath = '/')
  out = cmd_exec("find #{findpath} -perm -4000 -print -xdev").to_s.split("\n")
  out.delete_if {|i| i.include? 'Permission denied'}
rescue
  raise "Could not retrieve all SUID files"
end

#get_sysinfoObject

Returns a Hash containing Distribution Name, Version and Kernel Information


17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
# File 'lib/msf/core/post/linux/system.rb', line 17

def get_sysinfo
  system_data = {}
  etc_files = cmd_exec("ls /etc").split()

  kernel_version = cmd_exec("uname -a")
  system_data[:kernel] = kernel_version

  # Debian
  if etc_files.include?("debian_version")
    version = read_file("/etc/issue").gsub(/\n|\\n|\\l/,'')
    if kernel_version =~ /Ubuntu/
      system_data[:distro] = "ubuntu"
      system_data[:version] = version
    else
      system_data[:distro] = "debian"
      system_data[:version] = version
    end

  # Amazon / CentOS
  elsif etc_files.include?('system-release')
    version = read_file('/etc/system-release').gsub(/\n|\\n|\\l/,'')
    if version.include? 'CentOS'
      system_data[:distro] = 'centos'
      system_data[:version] = version
    else
      system_data[:distro] = 'amazon'
      system_data[:version] = version
    end

  # Alpine
  elsif etc_files.include?('alpine-release')
    version = read_file('/etc/alpine-release').gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = 'alpine'
    system_data[:version] = version

  # Fedora
  elsif etc_files.include?("fedora-release")
    version = read_file("/etc/fedora-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "fedora"
    system_data[:version] = version

  # Oracle Linux
  elsif etc_files.include?("enterprise-release")
    version = read_file("/etc/enterprise-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "oracle"
    system_data[:version] = version

  # RedHat
  elsif etc_files.include?("redhat-release")
    version = read_file("/etc/redhat-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "redhat"
    system_data[:version] = version

  # Arch
  elsif etc_files.include?("arch-release")
    version = read_file("/etc/arch-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "arch"
    system_data[:version] = version

  # Slackware
  elsif etc_files.include?("slackware-version")
    version = read_file("/etc/slackware-version").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "slackware"
    system_data[:version] = version

  # Mandrake
  elsif etc_files.include?("mandrake-release")
    version = read_file("/etc/mandrake-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "mandrake"
    system_data[:version] = version

  # SuSE
  elsif etc_files.include?("SuSE-release")
    version = read_file("/etc/SuSE-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "suse"
    system_data[:version] = version

  # OpenSUSE
  elsif etc_files.include?("SUSE-brand")
    version = read_file("/etc/SUSE-brand").scan(/^VERSION\s*=\s*([\d\.]+)/).flatten.first
    system_data[:distro] = 'suse'
    system_data[:version] = version

  # Gentoo
  elsif etc_files.include?("gentoo-release")
    version = read_file("/etc/gentoo-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "gentoo"
    system_data[:version] = version

  # Openwall
  elsif etc_files.include?("owl-release")
    version = read_file("/etc/owl-release").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = 'openwall'
    system_data[:version] = version

  # Generic
  elsif etc_files.include?("issue")
    version = read_file("/etc/issue").gsub(/\n|\\n|\\l/,'')
    system_data[:distro] = "linux"
    system_data[:version] = version

  # Others, could be a mismatch like ssh_login to cisco device
  else
    system_data[:distro] = "linux"
    system_data[:version] = ''

  end

  report_host({
    :host => rhost,
    :os_name => system_data[:distro],
    :os_flavor => system_data[:version]
  })

  return system_data
end

#glibc_versionString

Gets the version of glibc

Returns:

  • (String)

309
310
311
312
313
314
# File 'lib/msf/core/post/linux/system.rb', line 309

def glibc_version
  raise 'glibc is not installed' unless command_exists? 'ldd'
  cmd_exec('ldd --version').scan(/^ldd\s+\(.*\)\s+([\d.]+)/).flatten.first
rescue
  raise 'Could not determine glibc version'
end

#has_gcc?Boolean

Checks if the system has gcc installed

Returns:

  • (Boolean)

228
229
230
231
232
# File 'lib/msf/core/post/linux/system.rb', line 228

def has_gcc?
  command_exists? 'gcc'
rescue
  raise 'Unable to check for gcc'
end

#interfacesArray

Gets all the interfaces of the device

Returns:

  • (Array)

353
354
355
356
357
358
359
360
361
362
# File 'lib/msf/core/post/linux/system.rb', line 353

def interfaces
  result = []
  data = cmd_exec("for fn in /sys/class/net/*; do echo $fn; done")
  parts = data.split("\n")
  parts.each do |line|
    line = line.split("/")[-1]
    result.insert(-1,line)
  end
  return result
end

#ipsArray

Gets all the IP directions of the device

Returns:

  • (Array)

332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
# File 'lib/msf/core/post/linux/system.rb', line 332

def ips
  lines = read_file("/proc/net/fib_trie")
  result = []
  previous_line = ""
  lines.each_line do |line|
    if line.include?("/32 host LOCAL")
      previous_line = previous_line.split("-- ")[1].strip()
      if not result.include? previous_line
        result.insert(-1, previous_line)
      end
    end
    previous_line = line
  end
  return result
end

#listen_tcp_portsArray

Parsing information based on: github.com/sensu-plugins/sensu-plugins-network-checks/blob/master/bin/check-netstat-tcp.rb

Gets all the listening tcp ports in the device

Returns:

  • (Array)

387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
# File 'lib/msf/core/post/linux/system.rb', line 387

def listen_tcp_ports
  ports = []
  content = read_file('/proc/net/tcp')
  content.each_line do |line|
    if m = line.match(/^\s*\d+:\s+(.{8}|.{32}):(.{4})\s+(.{8}|.{32}):(.{4})\s+(.{2})/)
      connection_state = m[5].to_s
      if connection_state == "0A"
        connection_port = m[2].to_i(16)
        if ports.include?(connection_port) == false
          ports.insert(-1, connection_port)
        end
      end
    end
  end
  return ports
end

#listen_udp_portsArray

Parsing information based on: github.com/sensu-plugins/sensu-plugins-network-checks/blob/master/bin/check-netstat-tcp.rb

Gets all the listening udp ports in the device

Returns:

  • (Array)

409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
# File 'lib/msf/core/post/linux/system.rb', line 409

def listen_udp_ports
  ports = []
  content = read_file('/proc/net/udp')
  content.each_line do |line|
    if m = line.match(/^\s*\d+:\s+(.{8}|.{32}):(.{4})\s+(.{8}|.{32}):(.{4})\s+(.{2})/)
      connection_state = m[5].to_s
      if connection_state == "07"
        connection_port = m[2].to_i(16)
        if ports.include?(connection_port) == false
          ports.insert(-1, connection_port)
        end
      end
    end
  end
  return ports
end

#macsArray

Gets all the macs of the device

Returns:

  • (Array)

368
369
370
371
372
373
374
375
376
377
378
379
380
# File 'lib/msf/core/post/linux/system.rb', line 368

def macs
  result = []
  str_macs = cmd_exec("for fn in /sys/class/net/*; do echo $fn; done")
  parts = str_macs.split("\n")
  parts.each do |line|
    rut = line + "/address"
    mac_array = read_file(rut)
    mac_array.each_line do |mac|
      result.insert(-1,mac.strip())
    end
  end
  return result
end

#noexec?(file_path) ⇒ Boolean

Checks if `file_path` is mounted on a noexec mount point

Returns:

  • (Boolean)

259
260
261
262
263
264
265
266
267
268
# File 'lib/msf/core/post/linux/system.rb', line 259

def noexec?(file_path)
  mount = cmd_exec('cat /proc/mounts').to_s
  mount_path = get_mount_path(file_path)
  mount.lines.each do |l|
    return true if l =~ Regexp.new("#{mount_path} (.*)noexec(.*)")
  end
  false
rescue
  raise 'Unable to check for noexec volume'
end

#nosuid?(file_path) ⇒ Boolean

Checks if `file_path` is mounted on a nosuid mount point

Returns:

  • (Boolean)

274
275
276
277
278
279
280
281
282
283
# File 'lib/msf/core/post/linux/system.rb', line 274

def nosuid?(file_path)
  mount = cmd_exec('cat /proc/mounts').to_s
  mount_path = get_mount_path(file_path)
  mount.lines.each do |l|
    return true if l =~ Regexp.new("#{mount_path} (.*)nosuid(.*)")
  end
  false
rescue
  raise 'Unable to check for nosuid volume'
end

#pid_uid(pid) ⇒ String

Gets the uid of a pid

Returns:

  • (String)

251
252
253
# File 'lib/msf/core/post/linux/system.rb', line 251

def pid_uid(pid)
  read_file("/proc/#{pid}/status").to_s
end

#pidof(program) ⇒ Array

Gets the process id(s) of `program`

Returns:

  • (Array)

238
239
240
241
242
243
244
245
# File 'lib/msf/core/post/linux/system.rb', line 238

def pidof(program)
  pids = []
  full = cmd_exec('ps aux').to_s
  full.split("\n").each do |pid|
    pids << pid.split(' ')[1].to_i if pid.include? program
  end
  pids
end

#protected_hardlinks?Boolean

Checks for protected hardlinks on the system

Returns:

  • (Boolean)

289
290
291
292
293
# File 'lib/msf/core/post/linux/system.rb', line 289

def protected_hardlinks?
  read_file('/proc/sys/fs/protected_hardlinks').to_s.strip.eql? '1'
rescue
  raise 'Could not determine protected_hardlinks status'
end

#protected_symlinks?Boolean

Checks for protected symlinks on the system

Returns:

  • (Boolean)

299
300
301
302
303
# File 'lib/msf/core/post/linux/system.rb', line 299

def protected_symlinks?
  read_file('/proc/sys/fs/protected_symlinks').to_s.strip.eql? '1'
rescue
  raise 'Could not determine protected_symlinks status'
end