Class: Rex::Parser::Unattend

Inherits:
Object
  • Object
show all
Defined in:
lib/rex/parser/unattend.rb

Overview

This is a parser for the Windows Unattended Answer File format. It’s used by modules/post/windows/gather/enum_unattend.rb and uses REXML (as opposed to Nokogiri) for its XML parsing. See: technet.microsoft.com/en-us/library/ff715801

http://technet.microsoft.com/en-us/library/cc749415(v=ws.10).aspx

Samples: technet.microsoft.com/en-us/library/cc732280%28v=ws.10%29.aspx

Class Method Summary collapse

Class Method Details

.create_table(results) ⇒ Object



147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
# File 'lib/rex/parser/unattend.rb', line 147

def self.create_table(results)
  return nil if results.nil? or results.empty?
  table = Rex::Text::Table.new({
    'Header' => 'Unattend Credentials',
    'Indent' => 1,
    'Columns' => ['Type', 'Domain', 'Username', 'Password', 'Groups']
  })

  results.each do |result|
    case result['type']
      when 'wds', 'auto', 'domain_join'
        table << [result['type'], result['domain'], result['username'], result['password'], ""]
      when 'admin', 'local'
        table << [result['type'], "", result['username'], result['password'], ""]
      when 'domain'
        table << [result['type'], "", result['username'], "", result['group']]
    end
  end

  return table
end

.extract_autologon(auto_logon) ⇒ Object

Extract sensitive data from AutoLogon



69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
# File 'lib/rex/parser/unattend.rb', line 69

def self.extract_autologon(auto_logon)
  return [] if auto_logon.nil?

  domain    = auto_logon.elements['Domain'].get_text.value rescue ''
  username  = auto_logon.elements['Username'].get_text.value rescue ''
  password  = auto_logon.elements['Password/Value'].get_text.value rescue ''
  plaintext = auto_logon.elements['Password/PlainText'].get_text.value rescue 'true'

  if plaintext == 'false'
    password = Rex::Text.decode_base64(password)
    password = password.gsub(/#{Rex::Text.to_unicode('Password')}$/, '')
  end

  return {'type' => 'auto', 'domain' => domain, 'username' => username, 'password' => password }
end

.extract_deployment(deployment) ⇒ Object

Extract sensitive data from Deployment Services. We can only seem to add one <Login> with Windows System Image Manager, so we’ll only enum one.



39
40
41
42
43
44
45
46
47
48
49
50
51
52
# File 'lib/rex/parser/unattend.rb', line 39

def self.extract_deployment(deployment)
  return [] if deployment.nil?
  domain    = deployment.elements['Login/Credentials/Domain'].get_text.value rescue ''
  username  = deployment.elements['Login/Credentials/Username'].get_text.value rescue ''
  password  = deployment.elements['Login/Credentials/Password'].get_text.value rescue ''
  plaintext = deployment.elements['Login/Credentials/Password/PlainText'].get_text.value rescue 'true'

  if plaintext == 'false'
    password = Rex::Text.decode_base64(password)
    password = password.gsub(/#{Rex::Text.to_unicode('Password')}$/, '')
  end

  return {'type' => 'wds', 'domain' => domain, 'username' => username, 'password' => password }
end

.extract_domain_join(credentials) ⇒ Object

Extract sensitive data from ‘Secure’ Domain Join



57
58
59
60
61
62
63
64
# File 'lib/rex/parser/unattend.rb', line 57

def self.extract_domain_join(credentials)
  return [] if credentials.nil?
  domain    = credentials.elements['Domain'].get_text.value rescue ''
  username  = credentials.elements['Username'].get_text.value rescue ''
  password  = credentials.elements['Password'].get_text.value rescue ''

  return {'type' => 'domain_join', 'domain' => domain, 'username' => username, 'password' => password }
end

.extract_useraccounts(user_accounts) ⇒ Object

Extract sensitive data from UserAccounts



88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
# File 'lib/rex/parser/unattend.rb', line 88

def self.extract_useraccounts(user_accounts)
  return[] if user_accounts.nil?

  results = []
   = ['AdministratorPassword', 'DomainAccounts', 'LocalAccounts']
  .each do |t|
    element = user_accounts.elements[t]
    next if element.nil?

    case t
    #
    # Extract the password from AdministratorPasswords
    #
    when [0]
      password = element.elements['Value'].get_text.value rescue ''
      plaintext = element.elements['PlainText'].get_text.value rescue 'true'

      if plaintext == 'false'
        password = Rex::Text.decode_base64(password)
        password = password.gsub(/#{Rex::Text.to_unicode('AdministratorPassword')}$/, '')
      end

      unless password.empty?
        results << {'type' => 'admin', 'username' => 'Administrator', 'password' => password}
      end

    #
    # Extract the sensitive data from DomainAccounts.
    # According to MSDN, unattend.xml doesn't seem to store passwords for domain accounts
    #
    when [1]  #DomainAccounts
      element.elements.each do ||
        name = .elements['DomainAccount/Name'].get_text.value rescue ''
        group = .elements['DomainAccount/Group'].get_text.value rescue 'true'

        results << {'type' => 'domain', 'username' => name, 'group' => group}
      end
    #
    # Extract the username/password from LocalAccounts
    #
    when [2]  #LocalAccounts
      element.elements.each do |local|
        password = local.elements['Password/Value'].get_text.value rescue ''
        plaintext = local.elements['Password/PlainText'].get_text.value rescue 'true'

        if plaintext == 'false'
          password = Rex::Text.decode_base64(password)
          password = password.gsub(/#{Rex::Text.to_unicode('Password')}$/, '')
        end

        username = local.elements['Name'].get_text.value rescue ''
        results << {'type' => 'local', 'username' => username, 'password' => password}
      end
    end
  end

  return results
end

.parse(xml) ⇒ Object



16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
# File 'lib/rex/parser/unattend.rb', line 16

def self.parse(xml)
  return [] if xml.nil?
  results = []
  unattend = xml.elements['unattend']
  return [] if unattend.nil?
  unattend.each_element do |settings|
      next if settings.class != REXML::Element
      settings.get_elements('component').each do |c|
        next if c.class != REXML::Element
        results << extract_useraccounts(c.elements['UserAccounts'])
        results << extract_autologon(c.elements['AutoLogon'])
        results << extract_deployment(c.elements['WindowsDeploymentServices'])
        results << extract_domain_join(c.elements['Identification/Credentials'])
      end
    end
  return results.flatten
end