Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/analyze/modbus_zip.md
19567 views

Vulnerable Application

This module is able to extract a zip file sent through Modbus from a pcap.

Tested with Schneider TM221CE16R

Verification Steps

  1. Do: use auxiliary/analyze/modbus_zip

  2. Do: set PCAPFILE <PATH_TO_PCAP> where PATH_TO_PCAP is the PATH to the pcap file

  3. Do: exploit extract the zip file

Options

MODE

Default: UPLOAD. Changes offset within a packet that is used to check for a zip header.

Scenarios

msf > use auxiliary/analyze/modbus_zip msf auxiliary(analyze/modbus_zip) > set PCAPFILE file.pcap PCAPFILE => file.pcap auxiliary(analyze/modbus_zip) > set MODE DOWNLOAD MODE => DOWNLOAD msf auxiliary(analyze/modbus_zip) > exploit [*] Running module against 0.0.0.0 [*] Zip start on packet 1370 [*] Zip end on packet 1452 [*] Done! [*] Auxiliary module execution completed