CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/analyze/modbus_zip.md
Views: 11784

Vulnerable Application

This module is able to extract a zip file sent through Modbus from a pcap.

Tested with Schneider TM221CE16R

Verification Steps

  1. Do: use auxiliary/analyze/modbus_zip

  2. Do: set PCAPFILE <PATH_TO_PCAP> where PATH_TO_PCAP is the PATH to the pcap file

  3. Do: exploit extract the zip file

Options

MODE

Default: UPLOAD. Changes offset within a packet that is used to check for a zip header.

Scenarios

msf > use auxiliary/analyze/modbus_zip msf auxiliary(analyze/modbus_zip) > set PCAPFILE file.pcap PCAPFILE => file.pcap auxiliary(analyze/modbus_zip) > set MODE DOWNLOAD MODE => DOWNLOAD msf auxiliary(analyze/modbus_zip) > exploit [*] Running module against 0.0.0.0 [*] Zip start on packet 1370 [*] Zip end on packet 1452 [*] Done! [*] Auxiliary module execution completed