CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/auxiliary/scanner/motorola/timbuktu_udp.rb
Views: 11784
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Auxiliary
7
include Msf::Auxiliary::Report
8
include Msf::Auxiliary::Scanner
9
include Msf::Exploit::Remote::Udp
10
11
def initialize(info = {})
12
super(update_info(info,
13
'Name' => 'Motorola Timbuktu Service Detection',
14
'Description' => %q{
15
This module simply sends a packet to the Motorola Timbuktu service for detection.
16
},
17
'Author' => ['MC'],
18
'License' => MSF_LICENSE,
19
'DisclosureDate' => '2009-09-25'
20
))
21
22
register_options(
23
[
24
Opt::RPORT(407)
25
])
26
end
27
28
def run_host(ip)
29
begin
30
connect_udp
31
32
ping = "\x00\x25\x00\x22\xFF\x01\x00\x64\x03\x07\x00\x05\x00\x01\x00\x00"
33
34
udp_sock.write(ping)
35
36
res = udp_sock.read(256)
37
38
if ( res =~ /\x00\x25\xD0\xB9/ )
39
report_note(
40
:host => ip,
41
:proto => 'udp',
42
:port => datastore['RPORT'],
43
:type => 'SERVICE',
44
:data => 'Motorola Timbuktu Service Detection'
45
)
46
print_status("Motorola Timbuktu Detected on host #{ip}.")
47
else
48
print_error("Unable to determine info for #{ip}...")
49
end
50
ensure
51
disconnect_udp
52
end
53
end
54
end
55
56