Path: blob/master/modules/post/multi/gather/dns_srv_lookup.rb
19535 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Post6include Msf::Auxiliary::Report78def initialize(info = {})9super(10update_info(11info,12'Name' => 'Multi Gather DNS Service Record Lookup Scan',13'Description' => %q{14Enumerates known SRV Records for a given domain using target host DNS query tool.15},16'License' => MSF_LICENSE,17'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],18'Platform' => %w[bsd linux osx solaris win],19'SessionTypes' => [ 'meterpreter', 'shell' ],20'Notes' => {21'Stability' => [CRASH_SAFE],22'SideEffects' => [],23'Reliability' => []24}25)26)27register_options(28[2930OptString.new('DOMAIN', [true, 'Domain to perform SRV query against.'])3132]33)34end3536# Run Method for when run command is issued37def run38srvrcd = [39'_gc._tcp.', '_kerberos._tcp.', '_kerberos._udp.', '_ldap._tcp.',40'_test._tcp.', '_sips._tcp.', '_sip._udp.', '_sip._tcp.', '_aix._tcp.',41'_aix._tcp.', '_finger._tcp.', '_ftp._tcp.', '_http._tcp.', '_nntp._tcp.',42'_telnet._tcp.', '_whois._tcp.', '_h323cs._tcp.', '_h323cs._udp.',43'_h323be._tcp.', '_h323be._udp.', '_h323ls._tcp.',44'_h323ls._udp.', '_sipinternal._tcp.', '_sipinternaltls._tcp.',45'_sip._tls.', '_sipfederationtls._tcp.', '_jabber._tcp.',46'_xmpp-server._tcp.', '_xmpp-client._tcp.', '_imap.tcp.',47'_certificates._tcp.', '_crls._tcp.', '_pgpkeys._tcp.',48'_pgprevokations._tcp.', '_cmp._tcp.', '_svcp._tcp.', '_crl._tcp.',49'_ocsp._tcp.', '_PKIXREP._tcp.', '_smtp._tcp.', '_hkp._tcp.',50'_hkps._tcp.', '_jabber._udp.', '_xmpp-server._udp.', '_xmpp-client._udp.',51'_jabber-client._tcp.', '_jabber-client._udp.', '_kerberos.tcp.dc._msdcs.',52'_ldap._tcp.ForestDNSZones.', '_ldap._tcp.dc._msdcs.', '_ldap._tcp.pdc._msdcs.',53'_ldap._tcp.gc._msdcs.', '_kerberos._tcp.dc._msdcs.', '_kpasswd._tcp.', '_kpasswd._udp.',54'_imap._tcp.'55]5657domain = datastore['DOMAIN']5859print_status("Performing DNS SRV Record Lookup for Domain #{domain}")6061a = []6263case session.platform64when 'windows'65ns_opt = ' -query=srv '66cmd = 'nslookup'67when 'solaris'68ns_opt = ' -t srv '69cmd = '/usr/sbin/host'70else71ns_opt = ' -t srv '72cmd = '/usr/bin/host'73end7475while !srvrcd.nil? && !srvrcd.empty?761.upto session.max_threads do77a << framework.threads.spawn("Module(#{refname})", false, srvrcd.shift) do |srv|78next if srv.nil?7980r = cmd_exec(cmd, ns_opt + "#{srv}#{domain}")8182case session.platform83when 'windows'84if r =~ /\s*internet\saddress\s=\s/85nslookup_srv_consume("#{srv}#{domain}", r).each do |f|86print_good("\t#{f[:srv]} #{f[:target]} #{f[:port]} #{f[:ip]}")87end88end89else90found = host_srv_consume(r)91if found92found.each do |f|93print_good("\t#{f[:srv]} #{f[:target]} #{f[:port]} #{f[:ip]}")94end95end96end97end98a.map(&:join)99end100end101end102103def nslookup_srv_consume(srv, ns_out)104srv_records = []105records = ns_out.split(srv)106107# Get host to IP mapping108ip_map = {}109records.last.each_line do |e|110if e =~ /internet\saddress/i111host, ip = e.split(/\s*internet\saddress\s=\s/)112ip_map[host.strip] = ip.strip113end114end115116# Get SRV parameter for each record117records.each do |r|118next unless r =~ /svr hostname/119120rcrd = {}121rcrd[:srv] = srv122rcrd[:port] = r.scan(/port\s*=\s(\d*)/).join123rcrd[:target] = r.scan(/svr hostname\s*=\s(\S*)/).join124if !Rex::Socket.dotted_ip?(rcrd[:target])125w_get_ip(rcrd[:target]).each do |i|126rcrd[:ip] = i127report_host(host: rcrd[:ip].strip, name: rcrd[:target])128129# Report on the service found130srv_info = rcrd[:srv].scan(/^_(\S*)\._(\w*)\./)[0]131132report_service(host: rcrd[:ip].strip,133port: rcrd[:port].to_i,134proto: srv_info[1],135name: srv_info[0],136host_name: rcrd[:target])137srv_records << rcrd138end139else140141rcrd[:ip] = ip_map[rcrd[:target]]142# Report hosts found143report_host(host: rcrd[:ip].strip, name: rcrd[:target])144145# Report on the service found146srv_info = rcrd[:srv].scan(/^_(\S*)\._(\w*)\./)[0]147148report_service(host: '1.2.3.4',149port: rcrd[:port].to_i,150proto: srv_info[1],151name: srv_info[0],152host_name: rcrd[:target])153srv_records << rcrd154end155end156return srv_records157end158159# Get I{ for a given host using host, returns array160def get_ip(host)161ip_add = []162cmd_exec('host', " #{host}").each_line do |l|163ip = l.scan(/has address (\S*)$/).join164ip_add << ip if ip != ''165end166return ip_add167end168169# Get IP for given host with nslookup, return array170def w_get_ip(host)171ips = []172data = cmd_exec("nslookup #{host}")173if data =~ /Name/174# Remove unnecessary data and get the section with the addresses175returned_data = data.split(/Name:/)[1]176# check each element of the array to see if they are IP177returned_data.gsub(/\r\n\t |\r\n|Aliases:|Addresses:|Address:/, ' ').split(' ').each do |e|178if Rex::Socket.dotted_ip?(e)179ips << e180end181end182end183return ips184end185186def host_srv_consume(host_out)187srv_records = []188# Parse for SRV Records189host_out.each_line do |l|190next unless l =~ /has SRV/191192record, port, target = l.scan(/(\S*) has SRV record \d*\s\d*\s(\d*)\s(\S*)/)[0]193if Rex::Socket.dotted_ip?(target)194rcrd = {}195rcrd[:srv] = record196rcrd[:port] = port197rcrd[:target] = target198rcrd[:ip] = target199srv_records << rcrd200201# Report hosts found202report_host(host: rcrd[:ip], name: rcrd[:target])203204# Report on the service found205srv_info = rcrd[:srv].scan(/^_(\S*)\._(\w*)\./)[0]206report_service(host: rcrd[:ip],207port: rcrd[:port],208proto: srv_info[1],209name: srv_info[0],210host_name: rcrd[:target])211else212get_ip(target).each do |i|213rcrd = {}214rcrd[:srv] = record215rcrd[:port] = port216rcrd[:target] = target217rcrd[:ip] = i218srv_records << rcrd219220# Report hosts found221report_host(host: rcrd[:ip], name: rcrd[:target])222223# Report on the service found224srv_info = rcrd[:srv].scan(/^_(\S*)\._(\w*)\./)[0]225report_service(host: rcrd[:ip],226port: rcrd[:port].to_i,227proto: srv_info[1],228name: srv_info[0],229host_name: rcrd[:target])230end231end232end233return srv_records234end235end236237238