Module: Msf::Exploit::Remote::DNS::Server
- Includes:
- Common, SocketServer
- Defined in:
- lib/msf/core/exploit/remote/dns/server.rb
Constant Summary
Constants included from Common
Common::MATCH_HOSTNAME, Common::Packet
Instance Attribute Summary collapse
-
#service ⇒ Object
:nodoc:.
Instance Method Summary collapse
-
#add_static_hosts(entries = , type = 'A') ⇒ Array
Process static entries.
-
#cleanup ⇒ Object
Dereference the DNS service.
-
#flush_cache(static = false) ⇒ Object
Flush cache entries.
-
#flush_static_hosts ⇒ Object
Flush all static entries.
-
#initialize(info = {}) ⇒ Object
Initializes an exploit module that serves DNS requests.
-
#on_dispatch_request(cli, data) ⇒ Object
Handle incoming requests Override this method in modules to take flow control.
-
#on_send_response(cli, data) ⇒ Object
Handle incoming requests Override this method in modules to take flow control.
-
#start_service ⇒ Object
Starts the server.
-
#use_resolver? ⇒ Boolean
Determines if resolver is available and configured for use.
Methods included from SocketServer
#_determine_server_comm, #bindhost, #bindport, #cleanup_service, #exploit, #on_client_data, #primer, #regenerate_payload, #srvhost, #srvport, #via_string
Instance Attribute Details
#service ⇒ Object
:nodoc:
38 39 40 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 38 def service @service end |
Instance Method Details
#add_static_hosts(entries = , type = 'A') ⇒ Array
Process static entries
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 47 def add_static_hosts(entries = datastore['STATIC_ENTRIES'], type = 'A') return if entries.nil? or entries.empty? if File.file?(File.(entries)) data = File.read(File.(entries)).split("\n") else data = entries.split(';') end data.each do |entry| next if entry.gsub(/\s/, '').empty? address, names = entry.split(' ', 2) names.split.each do |name| name << '.' unless name.end_with?('.') || name == '*' unless Rex::Socket.is_ip_addr?(address.to_s) && (name.to_s.match(MATCH_HOSTNAME) || name == '*') raise "Invalid parameters for static entry - #{name}, #{address}, #{type}" end service.cache.cache_record(Dnsruby::RR.create(name: name, type: type, address: address), expire: false) end end service.cache.records.select {|r,e| e == 0} end |
#cleanup ⇒ Object
Dereference the DNS service
141 142 143 144 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 141 def cleanup super @dns_resolver = nil if @dns_resolver end |
#flush_cache(static = false) ⇒ Object
Flush cache entries
83 84 85 86 87 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 83 def flush_cache(static = false) self.service.cache.stop(true) flush_static_hosts if static self.service.cache.start end |
#flush_static_hosts ⇒ Object
Flush all static entries
74 75 76 77 78 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 74 def flush_static_hosts data.cache.records.select {|r,e| e == 0}.each do |flush| data.cache.delete(flush) end end |
#initialize(info = {}) ⇒ Object
Initializes an exploit module that serves DNS requests
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 18 def initialize(info = {}) super ( [ OptPort.new('SRVPORT', [true, 'The local port to listen on.', 53]), OptString.new('STATIC_ENTRIES', [ false, "DNS domain search list (hosts file or space/semicolon separate entries)"]), OptBool.new('DISABLE_RESOLVER', [ false, "Disable DNS request forwarding", false]), OptBool.new('DISABLE_NS_CACHE', [ false, "Disable DNS response caching", false]) ], Exploit::Remote::DNS::Server ) ( [ OptBool.new('DnsServerUdp', [true, "Serve UDP DNS requests", true]), OptBool.new('DnsServerTcp', [true, "Serve TCP DNS requests", false]) ], Exploit::Remote::DNS::Server ) end |
#on_dispatch_request(cli, data) ⇒ Object
Handle incoming requests Override this method in modules to take flow control
93 94 95 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 93 def on_dispatch_request(cli, data) service.default_dispatch_request(cli,data) end |
#on_send_response(cli, data) ⇒ Object
Handle incoming requests Override this method in modules to take flow control
101 102 103 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 101 def on_send_response(cli, data) cli.write(data) end |
#start_service ⇒ Object
Starts the server
108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 108 def start_service begin comm = _determine_server_comm(bindhost) self.service = Rex::ServiceManager.start( Rex::Proto::DNS::Server, bindhost, bindport, datastore['DnsServerUdp'], datastore['DnsServerTcp'], !datastore['DISABLE_NS_CACHE'], (use_resolver? ? setup_resolver : false), comm, {'Msf' => framework, 'MsfExploit' => self} ) self.service.dispatch_request_proc = Proc.new do |cli, data| on_dispatch_request(cli,data) end self.service.send_response_proc = Proc.new do |cli, data| on_send_response(cli,data) end add_static_hosts rescue ::Errno::EACCES => e raise Rex::BindFailed.new(e.) end end |
#use_resolver? ⇒ Boolean
Determines if resolver is available and configured for use
149 150 151 |
# File 'lib/msf/core/exploit/remote/dns/server.rb', line 149 def use_resolver? !datastore['DISABLE_RESOLVER'] and self.respond_to?(:setup_resolver) end |