Module: Msf::Post::Common

Instance Method Summary collapse

Instance Method Details

#clear_screenObject



21
22
23
# File 'lib/msf/core/post/common.rb', line 21

def clear_screen
  Gem.win_platform? ? (system "cls") : (system "clear")
end

#cmd_exec(cmd, args = nil, time_out = 15, opts = {}) ⇒ Object

Executes cmd on the remote system

On Windows meterpreter, this will go through CreateProcess as the “commandLine” parameter. This means it will follow the same rules as Windows’ path disambiguation. For example, if you were to call this method thusly:

cmd_exec("c:\\program files\\sub dir\\program name")

Windows would look for these executables, in this order, passing the rest of the line as arguments:

c:\program.exe
c:\program files\sub.exe
c:\program files\sub dir\program.exe
c:\program files\sub dir\program name.exe

On POSIX meterpreter, if args is set or if cmd contains shell metacharacters, the server will run the whole thing in /bin/sh. Otherwise, (cmd is a single path and there are no arguments), it will execve the given executable.

On Java, it is passed through Runtime.getRuntime().exec(String) and PHP uses proc_open() both of which have similar semantics to POSIX.

On shell sessions, this passes cmd directly the session’s shell_command_token method.

Returns a (possibly multi-line) String.



151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
# File 'lib/msf/core/post/common.rb', line 151

def cmd_exec(cmd, args=nil, time_out=15, opts = {})
  case session.type
  when 'meterpreter'
    #
    # The meterpreter API requires arguments to come separately from the
    # executable path. This has no effect on Windows where the two are just
    # blithely concatenated and passed to CreateProcess or its brethren. On
    # POSIX, this allows the server to execve just the executable when a
    # shell is not needed. Determining when a shell is not needed is not
    # always easy, so it assumes anything with arguments needs to go through
    # /bin/sh.
    #
    # This problem was originally solved by using Shellwords.shellwords but
    # unfortunately, it is unsuitable. When a backslash occurs inside double
    # quotes (as is often the case with Windows commands) it inexplicably
    # removes them. So. Shellwords is out.
    #
    # By setting +args+ to an empty string, we can get POSIX to send it
    # through /bin/sh, solving all the pesky parsing troubles, without
    # affecting Windows.
    #
    if args.nil? and cmd =~ /[^a-zA-Z0-9\/._-]/
      args = ""
    end

    session.response_timeout = time_out
    opts = {
      'Hidden' => true,
      'Channelized' => true,
      'Subshell' => true
    }.merge(opts)

    if opts['Channelized']
      o = session.sys.process.capture_output(cmd, args, opts, time_out)
    else
      session.sys.process.execute(cmd, args, opts)
    end
  when 'powershell'
    if args.nil? || args.empty?
      o = session.shell_command("#{cmd}", time_out)
    else
      o = session.shell_command("#{cmd} #{args}", time_out)
    end
    o.chomp! if o
  when 'shell'
    if args.nil? || args.empty?
      o = session.shell_command_token("#{cmd}", time_out)
    else
      o = session.shell_command_token("#{cmd} #{args}", time_out)
    end
    o.chomp! if o
  end
  return "" if o.nil?
  return o
end

#cmd_exec_get_pid(cmd, args = nil, time_out = 15) ⇒ Object



207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
# File 'lib/msf/core/post/common.rb', line 207

def cmd_exec_get_pid(cmd, args=nil, time_out=15)
  case session.type
    when 'meterpreter'
      if args.nil? and cmd =~ /[^a-zA-Z0-9\/._-]/
        args = ""
      end
      session.response_timeout = time_out
      process = session.sys.process.execute(cmd, args, {'Hidden' => true, 'Channelized' => true, 'Subshell' => true })
      process.channel.close
      pid = process.pid
      process.close
      pid
    else
      print_error "cmd_exec_get_pid is incompatible with non-meterpreter sessions"
  end
end

#cmd_exec_with_result(cmd, args = nil, timeout = 15, opts = {}) ⇒ Array(String, Boolean)

Executes cmd on the remote system and return an array containing the output and if it was successful or not.

This is simply a wrapper around #cmd_exec that also checks the exit code to determine if the execution was successful or not.

Parameters:

  • cmd (String)

    The command to execute

  • args (String) (defaults to: nil)

    The optional arguments of the command (can de included in cmd instead)

  • timeout (Integer) (defaults to: 15)

    The time in sec. to wait before giving up

  • opts (Hash) (defaults to: {})

    An Hash of options (see #cmd_exec)

Returns:

  • (Array(String, Boolean))

    Array containing the output string followed by a boolean indicating if the command succeeded or not. When this boolean is 'true`, the first field contains the normal command output. When it is `false`, the first field contains the error message returned by the command or a timeout error message if the timeout expired.



331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
# File 'lib/msf/core/post/common.rb', line 331

def cmd_exec_with_result(cmd, args = nil, timeout = 15, opts = {})
  # This token will be returned if the command succeeds.
  # Redirection operators (`&&` and `||`) are the most reliable methods to
  # detect success and failure. See these references for details:
  # - https://ss64.com/nt/errorlevel.html
  # - https://stackoverflow.com/questions/34936240/batch-goto-loses-errorlevel/34937706#34937706
  # - https://stackoverflow.com/questions/10935693/foolproof-way-to-check-for-nonzero-error-return-code-in-windows-batch-file/10936093#10936093
  verification_token = Rex::Text.rand_text_alphanumeric(8)

  _cmd = cmd.dup
  _cmd << " #{args}" if args
  if session.platform == 'windows'
    if session.type == 'powershell'
      # The & operator is reserved by Powershell and needs to be wrapped in double quotes
      result = cmd_exec('cmd', "/c #{_cmd} \"&&\" echo #{verification_token}", timeout, opts)
    else
      result = cmd_exec('cmd', "/c #{_cmd} && echo #{verification_token}", timeout, opts)
    end
  else
    result = cmd_exec('command', "#{_cmd} && echo #{verification_token}", timeout, opts)
  end

  if result.include?(verification_token)
    # Removing the verification token to cleanup the output string
    [result.lines[0...-1].join.strip, true]
  else
    [result.strip, false]
  end
rescue Rex::TimeoutError => e
  [e.message, false]
end

#command_exists?(cmd) ⇒ Boolean

Checks if the specified command can be executed by the session. It should be noted that not all commands correspond to a binary file on disk. For example, a bash shell session will provide the ‘eval` command when there is no `eval` binary on disk. Likewise, a Powershell session will provide the `Get-Item` command when there is no `Get-Item` executable on disk.

Parameters:

  • cmd (String)

    the command to check

Returns:

  • (Boolean)

    true when the command exists



300
301
302
303
304
305
306
307
308
309
310
311
312
313
# File 'lib/msf/core/post/common.rb', line 300

def command_exists?(cmd)
  verification_token = Rex::Text.rand_text_alpha_upper(8)
  if session.type == 'powershell'
    cmd_exec("try {if(Get-Command #{cmd}) {echo #{verification_token}}} catch {}").include?(verification_token)
  elsif session.platform == 'windows'
    # https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/where_1
    # https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/if
    cmd_exec("cmd /c where /q #{cmd} & if not errorlevel 1 echo #{verification_token}").to_s.include?(verification_token)
  else
    cmd_exec("command -v #{cmd} || which #{cmd} && echo #{verification_token}").include?(verification_token)
  end
rescue
  raise "Unable to check if command `#{cmd}' exists"
end

#create_process(executable, args: [], time_out: 15, opts: {}) ⇒ Object

Create a new process, receiving the program’s output

Parameters:

  • executable (String)

    The path to the executable; either absolute or relative to the session's current directory

  • args (Array<String>) (defaults to: [])

    The arguments to the executable

  • opts (Hash) (defaults to: {})

    Optional settings to parameterise the process launch

  • Hidden (Hash)

    a customizable set of options

  • Channelized (Hash)

    a customizable set of options

  • Suspended (Hash)

    a customizable set of options

  • UseThreadToken (Hash)

    a customizable set of options

  • Desktop (Hash)

    a customizable set of options

  • Session (Hash)

    a customizable set of options

  • Subshell (Hash)

    a customizable set of options

  • Pty (Hash)

    a customizable set of options

  • ParentId (Hash)

    a customizable set of options

  • InMemory (Hash)

    a customizable set of options



71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
# File 'lib/msf/core/post/common.rb', line 71

def create_process(executable, args: [], time_out: 15, opts: {})
  case session.type
  when 'meterpreter'
    session.response_timeout = time_out
    opts = {
      'Hidden' => true,
      'Channelized' => true,
      # Well-behaving meterpreters will ignore the Subshell flag when using arg arrays.
      # This is still provided for supporting old meterpreters.
      'Subshell' => true
    }.merge(opts)

    if session.platform == 'windows'
      if session.arch == 'php'
        opts[:legacy_args] = Msf::Sessions::CommandShellWindows.to_cmd(args)
        opts[:legacy_path] = Msf::Sessions::CommandShellWindows.to_cmd([executable])
      elsif session.arch == 'python'
        opts[:legacy_path] = executable
        # Yes, Unix. Old Python meterp had a bug where it used posix shell splitting
        # syntax even on Windows. For backwards-compatibility, we can trick it into
        # doing the right thing by using Unix escaping.
        opts[:legacy_args] = Msf::Sessions::CommandShellUnix.to_cmd(args)
      else
        opts[:legacy_args] = Msf::Sessions::CommandShellWindows.argv_to_commandline(args)
        opts[:legacy_path] = Msf::Sessions::CommandShellWindows.escape_cmd(executable)
      end
    else
      opts[:legacy_args] = Msf::Sessions::CommandShellUnix.to_cmd(args)
      opts[:legacy_path] = Msf::Sessions::CommandShellUnix.to_cmd([executable])
    end

    if opts['Channelized']
      o = session.sys.process.capture_output(executable, args, opts, time_out)
    else
      session.sys.process.execute(executable, args, opts)
    end
  when 'powershell'
    cmd = session.to_cmd([executable] + args)
    o = session.shell_command(cmd, time_out)
    o.chomp! if o
  when 'shell'
    cmd = session.to_cmd([executable] + args)
    o = session.shell_command_token(cmd, time_out)
    o.chomp! if o
  end
  return "" if o.nil?
  return o
end

#get_env(env) ⇒ Object

Returns the value of the environment variable env



243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
# File 'lib/msf/core/post/common.rb', line 243

def get_env(env)
  case session.type
  when 'meterpreter'
    return session.sys.config.getenv(env)
  when 'powershell'
    return cmd_exec("echo $env:#{env}").strip
  when 'shell'
    if session.platform == 'windows'
      if env[0,1] == '%'
        unless env[-1,1] == '%'
          env << '%'
        end
      else
        env = "%#{env}%"
      end

      return cmd_exec("echo #{env}")
    else
      unless env[0,1] == '$'
        env = "$#{env}"
      end

      return cmd_exec("echo \"#{env}\"")
    end
  end

  nil
end

#get_envs(*envs) ⇒ Object

Returns a hash of environment variables envs



275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
# File 'lib/msf/core/post/common.rb', line 275

def get_envs(*envs)
  case session.type
  when 'meterpreter'
    return session.sys.config.getenvs(*envs)
  when 'shell', 'powershell'
    result = {}
    envs.each do |env|
      res = get_env(env)
      result[env] = res unless res.blank?
    end

    return result
  end

  nil
end

#initialize(info = {}) ⇒ Object



5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
# File 'lib/msf/core/post/common.rb', line 5

def initialize(info = {})
  super(
    update_info(
      info,
      'Compat' => {
        'Meterpreter' => {
          'Commands' => %w[
            stdapi_sys_config_getenv
            stdapi_sys_process_execute
          ]
        }
      }
    )
  )
end

#peerObject



51
52
53
# File 'lib/msf/core/post/common.rb', line 51

def peer
  "#{rhost}:#{rport}"
end

#report_virtualization(virt) ⇒ Object

Reports to the database that the host is using virtualization and reports the type of virtualization it is (e.g VirtualBox, VMware, Xen, Docker)



228
229
230
231
232
233
234
235
236
237
238
# File 'lib/msf/core/post/common.rb', line 228

def report_virtualization(virt)
  return unless session
  return unless virt
  virt_normal = virt.to_s.strip
  return if virt_normal.empty?
  virt_data = {
    :host => session.target_host,
    :virtual_host => virt_normal
  }
  report_host(virt_data)
end

#rhostObject



25
26
27
28
29
30
31
32
33
34
35
36
# File 'lib/msf/core/post/common.rb', line 25

def rhost
  return super unless defined?(session) and session

  case session.type.downcase
  when 'meterpreter'
    session.sock.peerhost
  when 'shell', 'powershell'
    session.session_host
  end
rescue
  return nil
end

#rportObject



38
39
40
41
42
43
44
45
46
47
48
49
# File 'lib/msf/core/post/common.rb', line 38

def rport
  return super unless defined?(session) and session

  case session.type.downcase
  when 'meterpreter'
    session.sock.peerport
  when 'shell', 'powershell'
    session.session_port
  end
rescue
  return nil
end