Files
metasploit-gs/modules/auxiliary/scanner/db2/db2_version.rb
T

66 lines
1.7 KiB
Ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::DB2
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
def initialize
super(
'Name' => 'DB2 Probe Utility',
'Description' => 'This module queries a DB2 instance information.',
'Author' => ['todb'],
'License' => MSF_LICENSE,
'Notes' => {
'Stability' => [CRASH_SAFE],
'SideEffects' => [],
'Reliability' => []
}
)
register_options(
[
OptInt.new('TIMEOUT', [true, 'Timeout for the DB2 probe', 5])
]
)
deregister_options('USERNAME', 'PASSWORD')
end
def to
return 5 if datastore['TIMEOUT'].to_i.zero?
datastore['TIMEOUT'].to_i
end
def run_host(ip)
info = db2_probe(to)
if info[:excsatrd]
inst = info[:instance_name]
plat = info[:platform]
ver = info[:version]
pta = info[:plaintext_auth]
report_info = "Platform: #{plat}, Version: #{ver}, Instance: #{inst}, Plain-Authentication: #{pta ? 'OK' : 'NO'}"
print_good("#{ip}:#{rport} DB2 - #{report_info}")
report_service(
host: rhost,
port: rport,
name: 'db2',
info: report_info
)
end
disconnect
rescue ::Rex::ConnectionRefused
vprint_error("#{rhost}:#{rport} : Cannot connect to host")
return :done
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} : Unable to attempt probe")
return :done
rescue ::Rex::Proto::DRDA::RespError => e
vprint_error("#{rhost}:#{rport} : Error in connecting to DB2 instance: #{e}")
return :error
end
end