66 lines
1.7 KiB
Ruby
66 lines
1.7 KiB
Ruby
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'msf/core/post/common'
|
|
require 'msf/core/post/windows/extapi'
|
|
|
|
class MetasploitModule < Msf::Post
|
|
include Msf::Post::Common
|
|
include Msf::Post::Windows::ExtAPI
|
|
|
|
def initialize(info={})
|
|
super(update_info(info,
|
|
'Name' => "Windows Gather Applied Patches",
|
|
'Description' => %q{
|
|
This module will attempt to enumerate which patches are applied to a windows system
|
|
based on the result of the WMI query: SELECT HotFixID FROM Win32_QuickFixEngineering.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Platform' => ['win'],
|
|
'SessionTypes' => ['meterpreter'],
|
|
'Author' =>
|
|
[
|
|
'zeroSteiner', # Original idea
|
|
'mubix' # Post module
|
|
],
|
|
'References' =>
|
|
[
|
|
['URL', 'http://msdn.microsoft.com/en-us/library/aa394391(v=vs.85).aspx']
|
|
]
|
|
))
|
|
end
|
|
|
|
def run
|
|
unless load_extapi
|
|
print_error 'ExtAPI failed to load'
|
|
return
|
|
end
|
|
|
|
begin
|
|
objects = session.extapi.wmi.query("SELECT HotFixID FROM Win32_QuickFixEngineering")
|
|
rescue RuntimeError
|
|
print_error "Known bug in WMI query, try migrating to another process"
|
|
return
|
|
end
|
|
|
|
if objects[:values].nil?
|
|
kb_ids = []
|
|
else
|
|
kb_ids = objects[:values].reject(&:nil?).map { |kb| kb[0] }
|
|
end
|
|
|
|
if kb_ids.empty?
|
|
print_status 'Found no patches installed'
|
|
return
|
|
end
|
|
|
|
l = store_loot('enum_patches', 'text/plain', session, kb_ids.join("\n"))
|
|
print_status("Patch list saved to #{l}")
|
|
kb_ids.each do |kb|
|
|
print_status("#{kb} applied")
|
|
end
|
|
end
|
|
end
|