Files
metasploit-gs/modules/post/windows/gather/enum_domain.rb
T
2020-03-24 16:03:40 -04:00

60 lines
1.9 KiB
Ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
include Msf::Post::Windows::Priv
def initialize(info = {})
super(update_info(info,
'Name' => "Windows Gather Enumerate Domain",
'Description' => %q(
This module identifies the primary domain via the registry. The registry value used is:
HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy\\History\\DCName.
),
'License' => MSF_LICENSE,
'Platform' => ['win'],
'SessionTypes' => ['meterpreter'],
'Author' => ['Joshua Abraham <jabra[at]rapid7.com>']
))
end
def gethost(hostorip)
# check for valid ip and return if it is
return hostorip if Rex::Socket.dotted_ip?(hostorip)
## get IP for host
vprint_status("Looking up IP for #{hostorip}")
result = client.net.resolve.resolve_host(hostorip)
return result[:ip] if result[:ip]
return nil if result[:ip].nil? || result[:ip].empty?
end
def run
domain = get_domain("DomainControllerName")
if !domain.nil? && domain =~ /\./
dom_info = domain.split('.')
dom_info[0].sub!(/\\\\/, '')
report_note(
host: session,
type: 'windows.domain',
data: { domain: dom_info[1] },
update: :unique_data
)
print_good("FOUND Domain: #{dom_info[1]}")
dc_ip = gethost(dom_info[0])
if !dc_ip.nil?
print_good("FOUND Domain Controller: #{dom_info[0]} (IP: #{dc_ip})")
report_host({
host: dc_ip,
name: dom_info[0],
info: "Domain controller for #{dom_info[1]}"
})
else
print_good("FOUND Domain Controller: #{dom_info[0]}")
end
end
end
end