237 lines
5.9 KiB
Ruby
237 lines
5.9 KiB
Ruby
# -*- coding: binary -*-
|
|
module Msf
|
|
module Handler
|
|
|
|
###
|
|
#
|
|
# This module implements the Bind TCP handler. This means that
|
|
# it will attempt to connect to a remote host on a given port for a period of
|
|
# time (typically the duration of an exploit) to see if a the payload has
|
|
# started listening. This can tend to be rather verbose in terms of traffic
|
|
# and in general it is preferable to use reverse payloads.
|
|
#
|
|
###
|
|
module BindTcp
|
|
|
|
include Msf::Handler
|
|
|
|
#
|
|
# Returns the handler specific string representation, in this case
|
|
# 'bind_tcp'.
|
|
#
|
|
def self.handler_type
|
|
return "bind_tcp"
|
|
end
|
|
|
|
#
|
|
# Returns the connection oriented general handler type, in this case bind.
|
|
#
|
|
def self.general_handler_type
|
|
"bind"
|
|
end
|
|
|
|
#
|
|
# Initializes a bind handler and adds the options common to all bind
|
|
# payloads, such as local port.
|
|
#
|
|
def initialize(info = {})
|
|
super
|
|
|
|
register_options(
|
|
[
|
|
Opt::LPORT(4444),
|
|
OptAddress.new('RHOST', [false, 'The target address', '']),
|
|
], Msf::Handler::BindTcp)
|
|
|
|
self.conn_threads = []
|
|
self.listener_threads = []
|
|
self.listener_pairs = {}
|
|
end
|
|
|
|
#
|
|
# Kills off the connection threads if there are any hanging around.
|
|
#
|
|
def cleanup_handler
|
|
# Kill any remaining handle_connection threads that might
|
|
# be hanging around
|
|
conn_threads.each { |thr|
|
|
thr.kill
|
|
}
|
|
end
|
|
|
|
#
|
|
# Starts a new connecting thread
|
|
#
|
|
def add_handler(opts={})
|
|
|
|
# Merge the updated datastore values
|
|
opts.each_pair do |k,v|
|
|
datastore[k] = v
|
|
end
|
|
|
|
# Start a new handler
|
|
start_handler
|
|
end
|
|
|
|
#
|
|
# Starts monitoring for an outbound connection to become established.
|
|
#
|
|
def start_handler
|
|
|
|
# Maximum number of seconds to run the handler
|
|
ctimeout = 150
|
|
|
|
if (exploit_config and exploit_config['active_timeout'])
|
|
ctimeout = exploit_config['active_timeout'].to_i
|
|
end
|
|
|
|
# Take a copy of the datastore options
|
|
rhost = datastore['RHOST']
|
|
lport = datastore['LPORT']
|
|
|
|
# Ignore this if one of the required options is missing
|
|
return if not rhost
|
|
return if not lport
|
|
|
|
# Only try the same host/port combination once
|
|
phash = rhost + ':' + lport.to_s
|
|
return if self.listener_pairs[phash]
|
|
self.listener_pairs[phash] = true
|
|
|
|
# Start a new handling thread
|
|
self.listener_threads << framework.threads.spawn("BindTcpHandlerListener-#{lport}", false) {
|
|
client = nil
|
|
|
|
print_status("Started bind handler")
|
|
|
|
if (rhost == nil)
|
|
raise ArgumentError,
|
|
"RHOST is not defined; bind stager cannot function.",
|
|
caller
|
|
end
|
|
|
|
stime = Time.now.to_i
|
|
|
|
while (stime + ctimeout > Time.now.to_i)
|
|
begin
|
|
client = Rex::Socket::Tcp.create(
|
|
'PeerHost' => rhost,
|
|
'PeerPort' => lport.to_i,
|
|
'Proxies' => datastore['Proxies'],
|
|
'Context' =>
|
|
{
|
|
'Msf' => framework,
|
|
'MsfPayload' => self,
|
|
'MsfExploit' => assoc_exploit
|
|
})
|
|
rescue Rex::ConnectionRefused
|
|
# Connection refused is a-okay
|
|
rescue ::Exception
|
|
wlog("Exception caught in bind handler: #{$!.class} #{$!}")
|
|
end
|
|
|
|
break if client
|
|
|
|
# Wait a second before trying again
|
|
Rex::ThreadSafe.sleep(0.5)
|
|
end
|
|
|
|
# Valid client connection?
|
|
if (client)
|
|
# Increment the has connection counter
|
|
self.pending_connections += 1
|
|
|
|
# Timeout and datastore options need to be passed through to the client
|
|
opts = {
|
|
:datastore => datastore,
|
|
:expiration => datastore['SessionExpirationTimeout'].to_i,
|
|
:comm_timeout => datastore['SessionCommunicationTimeout'].to_i,
|
|
:retry_total => datastore['SessionRetryTotal'].to_i,
|
|
:retry_wait => datastore['SessionRetryWait'].to_i
|
|
}
|
|
|
|
# Start a new thread and pass the client connection
|
|
# as the input and output pipe. Client's are expected
|
|
# to implement the Stream interface.
|
|
conn_threads << framework.threads.spawn("BindTcpHandlerSession", false, client) { |client_copy|
|
|
begin
|
|
handle_connection(wrap_aes_socket(client_copy), opts)
|
|
rescue
|
|
elog("Exception raised from BindTcp.handle_connection: #{$!}")
|
|
end
|
|
}
|
|
else
|
|
wlog("No connection received before the handler completed")
|
|
end
|
|
}
|
|
end
|
|
|
|
def wrap_aes_socket(sock)
|
|
if datastore["PAYLOAD"] !~ /java\// or (datastore["AESPassword"] || "") == ""
|
|
return sock
|
|
end
|
|
|
|
socks = Rex::Socket::tcp_socket_pair()
|
|
socks[0].extend(Rex::Socket::Tcp)
|
|
socks[1].extend(Rex::Socket::Tcp)
|
|
|
|
m = OpenSSL::Digest.new('md5')
|
|
m.reset
|
|
key = m.digest(datastore["AESPassword"] || "")
|
|
|
|
Rex::ThreadFactory.spawn('AESEncryption', false) {
|
|
c1 = OpenSSL::Cipher.new('aes-128-cfb8')
|
|
c1.encrypt
|
|
c1.key=key
|
|
sock.put([0].pack('N'))
|
|
sock.put(c1.iv=c1.random_iv)
|
|
buf1 = socks[0].read(4096)
|
|
while buf1 and buf1 != ""
|
|
sock.put(c1.update(buf1))
|
|
buf1 = socks[0].read(4096)
|
|
end
|
|
sock.close()
|
|
}
|
|
|
|
Rex::ThreadFactory.spawn('AESEncryption', false) {
|
|
c2 = OpenSSL::Cipher.new('aes-128-cfb8')
|
|
c2.decrypt
|
|
c2.key=key
|
|
iv=""
|
|
while iv.length < 16
|
|
iv << sock.read(16-iv.length)
|
|
end
|
|
c2.iv = iv
|
|
buf2 = sock.read(4096)
|
|
while buf2 and buf2 != ""
|
|
socks[0].put(c2.update(buf2))
|
|
buf2 = sock.read(4096)
|
|
end
|
|
socks[0].close()
|
|
}
|
|
|
|
return socks[1]
|
|
end
|
|
|
|
#
|
|
# Nothing to speak of.
|
|
#
|
|
def stop_handler
|
|
# Stop the listener threads
|
|
self.listener_threads.each do |t|
|
|
t.kill
|
|
end
|
|
self.listener_threads = []
|
|
self.listener_pairs = {}
|
|
end
|
|
|
|
protected
|
|
|
|
attr_accessor :conn_threads # :nodoc:
|
|
attr_accessor :listener_threads # :nodoc:
|
|
attr_accessor :listener_pairs # :nodoc:
|
|
end
|
|
|
|
end
|
|
end
|