-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ASUS infosvr Auth Byass Scanner module #9245
Conversation
end | ||
|
||
def scanner_postscan(_batch) | ||
@t.kill |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm sure this will never end badly. 🙄
return unless p.payload.to_s.match?(/#{@fingerprint}/) | ||
p | ||
rescue | ||
nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I never reached this code path. Consider it future proofing against PacketFu. 🙄
|
||
@results = [] | ||
|
||
open_pcap 'SNAPLEN' => 128, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the reason for doing the capture here rather than via scanner_process
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There does not appear to be a flag for the UDPScanner
library to enable parsing broadcast traffic. This implementation was the most clean and efficient way I could think of capturing and parsing the broadcast traffic.
To clarify, if scanner_process
parsed broadcast traffic, the module would be much smaller and easier to read, as there would be no need to use the Msf::Exploit::Capture
library, use open_pcap
, use PacketFu, deal with threading, etc.
Possibly dumb question: do you have to have metasploit installed as root to run this because of the socket manipulation?
|
So, the pattern it seems for all Metasploit modules so far is to use raw sockets for capturing broadcast packets, as opposed to using a broadcast socket. I asked @bcoles why we can't use broadcast sockets, and it appears that there is no actual technical reason documented why not. |
Delayed pending fix for #9244 |
Renamed for clarity. When I wrote this module it was the only ASUS infosvr module in the framework. That will no longer be the case soon. |
Is this still delayed? Was there any motion on the raw socket front? |
@bwatters-r7 no motion. It may be as simple as using |
This PR adds an ASUS infosvr Scanner module.
This module discovers ASUS infosvr servers vulnerable to CVE-2014-9583.
Verification
msfconsole
use auxiliary/scanner/misc/asus_infosvr
set RHOSTS 255.255.255.255
run
Example Output
The output is silly (reports a host, then reports no hosts were found, then reports the same host again) due to the way batch scanning works. This is typical of all module which make use of the UDPScanner when specifying more than one host or host range in
RHOSTS
.