1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00
metasploit-framework/tools/vxdigger.rb
2013-09-30 13:47:53 -05:00

65 lines
1.5 KiB
Ruby
Executable File

#!/usr/bin/env ruby
# $Id$
#
# This script scans a memory dump or firmware image for any password hashes that
# happen to match the "master password" list generated by vxmaster. This is a
# simple way to determine whether a device has a hardcoded password.
#
# (C) 2010 Rapid7
#
# $Revision$
#
def usage
$stderr.puts "usage: #{$0} [dump-file] <master password list>"
exit
end
# Force binary encoding for Ruby versions that support it
if(Object.const_defined?('Encoding') and Encoding.respond_to?('default_external='))
Encoding.default_external = Encoding.default_internal = "binary"
end
dump = ARGV.shift || usage()
list = ARGV.shift || File.join(File.dirname(__FILE__), "..", "data", "wordlists", "vxworks_collide_20.txt")
$stderr.puts "[*] Loading master password list..."
ohashes = []
hashes = []
File.read(list).split("\n").each do |x|
xid,enc,raw = x.split("|", 3)
xid = xid.to_i
next if raw =~ /invalid/
raw,tmp = raw.split("\x00")
ohashes << [xid, enc, raw]
end
$stderr.puts "[*] Loading memory dump..."
data = File.read(dump)
$stderr.puts "[*] Digging through memory dump..."
hashes = ohashes
tot = hashes.length
cur = 0
hashes.each do |r|
x,k,h = r
cur += 1
pct = cur/tot.to_f
pct = (pct * 100).to_i
$stdout.write(" \r[*] Progress: #{pct}% (#{cur}/#{tot})")
$stdout.flush
next if not data.index(k)
$stdout.write("\n")
$stdout.flush
puts "[+]"
puts "[+] Password hash '#{k}' (##{x}) can be accessed with #{h.unpack("C*").map{|i| "\\x%.2x" % i}} [ '#{h}' ]"
puts "[+]"
end