-
Notifications
You must be signed in to change notification settings - Fork 13.9k
/
corpwatch_lookup_name.rb
140 lines (112 loc) · 3.58 KB
/
corpwatch_lookup_name.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
require 'rexml/document'
class Metasploit3 < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'CorpWatch Company Name Information Search',
'Description' => %q{
This module interfaces with the CorpWatch API to get publicly available
info for a given company name. Please note that by using CorpWatch API, you
acknolwdge the limitations of the data CorpWatch provides, and should always
verify the information with the official SEC filings before taking any action.
},
'Author' => [ 'Brandon Perry <bperry.volatile[at]gmail.com>' ],
'References' =>
[
[ 'URL', 'http://api.corpwatch.org/' ]
]
))
register_options(
[
OptString.new('COMPANY_NAME', [ true, "Search for companies with this name", ""]),
OptString.new('YEAR', [ false, "Limit results to a specific year", ""]),
OptString.new('LIMIT', [ true, "Limit the number of results returned", "5"]),
OptString.new('CORPWATCH_APIKEY', [ false, "Use this API key when getting the data", ""]),
], self.class)
deregister_options('RHOST', 'RPORT', 'Proxies', 'VHOST')
end
def cleanup
datastore['RHOST'] = @old_rhost
datastore['RPORT'] = @old_rport
end
def run
# Save the original rhost/rport in case the user was exploiting something else
@old_rhost = datastore['RHOST']
@old_rport = datastore['RPORT']
# Initial api.corpwatch.org's rhost and rport for HttpClient
datastore['RHOST'] = 'api.corpwatch.org'
datastore['RPORT'] = 80
uri = "/"
uri << (datastore['YEAR'] + "/") if datastore['YEAR'] != ""
uri << "companies.xml"
res = send_request_cgi(
{
'uri' => uri,
'method' => 'GET',
'vars_get' =>
{
'company_name' => datastore['COMPANY_NAME'],
'limit' => datastore['LIMIT'],
'key' => datastore['CORPWATCH_APIKEY']
}
}, 25)
if not res
print_error("Server down, bad response")
return
end
begin
doc = REXML::Document.new(res.body)
rescue
print_error("Body not well formed XML")
return
end
root = doc.root
if not root
print_error("document root nil")
return
end
elements = root.get_elements("result")
if not elements
print_error("Document root has no results")
return
end
results = elements[0]
if not results
print_error("No results returned, try another search")
return
end
elements = results.get_elements("companies")
if not elements
print_error("No companies returned")
return
end
results = elements[0]
return if not results.elements || results.elements.length == 0
results.elements.each { |e|
cwid = grab_text(e, "cw_id")
company_name = grab_text(e, "company_name")
address = grab_text(e, "raw_address")
sector = grab_text(e, "sector_name")
industry = grab_text(e, "industry_name")
print_status("Company Information\n---------------------------------")
print_status("CorpWatch (cw) ID): " + cwid)
print_status("Company Name: " + company_name)
print_status("Address: " + address)
print_status("Sector: " + sector)
print_status("Industry: " + industry)
}
end
def grab_text(e, name)
(e.get_elements(name) && e.get_elements(name)[0] &&
e.get_elements(name)[0].get_text ) ?
e.get_elements(name)[0].get_text.to_s : ""
end
end