Skip to content

Commit

Permalink
Merge branch 'develop'
Browse files Browse the repository at this point in the history
  • Loading branch information
JonnyHightower committed Aug 7, 2014
2 parents 5dfd4ed + 35e1d49 commit a56e320
Show file tree
Hide file tree
Showing 6 changed files with 18 additions and 22 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.1.4
1.1.5
4 changes: 2 additions & 2 deletions content/FTP/FTP.gsm
Original file line number Diff line number Diff line change
Expand Up @@ -145,15 +145,15 @@ sub activate {

if ($login){
my $message="FTP Host supports anonymous login with $u:$p";
#$MainScan->StoreGuessedPassword($target,"vuln", "FTP","$u","$p","GSM-FTP-1",$message);
# Instead of storing it in a flat file, use the credential manager
$MainScan->RecordVulnerability($target, "GSM-FTP-1", $message);
$credentialManager->addCredential(
'type' => 'fto',
'user' => "$u",
'pass' => "$p",
'system' => "$host",
'comment' => uc($protocol) . "/$port (GSM:$name)"
);

}

#>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>
Expand Down
9 changes: 7 additions & 2 deletions content/LDAP/LDAP.gsm
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ sub activate {
my @credentials = $MainScan->ReadFile($credentialsFile);
my @success;
# Iterate over the credentials and test them
my $i=0;
my ($compromised,$i)=(0,0);
for my $credential (@credentials){
# Skip lines that begin with whitespace
next if ($credential =~ /^\s/);
Expand All @@ -238,7 +238,7 @@ sub activate {
}
close $F;
}
my $message="LDAP server found with default credentials.";
$compromised=1;
#$MainScan->StoreGuessedPassword($target, "vuln", "LDAP", "$user", "$pass", "GSM-LDAP-2", $message);
# Instead of storing it in a flat file, use the credential manager
my $comment = uc($protocol) . "/$port (GSM:$name)";
Expand All @@ -254,6 +254,11 @@ sub activate {
push @success, $credential;
}

if ($compromised){
my $message="LDAP server found with default credentials.";
$MainScan->RecordVulnerability($target, "GSM-LDAP-1", $message);
}

if ($namingContext){
$MainScan->SetListItem("$outputDir/hostInfo.txt","LDAPNamingContext: $namingContext");
}
Expand Down
20 changes: 4 additions & 16 deletions content/Oracle/Oracle.gsm
Original file line number Diff line number Diff line change
Expand Up @@ -198,9 +198,6 @@ sub activate {
$accounts++;
$data{"$SID"}{'accounts'}=$accounts;
$compromised=1;
my $message="Logged into Oracle database SID $SID with $user:$pass";
#$MainScan->StoreGuessedPassword($target,"vuln", "Oracle","${SID}|$user","$pass","GSM-Oracle-1",$message);
# Instead of storing it in a flat file, use the credential manager
$credentialManager->addCredential(
'type' => 'oracle',
'user' => "$user",
Expand All @@ -212,19 +209,10 @@ sub activate {
}
}

## List the SIDs with compromised accounts
#if ($compromised && open(ORA,">${outputDir}/oracleAccounts-${port}.txt")){
# for my $sid (keys(%data)){
# print ORA "*** SID: $sid ***\n";
# my $accounts=$data{"$sid"}{'accounts'};
# for (my $a=0; $a<$accounts; $a++){
# my $user=$data{"$sid"}{'user'}{$a};
# my $pass=$data{"$sid"}{'pass'}{$a};
# print ORA "$user:$pass\n";
# }
# }
# close ORA;
#}
if ($compromised){
my $message="Logged into Oracle database SID $SID - run \"accounts\" to view credentials.";
$MainScan->RecordVulnerability($target, "GSM-Oracle-1", $message);
}
}

#>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>
Expand Down
3 changes: 3 additions & 0 deletions content/SSH/SSH.gsm
Original file line number Diff line number Diff line change
Expand Up @@ -211,6 +211,9 @@ sub activate {
'system' => "$host",
'comment' => uc($protocol) . "/$port (GSM:$name)"
);

my $message="Logged in as $username password $password";
$MainScan->RecordCompromise($target, "GSM-SSH-1", $message);
last;
}
}
Expand Down
2 changes: 1 addition & 1 deletion content/VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.1.4
1.1.5

0 comments on commit a56e320

Please sign in to comment.