-
Notifications
You must be signed in to change notification settings - Fork 14.7k
Added module auxiliary/admin/cisco/cisco_asa_extrabacon #7359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This module patches the authentication functions of a Cisco ASA to allow uncredentialed logins. Uses improved shellcode for payload.
This version of the ASA is patched and our offsets do not work currently. We may do more work on this to find a solution.
Add module docs, credit
…co/cisco_asa_extrabacon
|
Thanks! |
|
@zerosum0x0 @bcook-r7 I've tested the module against my vuln-device, but no good luck. |
|
RiskSense-Ops/CVE-2016-6366 also fails to exploit the vuln-device. |
Please check my pcap - cisco_asa-CVE-2016-6366.zip |
|
@nixawk we tested it against SSH on 9.2(1) and verified it worked originally. I will reload that version in about 1 hour and re-test. We have never tested against telnet, but from my understanding it uses the same authentication functions that the shellcode patches. It isn't crashing the ASA, which means the shellcode should actually be doing something and the offsets are correct. Going forward I may experiment with reverse TCP shelling it directly with the shellcode. I've read it's not a straightforward payload for ASA devices but it seems to have standard Linux syscalls? We have 82 bytes to play with, which should be plenty. If we need more it will have to calculate offset to the third stage, use an egg hunter, or perhaps just overflow a couple more stack frames and do extra cleanup. Problem with calculating to third stage is even Equation Group code seems unstable. Worked for me on 8.4(3) but not 8.2(3). |
|
@nixawk we tested and confirmed both the Metasploit module and ExtraBacon 2.0 Python code worked on 9.2(1) for both SSH and Telnet. Can you extract the lina file and run lina-offsets.py on it and see if the offsets match? 9.2.1.ED
|
|
@bcook-r7 please write release notes! |
Release NotesThis module implements the EXTRABACON exploit for Cisco ASA VPN appliances. The exploit works by disabling authentication remotely via a specially-crafted SNMP packet. This was originally part of the Equation Group disclosure made by Shadow Brokers. It supports a variety of firmware versions from 8.x to 9.x. |
This includes @bcook-r7 pull request for module documentation and credit to @wwebb-r7
Also is a new feature branch as requested.
Closed PR #7353