exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Filing Protocol Info Enumerator

Apple Filing Protocol Info Enumerator
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module fetches AFP server information, including server name, network address, supported AFP versions, signature, machine type, and server flags.

tags | exploit
SHA-256 | fa285f0ece1b7557f8c6693480b99cb497d29fa7e9f0adb133487c6bccde6227

Apple Filing Protocol Info Enumerator

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
include Msf::Exploit::Remote::AFP

def initialize(info={})
super(update_info(info,
'Name' => 'Apple Filing Protocol Info Enumerator',
'Description' => %q{
This module fetches AFP server information, including server name,
network address, supported AFP versions, signature, machine type,
and server flags.
},
'References' =>
[
[ 'URL', 'https://web.archive.org/web/20130309051753/https://developer.apple.com/library/mac/#documentation/Networking/Reference/AFP_Reference/Reference/reference.html' ]
],
'Author' => [ 'Gregory Man <man.gregory[at]gmail.com>' ],
'License' => MSF_LICENSE
))
end

def run_host(ip)
print_status("AFP #{ip} Scanning...")
begin
connect
response = get_info
report(response)
rescue ::Timeout::Error
rescue ::Interrupt
raise $!
rescue ::Rex::ConnectionError, ::IOError, ::Errno::ECONNRESET, ::Errno::ENOPROTOOPT
rescue ::Exception
raise $!
print_error("AFP #{rhost}:#{rport} #{$!.class} #{$!}")
ensure
disconnect
end
end

def report(response)
report_info = "AFP #{rhost}:#{rport} Server Name: #{response[:server_name]} \n" +
"AFP #{rhost}:#{rport} Server Flags: \n" +
format_flags_report(response[:server_flags]) +
"AFP #{rhost}:#{rport} Machine Type: #{response[:machine_type]} \n" +
"AFP #{rhost}:#{rport} AFP Versions: #{response[:versions].join(', ')} \n" +
"AFP #{rhost}:#{rport} UAMs: #{response[:uams].join(', ')}\n" +
"AFP #{rhost}:#{rport} Server Signature: #{response[:signature]}\n" +
"AFP #{rhost}:#{rport} Server Network Address: \n" +
format_addresses_report(response[:network_addresses]) +
"AFP #{rhost}:#{rport} UTF8 Server Name: #{response[:utf8_server_name]}"


lines = "AFP #{rhost}:#{rport}:#{rport} AFP:\n#{report_info}"

lines.split(/\n/).each do |line|
print_status(line)
end

report_note(:host => datastore['RHOST'],
:proto => 'tcp',
:port => datastore['RPORT'],
:type => 'afp_server_info',
:data => response)

report_service(
:host => datastore['RHOST'],
:port => datastore['RPORT'],
:proto => 'tcp',
:name => "afp",
:info => "AFP name: #{response[:utf8_server_name]}, Versions: #{response[:versions].join(', ')}"
)

end

def format_flags_report(parsed_flags)
report = ''
parsed_flags.each do |flag, val|
report << "AFP #{rhost}:#{rport} * #{flag}: #{val.to_s} \n"
end
return report
end

def format_addresses_report(parsed_network_addresses)
report = ''
parsed_network_addresses.each do |val|
report << "AFP #{rhost}:#{rport} * #{val.to_s} \n"
end
return report
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close