my_redis
。☁ ~ docker run -it -p 6379:6379 redis:latest
root@082845d25224:/bin# redis-cli -h 127.0.0.1 -p 6379
127.0.0.1:6379> keys *
(empty array)
127.0.0.1:6379> config get requirepass
1) "requirepass"
2) ""
127.0.0.1:6379> config set requirepass my_redis
OK
127.0.0.1:6379> config get requirepass
1) "requirepass"
2) "my_redis"
C:\\Users\\FireEye\\.rdm\\connections.json
[
{
"auth": "my_redis",
"cluster_host_override": true,
"db_scan_limit": 20,
"host": "10.168.1.201",
"keys_pattern": "*",
"name": "T",
"namespace_separator": ":",
"port": 6379,
"ssh_agent_path": "",
"ssh_password": "",
"ssh_private_key_path": "",
"ssl_ignore_all_errors": false,
"timeout_connect": 60000,
"timeout_execute": 60000,
"username": "A" //这个是我加上去测试的
}
]
ProfileDir
这个是userprofile中的键,详细可以看我写的模块编写文章中的获取用户配置,调试看到就是这样的:[1] pry(#<Msf::Modules::Post__Windows__Gather__Credentials__Rdm::MetasploitModule>)> userprofile
=> {"SID"=>"S-1-5-21-1546888072-418879536-4029880489-1001",
"ProfileDir"=>"C:\\\\Users\\\\FireEye",
"AppData"=>"C:\\\\Users\\\\FireEye\\\\AppData\\\\Roaming",
"LocalAppData"=>"C:\\\\Users\\\\FireEye\\\\AppData\\\\Local",
"LocalSettings"=>nil,
"Desktop"=>"C:\\\\Users\\\\FireEye\\\\Desktop",
"MyDocs"=>"C:\\\\Users\\\\FireEye\\\\Documents",
"Favorites"=>"C:\\\\Users\\\\FireEye\\\\Favorites",
"History"=>"C:\\\\Users\\\\FireEye\\\\AppData\\\\Local\\\\Microsoft\\\\Windows\\\\History",
"Cookies"=>"C:\\\\Users\\\\FireEye\\\\AppData\\\\Roaming\\\\Microsoft\\\\Windows\\\\Cookies",
"Temp"=>"C:\\\\Users\\\\FireEye\\\\AppData\\\\Local\\\\Temp\\x00",
"Path"=>
"C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\openjdk\\\\current\\\\bin;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\yarn\\\\current\\\\global\\\\node_modules\\\\.bin;C:\\\\Users\\\\FireEye\\\\scoop\\
\\apps\\\\yarn\\\\current\\\\Yarn\\\\bin;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\nodejs\\\\current\\\\bin;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\nodejs\\\\current;C:\\\\Users\\\\FireEye\\\\scoo
p\\\\apps\\\\python\\\\current\\\\Scripts;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\python\\\\current;C:\\\\Users\\\\FireEye\\\\go\\\\bin;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\gcc\\\\current\\\\b
in;C:\\\\Users\\\\FireEye\\\\scoop\\\\apps\\\\openssl\\\\current\\\\bin;C:\\\\Users\\\\FireEye\\\\scoop\\\\shims;C:\\\\Users\\\\FireEye\\\\AppData\\\\Roaming\\\\Python\\\\Python39\\\\Scripts;C:\\\\
Users\\\\FireEye\\\\AppData\\\\Roaming\\\\npm;C:\\\\Program Files\\\\Azure Data Studio\\\\bin\\x00",
"UserName"=>"FireEye",
"Domain"=>"WIN-79MR8QJM50N"}
{
application: 'redis_desktop_manager',
app_category: 'redis',
gatherable_artifacts: [
{
filetypes: 'logins',
path: 'ProfileDir',//上面说的用户路径
dir: '.rdm', //软件配置文件夹
artifact_file_name: 'connections.json',//保存了密码的文件
description: "RedisDesktopManager's saved Username and Password ",
credential_type: 'json',
json_search: [
{
json_parent: "",
json_children: [// 要提取的键
"['name']",
"['username']",
"['auth']",
"['host']",
"['port']",
]
}
]
}
]
}
https://github.com/rapid7/metasploit-framework/pull/17006