metasploit-payloads 2.0.119 → 2.0.120
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +1 -2
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.debug.dll +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.debug.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +61 -0
- data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.debug.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.debug.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.debug.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.debug.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +1 -1
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2ff980455249d53eb739d2cc6ebde4973bc3bf647932a6bc529f99e4f627e843
|
4
|
+
data.tar.gz: 1a5d9ba1d7a6cc5f6521b11b8c468b51ea13c2a04bd9b93f903e715ebac0d3de
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5b74e3680e087cb1c25f0fb69fcca0ade906ac587aa22926182c9dad92656346677a0eda6d0a9fd152dbae418e8944be471d9c962ef64bff0bc1f709f25e16fe
|
7
|
+
data.tar.gz: 578453774bcf09f5cd5f413efcd2a898424b2ab74ebc646d0d568276d68f2df9e5fcd9c152f26da08848a6d44d4f714b952bfb8c16270f711ca3b1847d9d282a
|
checksums.yaml.gz.sig
CHANGED
@@ -1,2 +1 @@
|
|
1
|
-
|
2
|
-
��S���g)!�p����#�X��3�ØE��wĪ���Z]%v����!��(1�֍%Kt>C�#�@�C#���C�6ƴ�����w�H)� `���d�ذ\�^��F6����\a;zQ�@Ô��� D��c>f��xjz��"(� L����E�����m]M��m�
|
1
|
+
e:z�GY���e1T�ʊ�����Z}J����%.&�1$��Z9��F5���/���jq�I(H`Kˬ�⦽�/��Q9���8����5��S��m1�hr��Ph���IS�� �0.�M��w�O����J�;�p2�*�����<�D|��/dœ��C?,鑜q?o�B����'~(ߪ�;���F�@(�i�����\�07"�:q�c߀:���.ꈅ�aR}�*��I�Z��C�$l-�ڧ�D�Y'5A��qum~z
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -728,6 +728,7 @@ ERROR_FAILURE = 1
|
|
728
728
|
ERROR_INSUFFICIENT_BUFFER = 0x0000007a
|
729
729
|
ERROR_NOT_SUPPORTED = 0x00000032
|
730
730
|
ERROR_NO_DATA = 0x000000e8
|
731
|
+
ERROR_INVALID_PARAMETER = 87
|
731
732
|
|
732
733
|
# Special return value to match up with Windows error codes for network
|
733
734
|
# errors.
|
@@ -1418,6 +1419,66 @@ def stdapi_sys_process_execute(request, response):
|
|
1418
1419
|
response += tlv_pack(TLV_TYPE_CHANNEL_ID, channel_id)
|
1419
1420
|
return ERROR_SUCCESS, response
|
1420
1421
|
|
1422
|
+
@register_function_if(has_windll)
|
1423
|
+
def stdapi_sys_process_get_info(request, response):
|
1424
|
+
proc_h = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
|
1425
|
+
if not proc_h:
|
1426
|
+
return ERROR_INVALID_PARAMETER, response
|
1427
|
+
|
1428
|
+
MAX_PATH = 260
|
1429
|
+
|
1430
|
+
EnumProcessModules = ctypes.windll.Psapi.EnumProcessModules
|
1431
|
+
EnumProcessModules.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong, ctypes.POINTER(ctypes.c_ulong)]
|
1432
|
+
EnumProcessModules.restype = ctypes.c_long
|
1433
|
+
|
1434
|
+
GetModuleFileNameExW = ctypes.windll.Psapi.GetModuleFileNameExW
|
1435
|
+
GetModuleFileNameExW.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong]
|
1436
|
+
GetModuleFileNameExW.restype = ctypes.c_ulong
|
1437
|
+
|
1438
|
+
GetModuleBaseNameW = ctypes.windll.Psapi.GetModuleBaseNameW
|
1439
|
+
GetModuleBaseNameW.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong]
|
1440
|
+
GetModuleBaseNameW.restype = ctypes.c_ulong
|
1441
|
+
|
1442
|
+
def enum_process_modules(hProcess):
|
1443
|
+
buf_count = 256
|
1444
|
+
while True:
|
1445
|
+
buffer = (ctypes.c_void_p * buf_count)()
|
1446
|
+
buf_size = ctypes.sizeof(buffer)
|
1447
|
+
needed = ctypes.c_ulong()
|
1448
|
+
if not EnumProcessModules(hProcess, ctypes.byref(buffer), buf_size, ctypes.byref(needed)):
|
1449
|
+
raise OSError('EnumProcessModules')
|
1450
|
+
if buf_size < needed.value:
|
1451
|
+
buf_count = needed.value // (buf_size // buf_count)
|
1452
|
+
continue
|
1453
|
+
count = needed.value // (buf_size // buf_count)
|
1454
|
+
return map(ctypes.c_void_p, buffer[:count])
|
1455
|
+
|
1456
|
+
def get_module_name(hProcess, hModule):
|
1457
|
+
base_name_buffer = ctypes.create_unicode_buffer(MAX_PATH)
|
1458
|
+
if not GetModuleBaseNameW(hProcess, hModule, base_name_buffer, MAX_PATH):
|
1459
|
+
raise OSError('GetModuleBaseNameW')
|
1460
|
+
return base_name_buffer.value
|
1461
|
+
|
1462
|
+
def get_module_filename(hProcess, hModule):
|
1463
|
+
buffer = ctypes.create_unicode_buffer(MAX_PATH)
|
1464
|
+
nSize = ctypes.c_ulong(MAX_PATH)
|
1465
|
+
if not GetModuleFileNameExW(hProcess, hModule, ctypes.byref(buffer), nSize):
|
1466
|
+
raise OSError('GetModuleFileNameExW')
|
1467
|
+
return buffer.value
|
1468
|
+
|
1469
|
+
try:
|
1470
|
+
for hModule in enum_process_modules(proc_h):
|
1471
|
+
module_name = get_module_name(proc_h, hModule)
|
1472
|
+
module_filename = get_module_filename(proc_h, hModule)
|
1473
|
+
response += tlv_pack(TLV_TYPE_PROCESS_NAME, module_name)
|
1474
|
+
response += tlv_pack(TLV_TYPE_PROCESS_PATH, module_filename)
|
1475
|
+
break
|
1476
|
+
except OSError as error:
|
1477
|
+
debug_print('[-] method stdapi_sys_process_get_info failed on: ' + str(error))
|
1478
|
+
return error_result_windows(), response
|
1479
|
+
|
1480
|
+
return ERROR_SUCCESS, response
|
1481
|
+
|
1421
1482
|
@register_function
|
1422
1483
|
def stdapi_sys_process_getpid(request, response):
|
1423
1484
|
response += tlv_pack(TLV_TYPE_PID, os.getpid())
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
metadata.gz.sig
CHANGED
Binary file
|