metasploit-payloads 2.0.126 → 2.0.128

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +44 -0
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: df7977356870e07734e7966d9a4554ec9dbc37d98e2dad01b2c114107bd4d24a
4
- data.tar.gz: 49853fb0888a775e199c37594cee72b17972eeadc5214e6487db510815ef9334
3
+ metadata.gz: 041f380f68dfb49e3ec0a63ca63d59174d8390a4d34b863640fd7eeff94c486f
4
+ data.tar.gz: 15b20fa5eedfb5516acd6fe6a83dfe3bcfa97c09dd8d76a4cf43d03f092d6cc3
5
5
  SHA512:
6
- metadata.gz: 5afc58a2e3de26f20429dd49054406b28d6cdd80bfc722ac5513c30b7b86460957c8897b1c736c7a625ba6b08c7d93427cc6b4ec1ee5e86ce825d469211af1c5
7
- data.tar.gz: 1908449c6cc0bfb151f953df462fa8434bcbb72bac0ca31249190145516c94b4a632b5e805c67009b4a21ca4bee3a3678d445d033c8a9207680690fef834124f
6
+ metadata.gz: b459d3adf1c68ac866848794bce3945850645f661e2ca9a06ca9c4d35e3b53e3ef70f5b3c5ad4a72003f0758c6e1ad758a257ae00b45f0be3f11ae6d5e3a7e2f
7
+ data.tar.gz: 9b82b7a90b6ba6e2689564c89fbeac9a6bc16c991360f069ca4af63231d1ee301296c169bce285eaab431756a90c61e2f22033e0d020561e586548c81894a9b7
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1663,6 +1663,50 @@ def stdapi_sys_process_memory_unlock(request, response):
1663
1663
  return error_result_windows(), response
1664
1664
  return ERROR_SUCCESS, response
1665
1665
 
1666
+ @register_function_if(has_windll)
1667
+ def stdapi_sys_process_memory_read(request, response):
1668
+ ERROR_PARTIAL_COPY = 229
1669
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1670
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1671
+ size = packet_get_tlv(request, TLV_TYPE_LENGTH).get('value')
1672
+
1673
+ if not (handle and base and size):
1674
+ return ERROR_INVALID_PARAMETER, response
1675
+
1676
+ ReadProcessMemory = ctypes.windll.kernel32.ReadProcessMemory
1677
+ ReadProcessMemory.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.POINTER(ctypes.c_size_t)]
1678
+ ReadProcessMemory.restype = ctypes.c_bool
1679
+
1680
+ buffer = ctypes.create_string_buffer(size)
1681
+ bytes_read = ctypes.c_size_t(0)
1682
+ if (not ReadProcessMemory(handle, base, ctypes.byref(buffer), ctypes.sizeof(buffer), ctypes.byref(bytes_read))) and (ctypes.windll.kernel32.GetLastError() != ERROR_PARTIAL_COPY):
1683
+ return error_result_windows(), response
1684
+
1685
+ readed_data = buffer.raw[:bytes_read.value]
1686
+ response += tlv_pack(TLV_TYPE_PROCESS_MEMORY, readed_data)
1687
+ return ERROR_SUCCESS, response
1688
+
1689
+ @register_function_if(has_windll)
1690
+ def stdapi_sys_process_memory_write(request, response):
1691
+ ERROR_PARTIAL_COPY = 229
1692
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1693
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1694
+ data = packet_get_tlv(request, TLV_TYPE_PROCESS_MEMORY).get('value')
1695
+
1696
+ if not (handle and base and data):
1697
+ return ERROR_INVALID_PARAMETER, response
1698
+
1699
+ WriteProcessMemory = ctypes.windll.kernel32.WriteProcessMemory
1700
+ WriteProcessMemory.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.POINTER(ctypes.c_size_t)]
1701
+ WriteProcessMemory.restype = ctypes.c_bool
1702
+
1703
+ written = ctypes.c_size_t(0)
1704
+ if (not WriteProcessMemory(handle, base, data, len(data), ctypes.byref(written))) and (ctypes.windll.kernel32.GetLastError() != ERROR_PARTIAL_COPY):
1705
+ return error_result_windows(), response
1706
+
1707
+ response += tlv_pack(TLV_TYPE_LENGTH, written.value)
1708
+ return ERROR_SUCCESS, response
1709
+
1666
1710
  @register_function_if(has_windll)
1667
1711
  def stdapi_sys_process_memory_free(request, response):
1668
1712
  handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.126'
3
+ VERSION = '2.0.128'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.126
4
+ version: 2.0.128
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-04-19 00:00:00.000000000 Z
99
+ date: 2023-04-26 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file