metasploit-payloads 2.0.130 → 2.0.132

Sign up to get free protection for your applications and to get access to all the features.
Files changed (80) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
  7. data/data/meterpreter/dump_sam.x64.dll +0 -0
  8. data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
  9. data/data/meterpreter/dump_sam.x86.dll +0 -0
  10. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  11. data/data/meterpreter/elevator.x64.dll +0 -0
  12. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  13. data/data/meterpreter/elevator.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  51. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  52. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  53. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  54. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.py +58 -0
  57. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  65. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  66. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  67. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  68. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  69. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  70. data/data/meterpreter/metsrv.x64.dll +0 -0
  71. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  72. data/data/meterpreter/metsrv.x86.dll +0 -0
  73. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  74. data/data/meterpreter/screenshot.x64.dll +0 -0
  75. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  76. data/data/meterpreter/screenshot.x86.dll +0 -0
  77. data/lib/metasploit-payloads/version.rb +1 -1
  78. data.tar.gz.sig +0 -0
  79. metadata +2 -2
  80. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: b7343e2a98f492c31a8149b0e481e3ad5bc6a0a5d05b7750bc01e3fb949cdf3f
4
- data.tar.gz: 5f66820ae6ca9ee7b26a3e3770a5b99d96f2d5f2378c05ba84e48cf19518fb57
3
+ metadata.gz: 559757f61ec18a934889d2b8095e6d9a9c3f9c132189d5a4401499b704231baa
4
+ data.tar.gz: 4d8b7cea9544df45f6e52ea082cd19d5ada8f762b5d713dae1a13b6b8909832b
5
5
  SHA512:
6
- metadata.gz: 968b273687ea2c30f8a62582067f83f50111340c30e34dacc3d5a65366573f3785e1d858afb333b846dfdfdaaccda2a3952067b69267850f7b1d48ffe287809e
7
- data.tar.gz: 1b4553d09dbdcd84423f8694b8e9f8f499584eac815c0af8f8e16eace16d10de7745686d2bcf1888809ba32abf67ad70a8d727b49b090666e1900c1857b37456
6
+ metadata.gz: c28466b89b33cdc90545dc9164acdfa88517aa48f81eba2c8957c9b961579d941fb1e997566838c961e0883488d1bfcd1480b93ec6b515c904cfca5696c4a888
7
+ data.tar.gz: b951535ad1a00aada9eca43c8f58059c0468337171b36ed418c37017b3e290788d1259d4c378375eb2fc2875a86c660caeb6351029572131e80cd39dab4a2185
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -399,6 +399,18 @@ if has_ctypes:
399
399
  ('dwType', ctypes.c_uint32)
400
400
  ]
401
401
 
402
+ class MEMORY_BASIC_INFORMATION(ctypes.Structure):
403
+ _fields_ = [
404
+ ('BaseAddress', ctypes.c_void_p),
405
+ ('AllocationBase', ctypes.c_void_p),
406
+ ('AllocationProtect', ctypes.c_ulong),
407
+ ('PartitionId', ctypes.c_ushort),
408
+ ('RegionSize', ctypes.c_size_t),
409
+ ('State', ctypes.c_ulong),
410
+ ('Protect', ctypes.c_ulong),
411
+ ('Type', ctypes.c_ulong)
412
+ ]
413
+
402
414
 
403
415
  #
404
416
  # Linux Structures
@@ -1707,6 +1719,52 @@ def stdapi_sys_process_memory_write(request, response):
1707
1719
  response += tlv_pack(TLV_TYPE_LENGTH, written.value)
1708
1720
  return ERROR_SUCCESS, response
1709
1721
 
1722
+ @register_function_if(has_windll)
1723
+ def stdapi_sys_process_memory_protect(request, response):
1724
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1725
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1726
+ size = packet_get_tlv(request, TLV_TYPE_LENGTH).get('value')
1727
+ prot = packet_get_tlv(request, TLV_TYPE_PROTECTION).get('value')
1728
+
1729
+ if not (handle and base and size):
1730
+ return ERROR_INVALID_PARAMETER, response
1731
+
1732
+ VirtualProtectEx = ctypes.windll.kernel32.VirtualProtectEx
1733
+ VirtualProtectEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.c_ulong, ctypes.c_void_p]
1734
+ VirtualProtectEx.restype = ctypes.c_long
1735
+
1736
+ old_prot = ctypes.c_ulong()
1737
+ if not VirtualProtectEx(handle, base, size, prot, ctypes.byref(old_prot)):
1738
+ return error_result_windows(), response
1739
+ response += tlv_pack(TLV_TYPE_PROTECTION, old_prot.value)
1740
+ return ERROR_SUCCESS, response
1741
+
1742
+ @register_function_if(has_windll)
1743
+ def stdapi_sys_process_memory_query(request, response):
1744
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1745
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1746
+
1747
+ if not handle:
1748
+ return ERROR_INVALID_PARAMETER, response
1749
+
1750
+ VirtualQueryEx = ctypes.windll.kernel32.VirtualQueryEx
1751
+ VirtualQueryEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.POINTER(MEMORY_BASIC_INFORMATION), ctypes.c_size_t]
1752
+ VirtualQueryEx.restype = ctypes.c_size_t
1753
+
1754
+ info = MEMORY_BASIC_INFORMATION()
1755
+ size = VirtualQueryEx(handle, base, ctypes.byref(info), ctypes.sizeof(info))
1756
+ if size == 0:
1757
+ return error_result_windows(), response
1758
+
1759
+ response += tlv_pack(TLV_TYPE_BASE_ADDRESS, info.BaseAddress or 0)
1760
+ response += tlv_pack(TLV_TYPE_ALLOC_BASE_ADDRESS, info.AllocationBase or 0)
1761
+ response += tlv_pack(TLV_TYPE_ALLOC_PROTECTION, info.AllocationProtect)
1762
+ response += tlv_pack(TLV_TYPE_LENGTH, info.RegionSize)
1763
+ response += tlv_pack(TLV_TYPE_MEMORY_STATE, info.State)
1764
+ response += tlv_pack(TLV_TYPE_PROTECTION, info.Protect)
1765
+ response += tlv_pack(TLV_TYPE_MEMORY_TYPE, info.Type)
1766
+ return ERROR_SUCCESS, response
1767
+
1710
1768
  @register_function_if(has_windll)
1711
1769
  def stdapi_sys_process_memory_free(request, response):
1712
1770
  handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.130'
3
+ VERSION = '2.0.132'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.130
4
+ version: 2.0.132
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-04-27 00:00:00.000000000 Z
99
+ date: 2023-05-15 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file