metasploit-payloads 2.0.131 → 2.0.133

Sign up to get free protection for your applications and to get access to all the features.
Files changed (80) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
  7. data/data/meterpreter/dump_sam.x64.dll +0 -0
  8. data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
  9. data/data/meterpreter/dump_sam.x86.dll +0 -0
  10. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  11. data/data/meterpreter/elevator.x64.dll +0 -0
  12. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  13. data/data/meterpreter/elevator.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  51. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  52. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  53. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  54. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.py +38 -0
  57. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  65. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  66. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  67. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  68. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  69. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  70. data/data/meterpreter/metsrv.x64.dll +0 -0
  71. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  72. data/data/meterpreter/metsrv.x86.dll +0 -0
  73. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  74. data/data/meterpreter/screenshot.x64.dll +0 -0
  75. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  76. data/data/meterpreter/screenshot.x86.dll +0 -0
  77. data/lib/metasploit-payloads/version.rb +1 -1
  78. data.tar.gz.sig +0 -0
  79. metadata +2 -2
  80. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ca634b3a2e09af50dc38a582976c3d7b2caa73db7b5fd88a0bb843b83402973c
4
- data.tar.gz: 6e96fb4598fd66ca45267d2745ec1639fb8f337c607d2511aa3302dec84f6c34
3
+ metadata.gz: ee40d97b7e999180028da36ad8294f14f5574b93cd33ac5effa3888ef27ec0fb
4
+ data.tar.gz: 8593cbe877b56280e8e204933779072054bed32c653d7ed3066f0782892c18e5
5
5
  SHA512:
6
- metadata.gz: 9665ef8d86c0f4687e0473c6873ced36fc8b30eda3be698c13f4a87e72cd3fed4e84adfbee3209d51ac8755d98e56acf2af229b5b214dcc7d408f578aeee49c0
7
- data.tar.gz: ffdf1bd7ed242fa90d6dcd8d6af9c5257804c8730b3e63e2845459a83fc21cbba5706b5e1d1419089afa56f9e110b3aff72d4a14dccbd4a31a4451a86efc2ddb
6
+ metadata.gz: aa7d84f87710d144873fcc793e1a0ccb5c2d1164bcc484f349ee40a1cb67d567fe11612956e09883f9c9edb1e8f781945984b68b17d6b5a87d1d52f8254de747
7
+ data.tar.gz: 11d019ba5d70372a7aff70726a82ac9770b3e372394d6c241219b46c238f68f876d8bd00700eb323f53e546ce6468facbb975f332945ac672a9c2d5d54272f7a
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -399,6 +399,18 @@ if has_ctypes:
399
399
  ('dwType', ctypes.c_uint32)
400
400
  ]
401
401
 
402
+ class MEMORY_BASIC_INFORMATION(ctypes.Structure):
403
+ _fields_ = [
404
+ ('BaseAddress', ctypes.c_void_p),
405
+ ('AllocationBase', ctypes.c_void_p),
406
+ ('AllocationProtect', ctypes.c_ulong),
407
+ ('PartitionId', ctypes.c_ushort),
408
+ ('RegionSize', ctypes.c_size_t),
409
+ ('State', ctypes.c_ulong),
410
+ ('Protect', ctypes.c_ulong),
411
+ ('Type', ctypes.c_ulong)
412
+ ]
413
+
402
414
 
403
415
  #
404
416
  # Linux Structures
@@ -1727,6 +1739,32 @@ def stdapi_sys_process_memory_protect(request, response):
1727
1739
  response += tlv_pack(TLV_TYPE_PROTECTION, old_prot.value)
1728
1740
  return ERROR_SUCCESS, response
1729
1741
 
1742
+ @register_function_if(has_windll)
1743
+ def stdapi_sys_process_memory_query(request, response):
1744
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1745
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1746
+
1747
+ if not handle:
1748
+ return ERROR_INVALID_PARAMETER, response
1749
+
1750
+ VirtualQueryEx = ctypes.windll.kernel32.VirtualQueryEx
1751
+ VirtualQueryEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.POINTER(MEMORY_BASIC_INFORMATION), ctypes.c_size_t]
1752
+ VirtualQueryEx.restype = ctypes.c_size_t
1753
+
1754
+ info = MEMORY_BASIC_INFORMATION()
1755
+ size = VirtualQueryEx(handle, base, ctypes.byref(info), ctypes.sizeof(info))
1756
+ if size == 0:
1757
+ return error_result_windows(), response
1758
+
1759
+ response += tlv_pack(TLV_TYPE_BASE_ADDRESS, info.BaseAddress or 0)
1760
+ response += tlv_pack(TLV_TYPE_ALLOC_BASE_ADDRESS, info.AllocationBase or 0)
1761
+ response += tlv_pack(TLV_TYPE_ALLOC_PROTECTION, info.AllocationProtect)
1762
+ response += tlv_pack(TLV_TYPE_LENGTH, info.RegionSize)
1763
+ response += tlv_pack(TLV_TYPE_MEMORY_STATE, info.State)
1764
+ response += tlv_pack(TLV_TYPE_PROTECTION, info.Protect)
1765
+ response += tlv_pack(TLV_TYPE_MEMORY_TYPE, info.Type)
1766
+ return ERROR_SUCCESS, response
1767
+
1730
1768
  @register_function_if(has_windll)
1731
1769
  def stdapi_sys_process_memory_free(request, response):
1732
1770
  handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.131'
3
+ VERSION = '2.0.133'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.131
4
+ version: 2.0.133
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-05-08 00:00:00.000000000 Z
99
+ date: 2023-05-23 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file