metasploit-payloads 2.0.135 → 2.0.137

Sign up to get free protection for your applications and to get access to all the features.
Files changed (80) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
  7. data/data/meterpreter/dump_sam.x64.dll +0 -0
  8. data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
  9. data/data/meterpreter/dump_sam.x86.dll +0 -0
  10. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  11. data/data/meterpreter/elevator.x64.dll +0 -0
  12. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  13. data/data/meterpreter/elevator.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  51. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  52. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  53. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  54. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.py +10 -8
  57. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  65. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  66. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  67. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  68. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  69. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  70. data/data/meterpreter/metsrv.x64.dll +0 -0
  71. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  72. data/data/meterpreter/metsrv.x86.dll +0 -0
  73. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  74. data/data/meterpreter/screenshot.x64.dll +0 -0
  75. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  76. data/data/meterpreter/screenshot.x86.dll +0 -0
  77. data/lib/metasploit-payloads/version.rb +1 -1
  78. data.tar.gz.sig +0 -0
  79. metadata +2 -2
  80. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6b194cc5668e98b64155b3c40cef48d415c67878fbd6d8c7575f17db81e7d5c5
4
- data.tar.gz: 8838bf9c6c7dcbb4f4b08fd24bf37fb02abb20bbef6701c984e0f8282f9662a9
3
+ metadata.gz: e2710a15097fc270b4471dea272eb303035dcab535ec793e329d0fdb3c3337fd
4
+ data.tar.gz: 3042209c7939928007790905a7e9bdb07e994296976217366b6a987a10349673
5
5
  SHA512:
6
- metadata.gz: 5e70585045dfeb608c7417bda311236b59ba88eaba9f0d979ab09b45e3a8ad67575f8096653f62a8a827ee0f3a5c5806833a437a379df384e602ba4bf9d44eaa
7
- data.tar.gz: e8033efee117c1ceb4c8c1c90b57a7855e48a54dadefe1b96a44253b4c562048196a050f9de57e44ad0820103c60be2eaf8168a21de1bb55f6f4382fc586147e
6
+ metadata.gz: dd3953605d7c31b56d492fdbc708e4f5b61b2fe35bb1b0c5fc1dd7f16084aaa23d83ce96fed4ddb8a1395f5a3a6f2ea91577ea77dd1ecf8efdbf3b31dd6b44b9
7
+ data.tar.gz: 25bddc59e5b1617afdf98a731d25b6d2a7692917517954f5ea1c882894dd40f4a66353fa08c61919b814bab1b6ea7b81ef9f0bf87a8b14622b4f4e4d86527269
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -2188,8 +2188,8 @@ def stdapi_net_config_get_interfaces(request, response):
2188
2188
  iface_tlv += tlv_pack(TLV_TYPE_MAC_ADDRESS, iface_info.get('hw_addr', '\x00\x00\x00\x00\x00\x00'))
2189
2189
  if 'mtu' in iface_info:
2190
2190
  iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_MTU, iface_info['mtu'])
2191
- if 'flags' in iface_info:
2192
- iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['flags'])
2191
+ if 'flags_str' in iface_info:
2192
+ iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['flags_str'])
2193
2193
  iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_INDEX, iface_info['index'])
2194
2194
  for address in iface_info.get('addrs', []):
2195
2195
  iface_tlv += tlv_pack(TLV_TYPE_IP, address[1])
@@ -2224,7 +2224,8 @@ def stdapi_net_config_get_interfaces_via_netlink():
2224
2224
  for flag in iface_flags_sorted:
2225
2225
  if (iface.flags & flag):
2226
2226
  flags.append(iface_flags[flag])
2227
- iface_info['flags'] = ' '.join(flags)
2227
+ iface_info['flags'] = iface.flags
2228
+ iface_info['flags_str'] = ' '.join(flags)
2228
2229
  cursor = ctypes.sizeof(IFINFOMSG)
2229
2230
  while cursor < len(res_data):
2230
2231
  attribute = ctstruct_unpack(RTATTR, res_data[cursor:])
@@ -2271,19 +2272,20 @@ def stdapi_net_config_get_interfaces_via_osx_ifconfig():
2271
2272
  proc_h = subprocess.Popen('/sbin/ifconfig', stdout=subprocess.PIPE, stderr=subprocess.PIPE)
2272
2273
  if proc_h.wait():
2273
2274
  raise Exception('ifconfig exited with non-zero status')
2274
- output = proc_h.stdout.read()
2275
+ output = str(proc_h.stdout.read())
2275
2276
 
2276
2277
  interfaces = []
2277
2278
  iface = {}
2278
2279
  for line in output.split('\n'):
2279
- match = re.match(r'^([a-z0-9]+): flags=(\d+)<[A-Z,]*> mtu (\d+)\s*$', line)
2280
+ match = re.match(r'^([a-z0-9]+): flags=(\d+)<([A-Z,]*)> mtu (\d+)\s*$', line)
2280
2281
  if match is not None:
2281
2282
  if iface:
2282
2283
  interfaces.append(iface)
2283
2284
  iface = {}
2284
2285
  iface['name'] = match.group(1)
2285
2286
  iface['flags'] = int(match.group(2))
2286
- iface['mtu'] = int(match.group(3))
2287
+ iface['flags_str'] = match.group(3)
2288
+ iface['mtu'] = int(match.group(4))
2287
2289
  iface['index'] = len(interfaces)
2288
2290
  continue
2289
2291
  match = re.match(r'^\s+ether (([a-f0-9]{2}:){5}[a-f0-9]{2})\s*$', line)
@@ -2487,7 +2489,7 @@ def stdapi_net_config_get_routes_via_osx_netstat():
2487
2489
  proc_h = subprocess.Popen(['/usr/sbin/netstat', '-rn'], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
2488
2490
  if proc_h.wait():
2489
2491
  raise Exception('netstat exited with non-zero status')
2490
- output = proc_h.stdout.read()
2492
+ output = str(proc_h.stdout.read())
2491
2493
 
2492
2494
  routes = []
2493
2495
  state = None
@@ -2524,7 +2526,7 @@ def stdapi_net_config_get_routes_via_osx_netstat():
2524
2526
  continue
2525
2527
  if destination == 'default':
2526
2528
  destination = all_nets
2527
- if re.match('link#\d+', gateway) or re.match('([0-9a-f]{1,2}:){5}[0-9a-f]{1,2}', gateway):
2529
+ if re.match('link#\\d+', gateway) or re.match('([0-9a-f]{1,2}:){5}[0-9a-f]{1,2}', gateway):
2528
2530
  gateway = all_nets[:-2]
2529
2531
  if '/' in destination:
2530
2532
  destination, netmask_bits = destination.rsplit('/', 1)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.135'
3
+ VERSION = '2.0.137'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.135
4
+ version: 2.0.137
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-06-02 00:00:00.000000000 Z
99
+ date: 2023-06-14 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file