metasploit-payloads 2.0.136 → 2.0.138
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
- data/data/meterpreter/dump_sam.x64.dll +0 -0
- data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
- data/data/meterpreter/dump_sam.x86.dll +0 -0
- data/data/meterpreter/elevator.x64.debug.dll +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.debug.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +23 -22
- data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.debug.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.debug.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.debug.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.debug.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4138cce4505e337152c4f0aaa4d101f791c6046dc3b9f00246ed0523eacdd1e7
|
4
|
+
data.tar.gz: 3f952c9d9a8f9df0e564b593158fa3a499f8d940921bedc8d835d632d216f33c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8829f24b4c721d317db45e2919c9c9990caaf04a6eb770e91e7bda6cf2ea8e99f606d15b40d75208909788707d252af5b55125e2ea10dbcabb5165f733effffa
|
7
|
+
data.tar.gz: 4dba11675a2b4c1549a395fd5e0266b6f76161336ac9e320c59c62e3e5e1ea3e2424be9762d0b44e047bf0ed1d8dc5071bdedfa3247536396e0e72789fcd4eee
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -879,6 +879,14 @@ def ctstruct_unpack(structure, raw_data):
|
|
879
879
|
ctypes.memmove(ctypes.byref(structure), raw_data, ctypes.sizeof(structure))
|
880
880
|
return structure
|
881
881
|
|
882
|
+
def get_process_output(args):
|
883
|
+
proc_h = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
884
|
+
stdout, stderr = proc_h.communicate()
|
885
|
+
|
886
|
+
if proc_h.wait():
|
887
|
+
raise Exception(args[0] + ' exited with non-zero status')
|
888
|
+
return str(stdout)
|
889
|
+
|
882
890
|
def get_stat_buffer(path):
|
883
891
|
si = os.stat(path)
|
884
892
|
rdev = 0
|
@@ -1550,12 +1558,11 @@ def stdapi_sys_process_get_processes_via_proc(request, response):
|
|
1550
1558
|
return ERROR_SUCCESS, response
|
1551
1559
|
|
1552
1560
|
def stdapi_sys_process_get_processes_via_ps(request, response):
|
1553
|
-
|
1554
|
-
|
1555
|
-
|
1556
|
-
|
1557
|
-
|
1558
|
-
for process in ps_output:
|
1561
|
+
ps_output = get_process_output(['ps', 'ax', '-w', '-o', 'pid,ppid,user,command'])
|
1562
|
+
|
1563
|
+
output = ps_output.split('\n')
|
1564
|
+
output.pop(0)
|
1565
|
+
for process in output:
|
1559
1566
|
process = process.split()
|
1560
1567
|
if len(process) < 4:
|
1561
1568
|
break
|
@@ -2188,8 +2195,8 @@ def stdapi_net_config_get_interfaces(request, response):
|
|
2188
2195
|
iface_tlv += tlv_pack(TLV_TYPE_MAC_ADDRESS, iface_info.get('hw_addr', '\x00\x00\x00\x00\x00\x00'))
|
2189
2196
|
if 'mtu' in iface_info:
|
2190
2197
|
iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_MTU, iface_info['mtu'])
|
2191
|
-
if '
|
2192
|
-
iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['
|
2198
|
+
if 'flags_str' in iface_info:
|
2199
|
+
iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['flags_str'])
|
2193
2200
|
iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_INDEX, iface_info['index'])
|
2194
2201
|
for address in iface_info.get('addrs', []):
|
2195
2202
|
iface_tlv += tlv_pack(TLV_TYPE_IP, address[1])
|
@@ -2224,7 +2231,8 @@ def stdapi_net_config_get_interfaces_via_netlink():
|
|
2224
2231
|
for flag in iface_flags_sorted:
|
2225
2232
|
if (iface.flags & flag):
|
2226
2233
|
flags.append(iface_flags[flag])
|
2227
|
-
iface_info['flags'] =
|
2234
|
+
iface_info['flags'] = iface.flags
|
2235
|
+
iface_info['flags_str'] = ' '.join(flags)
|
2228
2236
|
cursor = ctypes.sizeof(IFINFOMSG)
|
2229
2237
|
while cursor < len(res_data):
|
2230
2238
|
attribute = ctstruct_unpack(RTATTR, res_data[cursor:])
|
@@ -2268,22 +2276,19 @@ def stdapi_net_config_get_interfaces_via_netlink():
|
|
2268
2276
|
return interfaces.values()
|
2269
2277
|
|
2270
2278
|
def stdapi_net_config_get_interfaces_via_osx_ifconfig():
|
2271
|
-
|
2272
|
-
if proc_h.wait():
|
2273
|
-
raise Exception('ifconfig exited with non-zero status')
|
2274
|
-
output = proc_h.stdout.read()
|
2275
|
-
|
2279
|
+
output = get_process_output(['/sbin/ifconfig'])
|
2276
2280
|
interfaces = []
|
2277
2281
|
iface = {}
|
2278
2282
|
for line in output.split('\n'):
|
2279
|
-
match = re.match(r'^([a-z0-9]+): flags=(\d+)<[A-Z,]
|
2283
|
+
match = re.match(r'^([a-z0-9]+): flags=(\d+)<([A-Z,]*)> mtu (\d+)\s*$', line)
|
2280
2284
|
if match is not None:
|
2281
2285
|
if iface:
|
2282
2286
|
interfaces.append(iface)
|
2283
2287
|
iface = {}
|
2284
2288
|
iface['name'] = match.group(1)
|
2285
2289
|
iface['flags'] = int(match.group(2))
|
2286
|
-
iface['
|
2290
|
+
iface['flags_str'] = match.group(3)
|
2291
|
+
iface['mtu'] = int(match.group(4))
|
2287
2292
|
iface['index'] = len(interfaces)
|
2288
2293
|
continue
|
2289
2294
|
match = re.match(r'^\s+ether (([a-f0-9]{2}:){5}[a-f0-9]{2})\s*$', line)
|
@@ -2484,11 +2489,7 @@ def stdapi_net_config_get_routes_via_netlink():
|
|
2484
2489
|
return routes
|
2485
2490
|
|
2486
2491
|
def stdapi_net_config_get_routes_via_osx_netstat():
|
2487
|
-
|
2488
|
-
if proc_h.wait():
|
2489
|
-
raise Exception('netstat exited with non-zero status')
|
2490
|
-
output = proc_h.stdout.read()
|
2491
|
-
|
2492
|
+
output = get_process_output(['/usr/sbin/netstat', '-rn'])
|
2492
2493
|
routes = []
|
2493
2494
|
state = None
|
2494
2495
|
has_refs = None
|
@@ -2524,7 +2525,7 @@ def stdapi_net_config_get_routes_via_osx_netstat():
|
|
2524
2525
|
continue
|
2525
2526
|
if destination == 'default':
|
2526
2527
|
destination = all_nets
|
2527
|
-
if re.match('link
|
2528
|
+
if re.match('link#\\d+', gateway) or re.match('([0-9a-f]{1,2}:){5}[0-9a-f]{1,2}', gateway):
|
2528
2529
|
gateway = all_nets[:-2]
|
2529
2530
|
if '/' in destination:
|
2530
2531
|
destination, netmask_bits = destination.rsplit('/', 1)
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.138
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2023-06-
|
99
|
+
date: 2023-06-14 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|