metasploit-payloads 2.0.136 → 2.0.138

Sign up to get free protection for your applications and to get access to all the features.
Files changed (80) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
  7. data/data/meterpreter/dump_sam.x64.dll +0 -0
  8. data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
  9. data/data/meterpreter/dump_sam.x86.dll +0 -0
  10. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  11. data/data/meterpreter/elevator.x64.dll +0 -0
  12. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  13. data/data/meterpreter/elevator.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  51. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  52. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  53. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  54. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.py +23 -22
  57. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  65. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  66. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  67. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  68. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  69. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  70. data/data/meterpreter/metsrv.x64.dll +0 -0
  71. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  72. data/data/meterpreter/metsrv.x86.dll +0 -0
  73. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  74. data/data/meterpreter/screenshot.x64.dll +0 -0
  75. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  76. data/data/meterpreter/screenshot.x86.dll +0 -0
  77. data/lib/metasploit-payloads/version.rb +1 -1
  78. data.tar.gz.sig +0 -0
  79. metadata +2 -2
  80. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 438b922b36d0ad1f953e7a634c40263cff7489ee9a5e955927a2dcb5ab62e3ee
4
- data.tar.gz: 8bcf442d97146266a83349a08ed6b83fcc1ef2ac4ee6e92780b1f839f937a670
3
+ metadata.gz: 4138cce4505e337152c4f0aaa4d101f791c6046dc3b9f00246ed0523eacdd1e7
4
+ data.tar.gz: 3f952c9d9a8f9df0e564b593158fa3a499f8d940921bedc8d835d632d216f33c
5
5
  SHA512:
6
- metadata.gz: 0addaca35d99dcfd0e4d1e6eef214188fcf9a3c762e4253c5172ca44892160cd2962d93154ede5afa466c91724cc8a51ddb73efe7e31275400f2006c31d64e34
7
- data.tar.gz: 3dffba71724261b73fffe1f9390cbba1541ab826d9a3779869177f3d6094d5311e9cc74758050850f1fd1dcaf71a9e765dd951df5d3d69d4529ea1207c576854
6
+ metadata.gz: 8829f24b4c721d317db45e2919c9c9990caaf04a6eb770e91e7bda6cf2ea8e99f606d15b40d75208909788707d252af5b55125e2ea10dbcabb5165f733effffa
7
+ data.tar.gz: 4dba11675a2b4c1549a395fd5e0266b6f76161336ac9e320c59c62e3e5e1ea3e2424be9762d0b44e047bf0ed1d8dc5071bdedfa3247536396e0e72789fcd4eee
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -879,6 +879,14 @@ def ctstruct_unpack(structure, raw_data):
879
879
  ctypes.memmove(ctypes.byref(structure), raw_data, ctypes.sizeof(structure))
880
880
  return structure
881
881
 
882
+ def get_process_output(args):
883
+ proc_h = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
884
+ stdout, stderr = proc_h.communicate()
885
+
886
+ if proc_h.wait():
887
+ raise Exception(args[0] + ' exited with non-zero status')
888
+ return str(stdout)
889
+
882
890
  def get_stat_buffer(path):
883
891
  si = os.stat(path)
884
892
  rdev = 0
@@ -1550,12 +1558,11 @@ def stdapi_sys_process_get_processes_via_proc(request, response):
1550
1558
  return ERROR_SUCCESS, response
1551
1559
 
1552
1560
  def stdapi_sys_process_get_processes_via_ps(request, response):
1553
- ps_args = ['ps', 'ax', '-w', '-o', 'pid,ppid,user,command']
1554
- proc_h = subprocess.Popen(ps_args, stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
1555
- ps_output = str(proc_h.stdout.read())
1556
- ps_output = ps_output.split('\n')
1557
- ps_output.pop(0)
1558
- for process in ps_output:
1561
+ ps_output = get_process_output(['ps', 'ax', '-w', '-o', 'pid,ppid,user,command'])
1562
+
1563
+ output = ps_output.split('\n')
1564
+ output.pop(0)
1565
+ for process in output:
1559
1566
  process = process.split()
1560
1567
  if len(process) < 4:
1561
1568
  break
@@ -2188,8 +2195,8 @@ def stdapi_net_config_get_interfaces(request, response):
2188
2195
  iface_tlv += tlv_pack(TLV_TYPE_MAC_ADDRESS, iface_info.get('hw_addr', '\x00\x00\x00\x00\x00\x00'))
2189
2196
  if 'mtu' in iface_info:
2190
2197
  iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_MTU, iface_info['mtu'])
2191
- if 'flags' in iface_info:
2192
- iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['flags'])
2198
+ if 'flags_str' in iface_info:
2199
+ iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_FLAGS, iface_info['flags_str'])
2193
2200
  iface_tlv += tlv_pack(TLV_TYPE_INTERFACE_INDEX, iface_info['index'])
2194
2201
  for address in iface_info.get('addrs', []):
2195
2202
  iface_tlv += tlv_pack(TLV_TYPE_IP, address[1])
@@ -2224,7 +2231,8 @@ def stdapi_net_config_get_interfaces_via_netlink():
2224
2231
  for flag in iface_flags_sorted:
2225
2232
  if (iface.flags & flag):
2226
2233
  flags.append(iface_flags[flag])
2227
- iface_info['flags'] = ' '.join(flags)
2234
+ iface_info['flags'] = iface.flags
2235
+ iface_info['flags_str'] = ' '.join(flags)
2228
2236
  cursor = ctypes.sizeof(IFINFOMSG)
2229
2237
  while cursor < len(res_data):
2230
2238
  attribute = ctstruct_unpack(RTATTR, res_data[cursor:])
@@ -2268,22 +2276,19 @@ def stdapi_net_config_get_interfaces_via_netlink():
2268
2276
  return interfaces.values()
2269
2277
 
2270
2278
  def stdapi_net_config_get_interfaces_via_osx_ifconfig():
2271
- proc_h = subprocess.Popen('/sbin/ifconfig', stdout=subprocess.PIPE, stderr=subprocess.PIPE)
2272
- if proc_h.wait():
2273
- raise Exception('ifconfig exited with non-zero status')
2274
- output = proc_h.stdout.read()
2275
-
2279
+ output = get_process_output(['/sbin/ifconfig'])
2276
2280
  interfaces = []
2277
2281
  iface = {}
2278
2282
  for line in output.split('\n'):
2279
- match = re.match(r'^([a-z0-9]+): flags=(\d+)<[A-Z,]*> mtu (\d+)\s*$', line)
2283
+ match = re.match(r'^([a-z0-9]+): flags=(\d+)<([A-Z,]*)> mtu (\d+)\s*$', line)
2280
2284
  if match is not None:
2281
2285
  if iface:
2282
2286
  interfaces.append(iface)
2283
2287
  iface = {}
2284
2288
  iface['name'] = match.group(1)
2285
2289
  iface['flags'] = int(match.group(2))
2286
- iface['mtu'] = int(match.group(3))
2290
+ iface['flags_str'] = match.group(3)
2291
+ iface['mtu'] = int(match.group(4))
2287
2292
  iface['index'] = len(interfaces)
2288
2293
  continue
2289
2294
  match = re.match(r'^\s+ether (([a-f0-9]{2}:){5}[a-f0-9]{2})\s*$', line)
@@ -2484,11 +2489,7 @@ def stdapi_net_config_get_routes_via_netlink():
2484
2489
  return routes
2485
2490
 
2486
2491
  def stdapi_net_config_get_routes_via_osx_netstat():
2487
- proc_h = subprocess.Popen(['/usr/sbin/netstat', '-rn'], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
2488
- if proc_h.wait():
2489
- raise Exception('netstat exited with non-zero status')
2490
- output = proc_h.stdout.read()
2491
-
2492
+ output = get_process_output(['/usr/sbin/netstat', '-rn'])
2492
2493
  routes = []
2493
2494
  state = None
2494
2495
  has_refs = None
@@ -2524,7 +2525,7 @@ def stdapi_net_config_get_routes_via_osx_netstat():
2524
2525
  continue
2525
2526
  if destination == 'default':
2526
2527
  destination = all_nets
2527
- if re.match('link#\d+', gateway) or re.match('([0-9a-f]{1,2}:){5}[0-9a-f]{1,2}', gateway):
2528
+ if re.match('link#\\d+', gateway) or re.match('([0-9a-f]{1,2}:){5}[0-9a-f]{1,2}', gateway):
2528
2529
  gateway = all_nets[:-2]
2529
2530
  if '/' in destination:
2530
2531
  destination, netmask_bits = destination.rsplit('/', 1)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.136'
3
+ VERSION = '2.0.138'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.136
4
+ version: 2.0.138
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-06-09 00:00:00.000000000 Z
99
+ date: 2023-06-14 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file