metasploit-payloads 2.0.48 → 2.0.52
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +5 -3
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 44fbd2938803ac879371f61c66ba3f40c5939fa4afd8b2d4ec7de0c1c25aaa09
|
4
|
+
data.tar.gz: fab9960391ecf3b54398b01ab07c087a349dc24fbcd53e7de36a5691ddadf614
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7eb88c7bc0ab1e8d742b538c4cd8c8d7169dc6b46af6705494ccd82cd79c6ff2396589e2e9f2f4325956967c607b367b7347b2ee6a293075d0005c8fc06e7034
|
7
|
+
data.tar.gz: e0610123d50eb695ccaf6471d42fcbee4e5cd79f181f3990162998cc3cacf1be03f0574481f8a4186a6e58e26a5b10065ef1edc61190f9ecbe205260f723d027
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -649,6 +649,7 @@ PROCESS_EXECUTE_FLAG_HIDDEN = (1 << 0)
|
|
649
649
|
PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
|
650
650
|
PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
|
651
651
|
PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
|
652
|
+
PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
|
652
653
|
|
653
654
|
PROCESS_ARCH_UNKNOWN = 0
|
654
655
|
PROCESS_ARCH_X86 = 1
|
@@ -1146,11 +1147,12 @@ def stdapi_sys_process_execute(request, response):
|
|
1146
1147
|
flags = packet_get_tlv(request, TLV_TYPE_PROCESS_FLAGS)['value']
|
1147
1148
|
if len(cmd) == 0:
|
1148
1149
|
return ERROR_FAILURE, response
|
1149
|
-
if os.path.isfile('/bin/sh'):
|
1150
|
-
args = ['/bin/sh', '-c', cmd
|
1150
|
+
if os.path.isfile('/bin/sh') and (flags & PROCESS_EXECUTE_FLAG_SUBSHELL):
|
1151
|
+
args = ['/bin/sh', '-c', cmd, raw_args]
|
1151
1152
|
else:
|
1152
1153
|
args = [cmd]
|
1153
1154
|
args.extend(shlex.split(raw_args))
|
1155
|
+
|
1154
1156
|
if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
|
1155
1157
|
if has_pty:
|
1156
1158
|
master, slave = pty.openpty()
|
@@ -1161,7 +1163,7 @@ def stdapi_sys_process_execute(request, response):
|
|
1161
1163
|
termios.tcsetattr(master, termios.TCSADRAIN, settings)
|
1162
1164
|
except:
|
1163
1165
|
pass
|
1164
|
-
proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0)
|
1166
|
+
proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0, preexec_fn=os.setsid)
|
1165
1167
|
proc_h.stdin = os.fdopen(master, 'wb')
|
1166
1168
|
proc_h.stdout = os.fdopen(master, 'rb')
|
1167
1169
|
proc_h.stderr = open(os.devnull, 'rb')
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.52
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2021-
|
99
|
+
date: 2021-08-02 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|