metasploit-payloads 2.0.48 → 2.0.52

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/data/android/meterpreter.jar +0 -0
  5. data/data/android/metstage.jar +0 -0
  6. data/data/android/shell.jar +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  10. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  14. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  18. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  22. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  26. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.py +5 -3
  30. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  31. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  35. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  36. data/data/meterpreter/metsrv.x64.dll +0 -0
  37. data/data/meterpreter/metsrv.x86.dll +0 -0
  38. data/data/meterpreter/screenshot.x64.dll +0 -0
  39. data/data/meterpreter/screenshot.x86.dll +0 -0
  40. data/lib/metasploit-payloads/version.rb +1 -1
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5b4ebeff606061a918b56af763ae9805ab29e677ed65babebc048750b77e1e64
4
- data.tar.gz: '038ad1767ddd11bcc6f28bde15ba5db94b69cce108ffd125c006849787b2cf02'
3
+ metadata.gz: 44fbd2938803ac879371f61c66ba3f40c5939fa4afd8b2d4ec7de0c1c25aaa09
4
+ data.tar.gz: fab9960391ecf3b54398b01ab07c087a349dc24fbcd53e7de36a5691ddadf614
5
5
  SHA512:
6
- metadata.gz: 01147ee86c2d166c2747d956779ad48d56341b7e320f28929512c83def63388adf2a6afa218b3f854fc092b6d7d69261e1fc963b999f6536f151c11f13e0fcbe
7
- data.tar.gz: 37bd7b524e2d7622e9b97dfa6d780aa3490d2dcb0f3ba7b3b40098db9e36664dccad08bd01a8c9908c8323f7c0acd1165185aca466975319495c174fd10c09a3
6
+ metadata.gz: 7eb88c7bc0ab1e8d742b538c4cd8c8d7169dc6b46af6705494ccd82cd79c6ff2396589e2e9f2f4325956967c607b367b7347b2ee6a293075d0005c8fc06e7034
7
+ data.tar.gz: e0610123d50eb695ccaf6471d42fcbee4e5cd79f181f3990162998cc3cacf1be03f0574481f8a4186a6e58e26a5b10065ef1edc61190f9ecbe205260f723d027
checksums.yaml.gz.sig CHANGED
Binary file
data.tar.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -649,6 +649,7 @@ PROCESS_EXECUTE_FLAG_HIDDEN = (1 << 0)
649
649
  PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
650
650
  PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
651
651
  PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
652
+ PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
652
653
 
653
654
  PROCESS_ARCH_UNKNOWN = 0
654
655
  PROCESS_ARCH_X86 = 1
@@ -1146,11 +1147,12 @@ def stdapi_sys_process_execute(request, response):
1146
1147
  flags = packet_get_tlv(request, TLV_TYPE_PROCESS_FLAGS)['value']
1147
1148
  if len(cmd) == 0:
1148
1149
  return ERROR_FAILURE, response
1149
- if os.path.isfile('/bin/sh'):
1150
- args = ['/bin/sh', '-c', cmd + ' ' + raw_args]
1150
+ if os.path.isfile('/bin/sh') and (flags & PROCESS_EXECUTE_FLAG_SUBSHELL):
1151
+ args = ['/bin/sh', '-c', cmd, raw_args]
1151
1152
  else:
1152
1153
  args = [cmd]
1153
1154
  args.extend(shlex.split(raw_args))
1155
+
1154
1156
  if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
1155
1157
  if has_pty:
1156
1158
  master, slave = pty.openpty()
@@ -1161,7 +1163,7 @@ def stdapi_sys_process_execute(request, response):
1161
1163
  termios.tcsetattr(master, termios.TCSADRAIN, settings)
1162
1164
  except:
1163
1165
  pass
1164
- proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0)
1166
+ proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0, preexec_fn=os.setsid)
1165
1167
  proc_h.stdin = os.fdopen(master, 'wb')
1166
1168
  proc_h.stdout = os.fdopen(master, 'rb')
1167
1169
  proc_h.stderr = open(os.devnull, 'rb')
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.48'
3
+ VERSION = '2.0.52'
4
4
 
5
5
  def self.version
6
6
  VERSION
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.48
4
+ version: 2.0.52
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-07-16 00:00:00.000000000 Z
99
+ date: 2021-08-02 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file