metasploit-payloads 2.0.58 → 2.0.62

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.php +12 -6
  29. data/data/meterpreter/ext_server_stdapi.py +2 -1
  30. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  31. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  35. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  36. data/data/meterpreter/meterpreter.py +3 -3
  37. data/data/meterpreter/metsrv.x64.dll +0 -0
  38. data/data/meterpreter/metsrv.x86.dll +0 -0
  39. data/data/meterpreter/screenshot.x64.dll +0 -0
  40. data/data/meterpreter/screenshot.x86.dll +0 -0
  41. data/lib/metasploit-payloads/version.rb +1 -1
  42. data.tar.gz.sig +0 -0
  43. metadata +2 -2
  44. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a58e73e2dbd154fef6fca2f4ced7bfc6810c553ce18382641439b558f194f4eb
4
- data.tar.gz: b64ae99e93c956aa973358ebf391d72ef5911a97ccff7285180c118fdfcafd2f
3
+ metadata.gz: f11c89ff68506ca3906f6bf9be54f30a50b8ecb28b5c20f97457b3fe65e9d691
4
+ data.tar.gz: 9fb91f65b221c56d0b9378a17af6a1ec011bc6470ecd6afd706ec02b9bcfe9cf
5
5
  SHA512:
6
- metadata.gz: 033ac0bcf5e8fea4b0a1fe99f4e95c3b7f1004b83071a1bd6c00c03a583550dc0f5ee222007b97da26579c17e97880da2e929412498dedf205a4e2b98febc0d9
7
- data.tar.gz: 5393ec39455bfb49987c56ef4577a352f3e051646ef4290a7d8f333de433c73f35ed085a1934fdcee5d6248db70f0e124c2cad97c9b712b85b31cd9acae1fab5
6
+ metadata.gz: 13abd29d883b5165e51baff0e3c5402a4b350dd0c964d3b4028a031c116fa2980d52fc647a0eda358f5255ae495e173577ebc500dd66b3b8e116d2dec2f2d49b
7
+ data.tar.gz: d437c893d638680d064f902c0cd142aa3771049d456967f5ded448dd5f0fe827877879571bed4b64322c7c33e5ab70f7314948676d42bfe2a7c70a3e659297a4
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -461,7 +461,8 @@ function resolve_host($hostname, $family) {
461
461
  } elseif ($family == AF_INET6) {
462
462
  $dns_family = DNS_AAAA;
463
463
  } else {
464
- throw new Exception('invalid family, must be AF_INET or AF_INET6');
464
+ my_print('invalid family, must be AF_INET or AF_INET6');
465
+ return NULL;
465
466
  }
466
467
 
467
468
  $dns = dns_get_record($hostname, $dns_family);
@@ -1224,15 +1225,18 @@ if (!function_exists('stdapi_net_resolve_host')) {
1224
1225
  register_command('stdapi_net_resolve_host', COMMAND_ID_STDAPI_NET_RESOLVE_HOST);
1225
1226
  function stdapi_net_resolve_host($req, &$pkt) {
1226
1227
  my_print("doing stdapi_net_resolve_host");
1227
- $hostname = packet_get_tlv($req, TLV_TYPE_HOST_NAME)['value'];
1228
- $family = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE)['value'];
1228
+ $hostname_tlv = packet_get_tlv($req, TLV_TYPE_HOST_NAME);
1229
+ $hostname = $hostname['value'];
1230
+ $family_tlv = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE);
1231
+ $family = $family['value'];
1229
1232
 
1230
1233
  if ($family == WIN_AF_INET) {
1231
1234
  $family = AF_INET;
1232
1235
  } elseif ($family == WIN_AF_INET6) {
1233
1236
  $family = AF_INET6;
1234
1237
  } else {
1235
- throw new Exception('invalid family');
1238
+ my_print('invalid family, must be AF_INET or AF_INET6');
1239
+ return ERROR_FAILURE;
1236
1240
  }
1237
1241
 
1238
1242
  $ret = ERROR_FAILURE;
@@ -1250,14 +1254,16 @@ if (!function_exists('stdapi_net_resolve_hosts')) {
1250
1254
  register_command('stdapi_net_resolve_hosts', COMMAND_ID_STDAPI_NET_RESOLVE_HOSTS);
1251
1255
  function stdapi_net_resolve_hosts($req, &$pkt) {
1252
1256
  my_print("doing stdapi_net_resolve_hosts");
1253
- $family = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE)['value'];
1257
+ $family_tlv = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE);
1258
+ $family = $family_tlv['value'];
1254
1259
 
1255
1260
  if ($family == WIN_AF_INET) {
1256
1261
  $family = AF_INET;
1257
1262
  } elseif ($family == WIN_AF_INET6) {
1258
1263
  $family = AF_INET6;
1259
1264
  } else {
1260
- throw new Exception('invalid family');
1265
+ my_print('invalid family, must be AF_INET or AF_INET6');
1266
+ return ERROR_FAILURE;
1261
1267
  }
1262
1268
 
1263
1269
  $hostname_tlvs = packet_get_all_tlvs($req, TLV_TYPE_HOST_NAME);
@@ -662,6 +662,7 @@ PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
662
662
  PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
663
663
  PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
664
664
  PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
665
+ PROCESS_EXECUTE_FLAG_PTY = (1 << 7)
665
666
 
666
667
  PROCESS_ARCH_UNKNOWN = 0
667
668
  PROCESS_ARCH_X86 = 1
@@ -1166,7 +1167,7 @@ def stdapi_sys_process_execute(request, response):
1166
1167
  args.extend(shlex.split(raw_args))
1167
1168
 
1168
1169
  if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
1169
- if has_pty:
1170
+ if has_pty and (flags & PROCESS_EXECUTE_FLAG_PTY):
1170
1171
  master, slave = pty.openpty()
1171
1172
  if has_termios:
1172
1173
  try:
@@ -667,6 +667,7 @@ class MeterpreterProcess(MeterpreterChannel):
667
667
  self.proc_h.kill()
668
668
  if self.proc_h.ptyfd is not None:
669
669
  os.close(self.proc_h.ptyfd)
670
+ self.proc_h.ptyfd = None
670
671
  for stream in (self.proc_h.stdin, self.proc_h.stdout, self.proc_h.stderr):
671
672
  if not hasattr(stream, 'close'):
672
673
  continue
@@ -1337,9 +1338,9 @@ class PythonMeterpreter(object):
1337
1338
  self.send_packet(tlv_pack_request('stdapi_net_tcp_channel_open', [
1338
1339
  {'type': TLV_TYPE_CHANNEL_ID, 'value': client_channel_id},
1339
1340
  {'type': TLV_TYPE_CHANNEL_PARENTID, 'value': channel_id},
1340
- {'type': TLV_TYPE_LOCAL_HOST, 'value': inet_pton(channel.sock.family, server_addr[0])},
1341
+ {'type': TLV_TYPE_LOCAL_HOST, 'value': server_addr[0]},
1341
1342
  {'type': TLV_TYPE_LOCAL_PORT, 'value': server_addr[1]},
1342
- {'type': TLV_TYPE_PEER_HOST, 'value': inet_pton(client_sock.family, client_addr[0])},
1343
+ {'type': TLV_TYPE_PEER_HOST, 'value': client_addr[0]},
1343
1344
  {'type': TLV_TYPE_PEER_PORT, 'value': client_addr[1]},
1344
1345
  ]))
1345
1346
  elif isinstance(channel, MeterpreterSocketUDPClient):
@@ -1362,7 +1363,6 @@ class PythonMeterpreter(object):
1362
1363
  self.send_packet(tlv_pack_request('core_channel_write', write_request_parts))
1363
1364
 
1364
1365
  def handle_dead_resource_channel(self, channel_id):
1365
- del self.channels[channel_id]
1366
1366
  if channel_id in self.interact_channels:
1367
1367
  self.interact_channels.remove(channel_id)
1368
1368
  self.send_packet(tlv_pack_request('core_channel_close', [
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.58'
3
+ VERSION = '2.0.62'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.58
4
+ version: 2.0.62
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-09-28 00:00:00.000000000 Z
99
+ date: 2021-12-07 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file