metasploit-payloads 2.0.64 → 2.0.68

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.dex +0 -0
  4. data/data/android/meterpreter.jar +0 -0
  5. data/data/android/metstage.jar +0 -0
  6. data/data/android/shell.jar +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  10. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  14. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  18. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  22. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  26. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.jar +0 -0
  30. data/data/meterpreter/ext_server_stdapi.php +4 -2
  31. data/data/meterpreter/ext_server_stdapi.py +5 -1
  32. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  35. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  36. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  37. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  38. data/data/meterpreter/meterpreter.jar +0 -0
  39. data/data/meterpreter/meterpreter.py +9 -6
  40. data/data/meterpreter/metsrv.x64.dll +0 -0
  41. data/data/meterpreter/metsrv.x86.dll +0 -0
  42. data/data/meterpreter/screenshot.x64.dll +0 -0
  43. data/data/meterpreter/screenshot.x86.dll +0 -0
  44. data/lib/metasploit-payloads/version.rb +1 -1
  45. data.tar.gz.sig +0 -0
  46. metadata +2 -2
  47. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2f272266198457eb06192d32b735b1c22c32f6a722df20db02bd585e0f996a6b
4
- data.tar.gz: e18a08cb3266b3dc44c769c0e8554887b6b1303eda27fee7c57bcac82d3c4cbc
3
+ metadata.gz: f6b1b882a053964467109860e5dceb0641a31697767d8aa61bd9304f79155ce7
4
+ data.tar.gz: ef94c0ba6c8e5ce15fe8dd091fb2d554c4456729bdd2c97c4adc553abb9be4e4
5
5
  SHA512:
6
- metadata.gz: 867b63c6e25a79327f30e176c608c552b8e67135ed5c39a4d75145323f7d91653db857f4859431aa3f34e49190b6c7d7af89a827f36a2e68c42f6a8e14348704
7
- data.tar.gz: 7cc1991f554d5b24c5859c28efef171e4bfe17a318d7e2aea670c581c59e1a48c3edba1cf172e35ed3aee97b394040a3b91a3e4189e90a4591792be3d390d795
6
+ metadata.gz: 46a845b63fa4ed140919bdd679427b3293b2b512c8015872ba931323cf4b4f7c00fdb63b2b7a38aca71c92ea5a592c8eac8a0da6965909abd4def94bc5768d64
7
+ data.tar.gz: 58a2d3ca3998f891b8dfe9c6da3aa0a8bb69d19cf412cd9030a3b805d562c2e803ee43430aacca3ee7c4b35d877235f16f8f3960a9e8bb96208780f52c6dc93f
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -628,8 +628,10 @@ function stdapi_fs_ls($req, &$pkt) {
628
628
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_FILE_NAME, $file));
629
629
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_FILE_PATH, $path . DIRECTORY_SEPARATOR . $file));
630
630
  $st_buf = add_stat_buf($path . DIRECTORY_SEPARATOR . $file);
631
- if ($st_buf)
632
- packet_add_tlv($pkt, $st_buf);
631
+ if (!$st_buf) {
632
+ $st_buf = create_tlv(TLV_TYPE_STAT_BUF32, '');
633
+ }
634
+ packet_add_tlv($pkt, $st_buf);
633
635
  }
634
636
  }
635
637
  closedir($dir_handle);
@@ -1494,7 +1494,11 @@ def stdapi_fs_ls(request, response):
1494
1494
  file_path = os.path.join(path, file_name)
1495
1495
  response += tlv_pack(TLV_TYPE_FILE_NAME, file_name)
1496
1496
  response += tlv_pack(TLV_TYPE_FILE_PATH, file_path)
1497
- response += tlv_pack(TLV_TYPE_STAT_BUF, get_stat_buffer(file_path))
1497
+ try:
1498
+ st_buf = get_stat_buffer(file_path)
1499
+ except OSError:
1500
+ st_buf = bytes()
1501
+ response += tlv_pack(TLV_TYPE_STAT_BUF, st_buf)
1498
1502
  return ERROR_SUCCESS, response
1499
1503
 
1500
1504
  @register_function
Binary file
@@ -680,10 +680,13 @@ class MeterpreterProcess(MeterpreterChannel):
680
680
  return self.proc_h.poll() is None
681
681
 
682
682
  def read(self, length):
683
- data = ''
683
+ data = bytes()
684
+ stderr_reader = self.proc_h.stderr_reader
684
685
  stdout_reader = self.proc_h.stdout_reader
685
- if stdout_reader.is_read_ready():
686
- data = stdout_reader.read(length)
686
+ if stderr_reader.is_read_ready() and length > 0:
687
+ data += stderr_reader.read(length)
688
+ if stdout_reader.is_read_ready() and (length - len(data)) > 0:
689
+ data += stdout_reader.read(length - len(data))
687
690
  return data
688
691
 
689
692
  def write(self, data):
@@ -1329,9 +1332,9 @@ class PythonMeterpreter(object):
1329
1332
  if channel_id in self.interact_channels:
1330
1333
  proc_h = channel.proc_h
1331
1334
  if proc_h.stderr_reader.is_read_ready():
1332
- data = proc_h.stderr_reader.read()
1333
- elif proc_h.stdout_reader.is_read_ready():
1334
- data = proc_h.stdout_reader.read()
1335
+ data += proc_h.stderr_reader.read()
1336
+ if proc_h.stdout_reader.is_read_ready():
1337
+ data += proc_h.stdout_reader.read()
1335
1338
  if not channel.is_alive():
1336
1339
  self.handle_dead_resource_channel(channel_id)
1337
1340
  channel.close()
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.64'
3
+ VERSION = '2.0.68'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.64
4
+ version: 2.0.68
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-12-08 00:00:00.000000000 Z
99
+ date: 2022-01-17 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file