metasploit-payloads 2.0.86 → 2.0.89

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (73) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  47. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  48. data/data/meterpreter/ext_server_stdapi.php +5 -18
  49. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  50. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  53. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  61. data/data/meterpreter/meterpreter.php +9 -2
  62. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  63. data/data/meterpreter/metsrv.x64.dll +0 -0
  64. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  65. data/data/meterpreter/metsrv.x86.dll +0 -0
  66. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  67. data/data/meterpreter/screenshot.x64.dll +0 -0
  68. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  69. data/data/meterpreter/screenshot.x86.dll +0 -0
  70. data/lib/metasploit-payloads/version.rb +1 -1
  71. data.tar.gz.sig +0 -0
  72. metadata +2 -2
  73. metadata.gz.sig +2 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4b2413c2e2c381b82dc78a7c2c08e42dd044bc189bdcabf9816e9ded3db027be
4
- data.tar.gz: 4eb2228dc9af57275e200ae71290fae570130ed7311a39eef38affe6ae3ec94a
3
+ metadata.gz: c1512f25f0931730fdd7b8d0fc1cefec0ab49569a47bd67833bd3c63a0703997
4
+ data.tar.gz: 3b4692895726086b8dd3440fb208c7864115bd8a06018b080b02acb05597e0b9
5
5
  SHA512:
6
- metadata.gz: 3334c68ca3e12f835890128b887c1ff84af12da5b011e84cacb8e03586379108f35acd8a7b68adb526d139ebd77ee5d3d17e61225b30da0035d12fe777ca9dec
7
- data.tar.gz: e25a0a3aba16d8b45555358e84d2724ab2b0683a2c04b3946fc9b0b675ab4ff8a4289a18b67d5e6ee2283a3dbe61ede5bd0e2e42d0cf3861c8c576192ec6ddcf
6
+ metadata.gz: cbbc6b1258078e02123020dd12d982997bdb6a0d1f1fc1ab6de95bed70a3cc874907cde6ba8fccfc53c4bdc2f4e00cef22b4324ed86ff0068a75593af10713fa
7
+ data.tar.gz: 07b26d970f8f31803660e33bd4d4d688ddd4c897dae6c6267a89e0e429e06917c16f372bfcef47a9655627243795dca9860022bd629dbeb2a4dfa88a085c4242
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -302,11 +302,6 @@ define("ERROR_CONNECTION_ERROR", 10000);
302
302
  # eval'd twice
303
303
  my_print("Evaling stdapi");
304
304
 
305
- ##
306
- # Windows Constants
307
- ##
308
- define("WIN_AF_INET", 2);
309
- define("WIN_AF_INET6", 23);
310
305
 
311
306
  ##
312
307
  # Search Helpers
@@ -456,9 +451,9 @@ function add_stat_buf($path) {
456
451
  if (!function_exists('resolve_host')) {
457
452
  function resolve_host($hostname, $family) {
458
453
  /* requires PHP >= 5 */
459
- if ($family == AF_INET) {
454
+ if ($family == WIN_AF_INET) {
460
455
  $dns_family = DNS_A;
461
- } elseif ($family == AF_INET6) {
456
+ } elseif ($family == WIN_AF_INET6) {
462
457
  $dns_family = DNS_AAAA;
463
458
  } else {
464
459
  my_print('invalid family, must be AF_INET or AF_INET6');
@@ -1054,7 +1049,7 @@ function stdapi_sys_process_get_processes($req, &$pkt) {
1054
1049
  # full command line
1055
1050
  array_shift($proc);
1056
1051
  array_shift($proc);
1057
- $grp .= tlv_pack(create_tlv(TLV_TYPE_PROCESS_PATH, join($proc, " ")));
1052
+ $grp .= tlv_pack(create_tlv(TLV_TYPE_PROCESS_PATH, join(" ", $proc)));
1058
1053
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_PROCESS_GROUP, $grp));
1059
1054
  }
1060
1055
  return ERROR_SUCCESS;
@@ -1265,11 +1260,7 @@ function stdapi_net_resolve_host($req, &$pkt) {
1265
1260
  $family_tlv = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE);
1266
1261
  $family = $family['value'];
1267
1262
 
1268
- if ($family == WIN_AF_INET) {
1269
- $family = AF_INET;
1270
- } elseif ($family == WIN_AF_INET6) {
1271
- $family = AF_INET6;
1272
- } else {
1263
+ if ($family != WIN_AF_INET && $family != WIN_AF_INET6) {
1273
1264
  my_print('invalid family, must be AF_INET or AF_INET6');
1274
1265
  return ERROR_FAILURE;
1275
1266
  }
@@ -1292,11 +1283,7 @@ function stdapi_net_resolve_hosts($req, &$pkt) {
1292
1283
  $family_tlv = packet_get_tlv($req, TLV_TYPE_ADDR_TYPE);
1293
1284
  $family = $family_tlv['value'];
1294
1285
 
1295
- if ($family == WIN_AF_INET) {
1296
- $family = AF_INET;
1297
- } elseif ($family == WIN_AF_INET6) {
1298
- $family = AF_INET6;
1299
- } else {
1286
+ if ($family != WIN_AF_INET && $family != WIN_AF_INET6) {
1300
1287
  my_print('invalid family, must be AF_INET or AF_INET6');
1301
1288
  return ERROR_FAILURE;
1302
1289
  }
@@ -148,6 +148,13 @@ define("CHANNEL_CLASS_STREAM", 1);
148
148
  define("CHANNEL_CLASS_DATAGRAM", 2);
149
149
  define("CHANNEL_CLASS_POOL", 3);
150
150
 
151
+
152
+ ##
153
+ # Windows Constants
154
+ ##
155
+ define("WIN_AF_INET", 2);
156
+ define("WIN_AF_INET6", 23);
157
+
151
158
  #
152
159
  # TLV Meta Types
153
160
  #
@@ -1095,10 +1102,10 @@ function connect($ipaddr, $port, $proto='tcp') {
1095
1102
  # IPv6 requires brackets around the address in some cases, but not all.
1096
1103
  # Keep track of the un-bracketed address for the functions that don't like
1097
1104
  # brackets, specifically socket_connect and socket_sendto.
1098
- $ipf = AF_INET;
1105
+ $ipf = WIN_AF_INET;
1099
1106
  $raw_ip = $ipaddr;
1100
1107
  if (FALSE !== strpos($ipaddr, ":")) {
1101
- $ipf = AF_INET6;
1108
+ $ipf = WIN_AF_INET6;
1102
1109
  $ipaddr = "[". $raw_ip ."]";
1103
1110
  }
1104
1111
 
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.86'
3
+ VERSION = '2.0.89'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.86
4
+ version: 2.0.89
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2022-05-03 00:00:00.000000000 Z
99
+ date: 2022-05-05 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
@@ -1 +1,2 @@
1
- �׭���΍͏�˟�$p�{t=�����jJ���So
1
+ �/�f�ٜ"n�oڳ"�
2
+ *\/GV_���D�u�w�x�ZC��Le�� �b�Խ"w� ���<Dj��+#޳�ݳ������zV앞��ޣWJ�y�.�(�M��/�AQ�n@m�cY6���ë�~��c�#��ުs