metasploit-payloads 2.0.97 → 2.0.99
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.debug.dll +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.debug.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +86 -0
- data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.debug.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.debug.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.debug.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.debug.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +2 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9cfe995bf9b1af59ff233551ed954d4e53efd2e6a86943f95803512ee3024727
|
4
|
+
data.tar.gz: 15ec398c67dbf9bca1ee55b316173fc95943260ffedaa331726dba2836dcb02e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b7b83890bdd1a025895ebb590464a0a1b8d36e29dde9547646d6bc5baa36d7baca63ada990d07e551443118759ef20fc32a4c93575de9eca3f10a9ad6b757dfb
|
7
|
+
data.tar.gz: cd99d8855d51f2d51b42d8b5d5fd2e43540b9442f1a0297251e75fad98ea21fee6312ce525ca7e359d360cbb231224c8c305cfaac748a0feecff13a205ff367d
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -357,6 +357,36 @@ if has_ctypes:
|
|
357
357
|
("lpszProxy", ctypes.c_wchar_p),
|
358
358
|
("lpszProxyBypass", ctypes.c_wchar_p)]
|
359
359
|
|
360
|
+
class LUID(ctypes.Structure):
|
361
|
+
_fields_ = [
|
362
|
+
('LowPart', ctypes.c_uint32),
|
363
|
+
('HighPart', ctypes.c_long)
|
364
|
+
]
|
365
|
+
|
366
|
+
def __eq__(self, __o):
|
367
|
+
return (self.LowPart == __o.LowPart and self.HighPart == __o.HighPart)
|
368
|
+
|
369
|
+
def __ne__(self, __o):
|
370
|
+
return (self.LowPart != __o.LowPart or self.HighPart != __o.HighPart)
|
371
|
+
|
372
|
+
class LUID_AND_ATTRIBUTES(ctypes.Structure):
|
373
|
+
_fields_ = [
|
374
|
+
('Luid', LUID),
|
375
|
+
('Attributes', ctypes.c_uint32)
|
376
|
+
]
|
377
|
+
|
378
|
+
class TOKEN_PRIVILEGES(ctypes.Structure):
|
379
|
+
_fields_ = [
|
380
|
+
('PrivilegeCount', ctypes.c_uint32),
|
381
|
+
('Privileges', LUID_AND_ATTRIBUTES * 0),
|
382
|
+
]
|
383
|
+
def get_array(self):
|
384
|
+
array_type = LUID_AND_ATTRIBUTES * self.PrivilegeCount
|
385
|
+
return ctypes.cast(self.Privileges, ctypes.POINTER(array_type)).contents
|
386
|
+
|
387
|
+
PTOKEN_PRIVILEGES = ctypes.POINTER(TOKEN_PRIVILEGES)
|
388
|
+
|
389
|
+
|
360
390
|
#
|
361
391
|
# Linux Structures
|
362
392
|
#
|
@@ -999,6 +1029,45 @@ def windll_GetVersion():
|
|
999
1029
|
dwBuild = ((dwVersion & 0xffff0000) >> 16)
|
1000
1030
|
return type('Version', (object,), dict(dwMajorVersion = dwMajorVersion, dwMinorVersion = dwMinorVersion, dwBuild = dwBuild))
|
1001
1031
|
|
1032
|
+
def enable_privilege(name, enable=True):
|
1033
|
+
TOKEN_ALL_ACCESS = 0xf01ff
|
1034
|
+
SE_PRIVILEGE_ENABLED = 0x00000002
|
1035
|
+
|
1036
|
+
GetCurrentProcess = ctypes.windll.kernel32.GetCurrentProcess
|
1037
|
+
GetCurrentProcess.restype = ctypes.c_void_p
|
1038
|
+
|
1039
|
+
OpenProcessToken = ctypes.windll.advapi32.OpenProcessToken
|
1040
|
+
OpenProcessToken.argtypes = [ctypes.c_void_p, ctypes.c_uint32, ctypes.POINTER(ctypes.c_void_p)]
|
1041
|
+
OpenProcessToken.restype = ctypes.c_bool
|
1042
|
+
|
1043
|
+
LookupPrivilegeValue = ctypes.windll.advapi32.LookupPrivilegeValueW
|
1044
|
+
LookupPrivilegeValue.argtypes = [ctypes.c_wchar_p, ctypes.c_wchar_p, ctypes.POINTER(LUID)]
|
1045
|
+
LookupPrivilegeValue.restype = ctypes.c_bool
|
1046
|
+
|
1047
|
+
AdjustTokenPrivileges = ctypes.windll.advapi32.AdjustTokenPrivileges
|
1048
|
+
AdjustTokenPrivileges.argtypes = [ctypes.c_void_p, ctypes.c_bool, PTOKEN_PRIVILEGES, ctypes.c_uint32, PTOKEN_PRIVILEGES, ctypes.POINTER(ctypes.c_uint32)]
|
1049
|
+
AdjustTokenPrivileges.restype = ctypes.c_bool
|
1050
|
+
|
1051
|
+
token = ctypes.c_void_p()
|
1052
|
+
success = OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, token)
|
1053
|
+
if not success:
|
1054
|
+
return False
|
1055
|
+
|
1056
|
+
luid = LUID()
|
1057
|
+
name = ctypes.create_unicode_buffer(name)
|
1058
|
+
success = LookupPrivilegeValue(None, name, luid)
|
1059
|
+
if not success:
|
1060
|
+
return False
|
1061
|
+
|
1062
|
+
size = ctypes.sizeof(TOKEN_PRIVILEGES)
|
1063
|
+
size += ctypes.sizeof(LUID_AND_ATTRIBUTES)
|
1064
|
+
buffer = ctypes.create_string_buffer(size)
|
1065
|
+
tokenPrivileges = ctypes.cast(buffer, PTOKEN_PRIVILEGES).contents
|
1066
|
+
tokenPrivileges.PrivilegeCount = 1
|
1067
|
+
tokenPrivileges.get_array()[0].Luid = luid
|
1068
|
+
tokenPrivileges.get_array()[0].Attributes = SE_PRIVILEGE_ENABLED if enable else 0
|
1069
|
+
return AdjustTokenPrivileges(token, False, tokenPrivileges, 0, None, None)
|
1070
|
+
|
1002
1071
|
@register_function
|
1003
1072
|
def channel_open_stdapi_fs_file(request, response):
|
1004
1073
|
fpath = packet_get_tlv(request, TLV_TYPE_FILE_PATH)['value']
|
@@ -1335,6 +1404,23 @@ def stdapi_sys_process_get_processes(request, response):
|
|
1335
1404
|
return stdapi_sys_process_get_processes_via_ps(request, response)
|
1336
1405
|
return ERROR_FAILURE, response
|
1337
1406
|
|
1407
|
+
@register_function_if(has_windll)
|
1408
|
+
def stdapi_sys_power_exitwindows(request, response):
|
1409
|
+
SE_SHUTDOWN_NAME = "SeShutdownPrivilege"
|
1410
|
+
|
1411
|
+
flags = packet_get_tlv(request, TLV_TYPE_POWER_FLAGS)['value']
|
1412
|
+
reason = packet_get_tlv(request, TLV_TYPE_POWER_REASON)['value']
|
1413
|
+
|
1414
|
+
if not enable_privilege(SE_SHUTDOWN_NAME):
|
1415
|
+
return error_result_windows(), response
|
1416
|
+
|
1417
|
+
ExitWindowsEx = ctypes.windll.user32.ExitWindowsEx
|
1418
|
+
ExitWindowsEx.argtypes = [ctypes.c_uint32, ctypes.c_ulong]
|
1419
|
+
ExitWindowsEx.restype = ctypes.c_int8
|
1420
|
+
if not ExitWindowsEx(flags, reason):
|
1421
|
+
return error_result_windows(), response
|
1422
|
+
return ERROR_SUCCESS, response
|
1423
|
+
|
1338
1424
|
@register_function_if(has_windll)
|
1339
1425
|
def stdapi_sys_eventlog_open(request, response):
|
1340
1426
|
source_name = packet_get_tlv(request, TLV_TYPE_EVENT_SOURCENAME)['value']
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.99
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2022-
|
99
|
+
date: 2022-11-07 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
@@ -1,3 +1,2 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
��6l�7~���3�{��DUHՃ ��d6Yn���R���7��Li�SO�I��̡�p�8��5L��~p,����3�Ff�7��$���n57
|
1
|
+
�( �!�3o��k1�I&6io�rPGO��XK�Y��U9|
|
2
|
+
�
|