metasploit-payloads 2.0.104 → 2.0.105

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +33 -15
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +1 -1
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e6ecc9cab0b79200d38b046332bbe62e4859e300a340a40ce4b67f179e206ecc
4
- data.tar.gz: ead5bdae63b7a0420750de525ec873e377e2b9ef77f142b69e924c11a6ee834d
3
+ metadata.gz: 492cb2174246773050bdb8303448ea5f024ccaec9eb89ec14c4670019045a0a5
4
+ data.tar.gz: 82b26b9fa4527322c301bf6a69b894f726ff6ca2e91b2cb019a63444a3ebbf5c
5
5
  SHA512:
6
- metadata.gz: 35dd5a3f541b769b67e66c59b701fbeff29f5626d3a3072255d842cfe419867ad3cb579a0b10231a48e8f2aefdb8e904a78cb6bc3696da241d906d6f1f8b18ba
7
- data.tar.gz: '080dfdd332d9f9fe280e472727a5f5cdb98bbdde4e80715f18fe1f69f04145bb874dfb686a126814224531f661ead4d0bb8d3ec63f08deb0fd2175ce4463d731'
6
+ metadata.gz: 273f6a11ae840e161193c80c9e3048bad2cb2fdd4c264da34213fde52051fadfc59227f04cbe5ffd027b2c8e0bdf23ce5d75ddc2032814f9df859e63294addce
7
+ data.tar.gz: 6c44af6c8672acbbf5b9d32a66c81365e9ea8f60bd49e1099475f31fc50e3d5fd68be0241e8ca41a9526896c445cdb3ae6fe1633fb4a32a8f38acf4a5f9715a2
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1440,7 +1440,10 @@ def stdapi_sys_power_exitwindows(request, response):
1440
1440
  @register_function_if(has_windll)
1441
1441
  def stdapi_sys_eventlog_open(request, response):
1442
1442
  source_name = packet_get_tlv(request, TLV_TYPE_EVENT_SOURCENAME)['value']
1443
- handle = ctypes.windll.advapi32.OpenEventLogW(None, source_name)
1443
+ OpenEventLogA = ctypes.windll.advapi32.OpenEventLogA
1444
+ OpenEventLogA.argtypes = [ctypes.c_char_p, ctypes.c_char_p]
1445
+ OpenEventLogA.restype = ctypes.c_void_p
1446
+ handle = OpenEventLogA(None, bytes(source_name, 'UTF-8'))
1444
1447
  if not handle:
1445
1448
  return error_result_windows(), response
1446
1449
  response += tlv_pack(TLV_TYPE_EVENT_HANDLE, handle)
@@ -1451,13 +1454,15 @@ def stdapi_sys_eventlog_read(request, response):
1451
1454
  handle = packet_get_tlv(request, TLV_TYPE_EVENT_HANDLE)['value']
1452
1455
  flags = packet_get_tlv(request, TLV_TYPE_EVENT_READFLAGS)['value']
1453
1456
  offset = packet_get_tlv(request, TLV_TYPE_EVENT_RECORDOFFSET)['value']
1454
- adv32 = ctypes.windll.advapi32
1455
- bytes_read = ctypes.c_ulong(0)
1456
- bytes_needed = ctypes.c_ulong(0)
1457
- if adv32.ReadEventLogW(handle, flags, offset, ctypes.byref(bytes_read), 0, ctypes.byref(bytes_read), ctypes.byref(bytes_needed)):
1457
+ bytes_read = ctypes.c_uint32(0)
1458
+ bytes_needed = ctypes.c_uint32(0)
1459
+ ReadEventLogA = ctypes.windll.advapi32.ReadEventLogA
1460
+ ReadEventLogA.argtypes = [ctypes.c_void_p, ctypes.c_uint32, ctypes.c_uint32, ctypes.c_void_p, ctypes.c_uint32, ctypes.POINTER(ctypes.c_uint32), ctypes.POINTER(ctypes.c_uint32)]
1461
+ ReadEventLogA.restype = ctypes.c_bool
1462
+ if ReadEventLogA(handle, flags, offset, ctypes.byref(bytes_read), 0, ctypes.byref(bytes_read), ctypes.byref(bytes_needed)):
1458
1463
  return error_result_windows(), response
1459
- buf = ctypes.create_unicode_buffer(bytes_needed.value)
1460
- if not adv32.ReadEventLogW(handle, flags, offset, buf, bytes_needed, ctypes.byref(bytes_read), ctypes.byref(bytes_needed)):
1464
+ buf = (ctypes.c_uint8 * bytes_needed.value)()
1465
+ if not ReadEventLogA(handle, flags, offset, buf, bytes_needed, ctypes.byref(bytes_read), ctypes.byref(bytes_needed)):
1461
1466
  return error_result_windows(), response
1462
1467
  record = ctstruct_unpack(EVENTLOGRECORD, buf)
1463
1468
  response += tlv_pack(TLV_TYPE_EVENT_RECORDNUMBER, record.RecordNumber)
@@ -1466,8 +1471,9 @@ def stdapi_sys_eventlog_read(request, response):
1466
1471
  response += tlv_pack(TLV_TYPE_EVENT_ID, record.EventID)
1467
1472
  response += tlv_pack(TLV_TYPE_EVENT_TYPE, record.EventType)
1468
1473
  response += tlv_pack(TLV_TYPE_EVENT_CATEGORY, record.EventCategory)
1469
- response += tlv_pack(TLV_TYPE_EVENT_DATA, buf.raw[record.DataOffset:record.DataOffset + record.DataLength])
1470
- event_strings = buf.raw[record.StringOffset:].split('\x00', record.NumStrings)
1474
+ response += tlv_pack(TLV_TYPE_EVENT_DATA, ctarray_to_bytes(buf[record.DataOffset:record.DataOffset + record.DataLength]))
1475
+ event_string_buf = (ctypes.c_uint8 * len(buf[record.StringOffset:]))(*buf[record.StringOffset:])
1476
+ event_strings = ctarray_to_bytes(event_string_buf).split(NULL_BYTE, record.NumStrings)[:record.NumStrings]
1471
1477
  for event_string in event_strings:
1472
1478
  response += tlv_pack(TLV_TYPE_EVENT_STRING, event_string)
1473
1479
  return ERROR_SUCCESS, response
@@ -1475,14 +1481,20 @@ def stdapi_sys_eventlog_read(request, response):
1475
1481
  @register_function_if(has_windll)
1476
1482
  def stdapi_sys_eventlog_clear(request, response):
1477
1483
  handle = packet_get_tlv(request, TLV_TYPE_EVENT_HANDLE)['value']
1478
- if not ctypes.windll.advapi32.ClearEventLogW(handle, None):
1484
+ ClearEventLogA = ctypes.windll.advapi32.ClearEventLogA
1485
+ ClearEventLogA.argtypes = [ctypes.c_void_p, ctypes.c_char_p]
1486
+ ClearEventLogA.restype = ctypes.c_bool
1487
+ if not ClearEventLogA(handle, None):
1479
1488
  return error_result_windows(), response
1480
1489
  return ERROR_SUCCESS, response
1481
1490
 
1482
1491
  @register_function_if(has_windll)
1483
1492
  def stdapi_sys_eventlog_numrecords(request, response):
1484
1493
  handle = packet_get_tlv(request, TLV_TYPE_EVENT_HANDLE)['value']
1485
- total = ctypes.c_ulong(0)
1494
+ total = ctypes.c_uint32(0)
1495
+ GetNumberOfEventLogRecords = ctypes.windll.advapi32.GetNumberOfEventLogRecords
1496
+ GetNumberOfEventLogRecords.argtypes = [ctypes.c_void_p, ctypes.POINTER(ctypes.c_uint32)]
1497
+ GetNumberOfEventLogRecords.restype = ctypes.c_bool
1486
1498
  if not ctypes.windll.advapi32.GetNumberOfEventLogRecords(handle, ctypes.byref(total)):
1487
1499
  return error_result_windows(), response
1488
1500
  response += tlv_pack(TLV_TYPE_EVENT_NUMRECORDS, total.value)
@@ -1491,16 +1503,22 @@ def stdapi_sys_eventlog_numrecords(request, response):
1491
1503
  @register_function_if(has_windll)
1492
1504
  def stdapi_sys_eventlog_oldest(request, response):
1493
1505
  handle = packet_get_tlv(request, TLV_TYPE_EVENT_HANDLE)['value']
1494
- oldest = ctypes.c_ulong(0)
1495
- if not ctypes.windll.advapi32.GetOldestEventLogRecordW(handle, ctypes.byref(oldest)):
1506
+ GetOldestEventLogRecord = ctypes.windll.advapi32.GetOldestEventLogRecord
1507
+ GetOldestEventLogRecord.argtypes = [ctypes.c_void_p, ctypes.POINTER(ctypes.c_uint32)]
1508
+ GetOldestEventLogRecord.restype = ctypes.c_bool
1509
+ oldest = ctypes.c_uint32(0)
1510
+ if not GetOldestEventLogRecord(handle, ctypes.byref(oldest)):
1496
1511
  return error_result_windows(), response
1497
- response += tlv_pack(TLV_TYPE_EVENT_RECORDNUMBER, oldest)
1512
+ response += tlv_pack(TLV_TYPE_EVENT_RECORDNUMBER, oldest.value)
1498
1513
  return ERROR_SUCCESS, response
1499
1514
 
1500
1515
  @register_function_if(has_windll)
1501
1516
  def stdapi_sys_eventlog_close(request, response):
1502
1517
  handle = packet_get_tlv(request, TLV_TYPE_EVENT_HANDLE)['value']
1503
- if not ctypes.windll.advapi32.CloseEventLogW(handle):
1518
+ CloseEventLog = ctypes.windll.advapi32.CloseEventLog
1519
+ CloseEventLog.argtypes = [ctypes.c_void_p]
1520
+ CloseEventLog.restype = ctypes.c_bool
1521
+ if not CloseEventLog(handle):
1504
1522
  return error_result_windows(), response
1505
1523
  return ERROR_SUCCESS, response
1506
1524
 
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.104'
3
+ VERSION = '2.0.105'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.104
4
+ version: 2.0.105
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
metadata.gz.sig CHANGED
Binary file