metasploit-payloads 2.0.108 → 2.0.109

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +45 -2
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8b2e2cb12a89c4b055997fa3dcce68de37ba85753595a53658fcbb6e85c6857f
4
- data.tar.gz: bc026282a9499ede5356004abf9b91affbefdd44d9da805f056dadaa889a44d3
3
+ metadata.gz: a667e59f354834de4c22bab9b2e20964c8da6c69d1a4ef5d90ddc66e45320fa0
4
+ data.tar.gz: 2f10651bd6ade59a0d69c6ebd0ed8c636aceb1c86208827ad3130f9c968857e0
5
5
  SHA512:
6
- metadata.gz: 9a5fe117aa8cc0db6c32911912814d5367c2fd40ef0fcde3407a47733f46ce483c213045fa50cfca561420064fdf4963eb530eb3d2fd6db050aff079af4a292a
7
- data.tar.gz: 4cf53ffdd0f3bb5a2413c06a30834d8b5129321a3eb6a397c2b2771bd11b53df2d2deac8c618fb0cadd56b8395e6db42bd04604079255300cc1c4b68bdf1cf43
6
+ metadata.gz: 75d36a853ef6d09e030061d997832e98e31a6f8682b9dda7c8715ef4cf6a91839de11def68602cb4af2fb700ee4ce623b265748d72caee34548e855ebe59858c
7
+ data.tar.gz: 48d8b118e18a02b4415b35377ad9771b9f2a8bb2717e24cdbe2fe90a969727f3e7cf255783a3e08655da9fad1dc208556c6946cd1ff973e344b3237735405d8c
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -2792,7 +2792,6 @@ def stdapi_ui_get_idle_time(request, response):
2792
2792
 
2793
2793
  @register_function_if(has_windll)
2794
2794
  def stdapi_ui_desktop_enum(request, response):
2795
-
2796
2795
  response_parts = []
2797
2796
  if ctypes.sizeof(ctypes.c_long) == ctypes.sizeof(ctypes.c_void_p):
2798
2797
  LPARAM = ctypes.c_long
@@ -2830,7 +2829,7 @@ def stdapi_ui_desktop_enum(request, response):
2830
2829
  ProcessIdToSessionId = ctypes.windll.kernel32.ProcessIdToSessionId
2831
2830
  ProcessIdToSessionId.argtypes = [ctypes.c_ulong, ctypes.POINTER(ctypes.c_ulong)]
2832
2831
  ProcessIdToSessionId.restype = ctypes.c_bool
2833
-
2832
+
2834
2833
  if not ProcessIdToSessionId(ctypes.c_ulong(pid), ctypes.byref(dwSessionId)):
2835
2834
  dwSessionId = ctypes.c_ulong(-1)
2836
2835
 
@@ -2876,6 +2875,50 @@ def stdapi_ui_desktop_enum(request, response):
2876
2875
 
2877
2876
  return ERROR_SUCCESS, response
2878
2877
 
2878
+ @register_function_if(has_windll)
2879
+ def stdapi_ui_desktop_get(request, response):
2880
+ UOI_NAME = 2
2881
+
2882
+ GetCurrentProcessId = ctypes.windll.kernel32.GetCurrentProcessId
2883
+ GetCurrentProcessId.restype = ctypes.c_ulong
2884
+
2885
+ GetProcessWindowStation = ctypes.windll.user32.GetProcessWindowStation
2886
+ GetProcessWindowStation.restype = ctypes.c_void_p
2887
+
2888
+ GetUserObjectInformationA = ctypes.windll.user32.GetUserObjectInformationA
2889
+ GetUserObjectInformationA.argtypes = [ctypes.c_void_p, ctypes.c_int32, ctypes.c_void_p, ctypes.c_ulong, ctypes.POINTER(ctypes.c_ulong)]
2890
+ GetUserObjectInformationA.restype = ctypes.c_bool
2891
+
2892
+ GetCurrentThreadId = ctypes.windll.kernel32.GetCurrentThreadId
2893
+ GetCurrentThreadId.restype = ctypes.c_ulong
2894
+
2895
+ GetThreadDesktop = ctypes.windll.user32.GetThreadDesktop
2896
+ GetThreadDesktop.argtypes = [ctypes.c_ulong]
2897
+ GetThreadDesktop.restype = ctypes.c_void_p
2898
+
2899
+ ProcessIdToSessionId = ctypes.windll.kernel32.ProcessIdToSessionId
2900
+ ProcessIdToSessionId.argtypes = [ctypes.c_ulong, ctypes.POINTER(ctypes.c_ulong)]
2901
+ ProcessIdToSessionId.restype = ctypes.c_bool
2902
+
2903
+ dwSessionId = ctypes.c_ulong(0)
2904
+ if not ProcessIdToSessionId(GetCurrentProcessId(), ctypes.byref(dwSessionId)):
2905
+ return error_result_windows(), response
2906
+
2907
+ station_name = ctypes.create_string_buffer(bytes(), 256)
2908
+ success = GetUserObjectInformationA(GetProcessWindowStation(), UOI_NAME, ctypes.byref(station_name), 256, None)
2909
+ if not success:
2910
+ return error_result_windows(), response
2911
+
2912
+ desktop_name = ctypes.create_string_buffer(bytes(), 256)
2913
+ success = GetUserObjectInformationA(GetThreadDesktop(GetCurrentThreadId()), UOI_NAME, ctypes.byref(desktop_name), 256, None)
2914
+ if not success:
2915
+ return error_result_windows(), response
2916
+
2917
+ response += tlv_pack(TLV_TYPE_DESKTOP_SESSION, dwSessionId.value)
2918
+ response += tlv_pack(TLV_TYPE_DESKTOP_STATION, station_name.value.decode())
2919
+ response += tlv_pack(TLV_TYPE_DESKTOP_NAME, desktop_name.value.decode())
2920
+ return ERROR_SUCCESS, response
2921
+
2879
2922
  @register_function_if(has_termios and has_fcntl)
2880
2923
  def stdapi_sys_process_set_term_size(request, response):
2881
2924
  channel_id = packet_get_tlv(request, TLV_TYPE_CHANNEL_ID)['value']
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.108'
3
+ VERSION = '2.0.109'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.108
4
+ version: 2.0.109
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-01-19 00:00:00.000000000 Z
99
+ date: 2023-01-30 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file