metasploit-payloads 2.0.119 → 2.0.120

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +1 -2
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +61 -0
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +1 -1
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: b67e513ed92128da0555d06d5700100438229971a8750aefac72059efec74eb8
4
- data.tar.gz: 90a3af70071ac13b8b29db40a47868c5221361e14ad21aec997d1cfb52634d03
3
+ metadata.gz: 2ff980455249d53eb739d2cc6ebde4973bc3bf647932a6bc529f99e4f627e843
4
+ data.tar.gz: 1a5d9ba1d7a6cc5f6521b11b8c468b51ea13c2a04bd9b93f903e715ebac0d3de
5
5
  SHA512:
6
- metadata.gz: c961adbd35fd2999240f21e45383fa2ebd11edae361b65858361989ca32decc61d79b0259dcc0892ec65d714baed184f00d16499a6c4d5454599d268511c90ae
7
- data.tar.gz: 7d90eebd468b2f28d536d395e62a29a4f1f342a72fa7141f2c4816887331e7cd5cea21906f8c717fb2b056f09fe316091171ba64170c728f87e7086773e7e95c
6
+ metadata.gz: 5b74e3680e087cb1c25f0fb69fcca0ade906ac587aa22926182c9dad92656346677a0eda6d0a9fd152dbae418e8944be471d9c962ef64bff0bc1f709f25e16fe
7
+ data.tar.gz: 578453774bcf09f5cd5f413efcd2a898424b2ab74ebc646d0d568276d68f2df9e5fcd9c152f26da08848a6d44d4f714b952bfb8c16270f711ca3b1847d9d282a
checksums.yaml.gz.sig CHANGED
@@ -1,2 +1 @@
1
- �sTRg��M����}Ă=���s�=Ŷ��FR*�6g^�~;�l`�/A_�}CQOU�jivI�%<���6Ȉ�t=R�>ޔl߂�
2
- ��S���g)!�p󕶫����#�X��3�ØE��wĪ���Z]%v����!��(1�֍%Kt>C�#�@�C#� ��C�6ƴ�����w�H)� `���d�ذ\�^��F6����\a;zQ�@Ô��� D��c>f��xjz��"(� L����E�����m]M��m�
1
+ e:zGY���e1T�ʊ�����Z}J����%.&�1$��Z9��F5���/���jq�I(H`Kˬ�⦽�/��Q9���8����5��S��m1�hr��Ph���IS�� �0.�M��w�O����J�;�p2�*�����<�D|��/dœ��C?,鑜q?o�B����'~(ߪ�;���F�@(i�����\�07"�:q�c߀:���.ꈅ�aR}�*��IZ��C�$l-�ڧ�DY'5A��qum~z
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -728,6 +728,7 @@ ERROR_FAILURE = 1
728
728
  ERROR_INSUFFICIENT_BUFFER = 0x0000007a
729
729
  ERROR_NOT_SUPPORTED = 0x00000032
730
730
  ERROR_NO_DATA = 0x000000e8
731
+ ERROR_INVALID_PARAMETER = 87
731
732
 
732
733
  # Special return value to match up with Windows error codes for network
733
734
  # errors.
@@ -1418,6 +1419,66 @@ def stdapi_sys_process_execute(request, response):
1418
1419
  response += tlv_pack(TLV_TYPE_CHANNEL_ID, channel_id)
1419
1420
  return ERROR_SUCCESS, response
1420
1421
 
1422
+ @register_function_if(has_windll)
1423
+ def stdapi_sys_process_get_info(request, response):
1424
+ proc_h = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1425
+ if not proc_h:
1426
+ return ERROR_INVALID_PARAMETER, response
1427
+
1428
+ MAX_PATH = 260
1429
+
1430
+ EnumProcessModules = ctypes.windll.Psapi.EnumProcessModules
1431
+ EnumProcessModules.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong, ctypes.POINTER(ctypes.c_ulong)]
1432
+ EnumProcessModules.restype = ctypes.c_long
1433
+
1434
+ GetModuleFileNameExW = ctypes.windll.Psapi.GetModuleFileNameExW
1435
+ GetModuleFileNameExW.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong]
1436
+ GetModuleFileNameExW.restype = ctypes.c_ulong
1437
+
1438
+ GetModuleBaseNameW = ctypes.windll.Psapi.GetModuleBaseNameW
1439
+ GetModuleBaseNameW.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong]
1440
+ GetModuleBaseNameW.restype = ctypes.c_ulong
1441
+
1442
+ def enum_process_modules(hProcess):
1443
+ buf_count = 256
1444
+ while True:
1445
+ buffer = (ctypes.c_void_p * buf_count)()
1446
+ buf_size = ctypes.sizeof(buffer)
1447
+ needed = ctypes.c_ulong()
1448
+ if not EnumProcessModules(hProcess, ctypes.byref(buffer), buf_size, ctypes.byref(needed)):
1449
+ raise OSError('EnumProcessModules')
1450
+ if buf_size < needed.value:
1451
+ buf_count = needed.value // (buf_size // buf_count)
1452
+ continue
1453
+ count = needed.value // (buf_size // buf_count)
1454
+ return map(ctypes.c_void_p, buffer[:count])
1455
+
1456
+ def get_module_name(hProcess, hModule):
1457
+ base_name_buffer = ctypes.create_unicode_buffer(MAX_PATH)
1458
+ if not GetModuleBaseNameW(hProcess, hModule, base_name_buffer, MAX_PATH):
1459
+ raise OSError('GetModuleBaseNameW')
1460
+ return base_name_buffer.value
1461
+
1462
+ def get_module_filename(hProcess, hModule):
1463
+ buffer = ctypes.create_unicode_buffer(MAX_PATH)
1464
+ nSize = ctypes.c_ulong(MAX_PATH)
1465
+ if not GetModuleFileNameExW(hProcess, hModule, ctypes.byref(buffer), nSize):
1466
+ raise OSError('GetModuleFileNameExW')
1467
+ return buffer.value
1468
+
1469
+ try:
1470
+ for hModule in enum_process_modules(proc_h):
1471
+ module_name = get_module_name(proc_h, hModule)
1472
+ module_filename = get_module_filename(proc_h, hModule)
1473
+ response += tlv_pack(TLV_TYPE_PROCESS_NAME, module_name)
1474
+ response += tlv_pack(TLV_TYPE_PROCESS_PATH, module_filename)
1475
+ break
1476
+ except OSError as error:
1477
+ debug_print('[-] method stdapi_sys_process_get_info failed on: ' + str(error))
1478
+ return error_result_windows(), response
1479
+
1480
+ return ERROR_SUCCESS, response
1481
+
1421
1482
  @register_function
1422
1483
  def stdapi_sys_process_getpid(request, response):
1423
1484
  response += tlv_pack(TLV_TYPE_PID, os.getpid())
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.119'
3
+ VERSION = '2.0.120'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.119
4
+ version: 2.0.120
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
metadata.gz.sig CHANGED
Binary file