metasploit-payloads 2.0.127 → 2.0.128

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +44 -0
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: b3a0c97c6a54da93616fb2c82cd7e96e3589eb674f116c3afbc5faf1144b9881
4
- data.tar.gz: 3148ce360fe822dc5f531111b0ebcfdc56534ac1ac9066ce3c84a96987cfe6dc
3
+ metadata.gz: 041f380f68dfb49e3ec0a63ca63d59174d8390a4d34b863640fd7eeff94c486f
4
+ data.tar.gz: 15b20fa5eedfb5516acd6fe6a83dfe3bcfa97c09dd8d76a4cf43d03f092d6cc3
5
5
  SHA512:
6
- metadata.gz: 29be4dadf5ab91ec8a08f9216a316361e8e17b05bf3c43c60ceac4f583aa7f54e59572a4dda9c86046db82d5884017446d630b71d585f9d5ce631a816717acce
7
- data.tar.gz: bc96839b2426047a5d750ba99678de6a186e4d94a595a4787d614c11cbbab7889156787e9a683ff540d92043d9f4827330ccaee634e3b391bc5115f69a10fe75
6
+ metadata.gz: b459d3adf1c68ac866848794bce3945850645f661e2ca9a06ca9c4d35e3b53e3ef70f5b3c5ad4a72003f0758c6e1ad758a257ae00b45f0be3f11ae6d5e3a7e2f
7
+ data.tar.gz: 9b82b7a90b6ba6e2689564c89fbeac9a6bc16c991360f069ca4af63231d1ee301296c169bce285eaab431756a90c61e2f22033e0d020561e586548c81894a9b7
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1663,6 +1663,50 @@ def stdapi_sys_process_memory_unlock(request, response):
1663
1663
  return error_result_windows(), response
1664
1664
  return ERROR_SUCCESS, response
1665
1665
 
1666
+ @register_function_if(has_windll)
1667
+ def stdapi_sys_process_memory_read(request, response):
1668
+ ERROR_PARTIAL_COPY = 229
1669
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1670
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1671
+ size = packet_get_tlv(request, TLV_TYPE_LENGTH).get('value')
1672
+
1673
+ if not (handle and base and size):
1674
+ return ERROR_INVALID_PARAMETER, response
1675
+
1676
+ ReadProcessMemory = ctypes.windll.kernel32.ReadProcessMemory
1677
+ ReadProcessMemory.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.POINTER(ctypes.c_size_t)]
1678
+ ReadProcessMemory.restype = ctypes.c_bool
1679
+
1680
+ buffer = ctypes.create_string_buffer(size)
1681
+ bytes_read = ctypes.c_size_t(0)
1682
+ if (not ReadProcessMemory(handle, base, ctypes.byref(buffer), ctypes.sizeof(buffer), ctypes.byref(bytes_read))) and (ctypes.windll.kernel32.GetLastError() != ERROR_PARTIAL_COPY):
1683
+ return error_result_windows(), response
1684
+
1685
+ readed_data = buffer.raw[:bytes_read.value]
1686
+ response += tlv_pack(TLV_TYPE_PROCESS_MEMORY, readed_data)
1687
+ return ERROR_SUCCESS, response
1688
+
1689
+ @register_function_if(has_windll)
1690
+ def stdapi_sys_process_memory_write(request, response):
1691
+ ERROR_PARTIAL_COPY = 229
1692
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
1693
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
1694
+ data = packet_get_tlv(request, TLV_TYPE_PROCESS_MEMORY).get('value')
1695
+
1696
+ if not (handle and base and data):
1697
+ return ERROR_INVALID_PARAMETER, response
1698
+
1699
+ WriteProcessMemory = ctypes.windll.kernel32.WriteProcessMemory
1700
+ WriteProcessMemory.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.POINTER(ctypes.c_size_t)]
1701
+ WriteProcessMemory.restype = ctypes.c_bool
1702
+
1703
+ written = ctypes.c_size_t(0)
1704
+ if (not WriteProcessMemory(handle, base, data, len(data), ctypes.byref(written))) and (ctypes.windll.kernel32.GetLastError() != ERROR_PARTIAL_COPY):
1705
+ return error_result_windows(), response
1706
+
1707
+ response += tlv_pack(TLV_TYPE_LENGTH, written.value)
1708
+ return ERROR_SUCCESS, response
1709
+
1666
1710
  @register_function_if(has_windll)
1667
1711
  def stdapi_sys_process_memory_free(request, response):
1668
1712
  handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.127'
3
+ VERSION = '2.0.128'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.127
4
+ version: 2.0.128
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-04-20 00:00:00.000000000 Z
99
+ date: 2023-04-26 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file