metasploit-payloads 2.0.48 → 2.0.49
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +5 -3
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 310f0933ca0bacbd6aa05e311982746b0ab67f0d124669fd14dc02f4a6a11f15
|
4
|
+
data.tar.gz: be3df4ac77d9de64faae0b0cc38f6f2229164d9f56305e2329f15b87b551e9e6
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ab7dbf2146d40382acdc6ac1fda6aefd03d704f5ddc8a91dd7806942b2896a5796b57b9045251878ba25046b1d2cc8a5896d76f84b87e230b24f183b12822378
|
7
|
+
data.tar.gz: 16480cba21adaeb5d69ec237fdcd84df0da9b7491ce5d57946022aaeba9ddabda39fbb67c5a9b9dd6b36174ecf6dd16933e23d50079a1709189765b2097459b6
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -649,6 +649,7 @@ PROCESS_EXECUTE_FLAG_HIDDEN = (1 << 0)
|
|
649
649
|
PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
|
650
650
|
PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
|
651
651
|
PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
|
652
|
+
PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
|
652
653
|
|
653
654
|
PROCESS_ARCH_UNKNOWN = 0
|
654
655
|
PROCESS_ARCH_X86 = 1
|
@@ -1146,11 +1147,12 @@ def stdapi_sys_process_execute(request, response):
|
|
1146
1147
|
flags = packet_get_tlv(request, TLV_TYPE_PROCESS_FLAGS)['value']
|
1147
1148
|
if len(cmd) == 0:
|
1148
1149
|
return ERROR_FAILURE, response
|
1149
|
-
if os.path.isfile('/bin/sh'):
|
1150
|
-
args = ['/bin/sh', '-c', cmd
|
1150
|
+
if os.path.isfile('/bin/sh') and (flags & PROCESS_EXECUTE_FLAG_SUBSHELL):
|
1151
|
+
args = ['/bin/sh', '-c', cmd, raw_args]
|
1151
1152
|
else:
|
1152
1153
|
args = [cmd]
|
1153
1154
|
args.extend(shlex.split(raw_args))
|
1155
|
+
|
1154
1156
|
if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
|
1155
1157
|
if has_pty:
|
1156
1158
|
master, slave = pty.openpty()
|
@@ -1161,7 +1163,7 @@ def stdapi_sys_process_execute(request, response):
|
|
1161
1163
|
termios.tcsetattr(master, termios.TCSADRAIN, settings)
|
1162
1164
|
except:
|
1163
1165
|
pass
|
1164
|
-
proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0)
|
1166
|
+
proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0, preexec_fn=os.setsid)
|
1165
1167
|
proc_h.stdin = os.fdopen(master, 'wb')
|
1166
1168
|
proc_h.stdout = os.fdopen(master, 'rb')
|
1167
1169
|
proc_h.stderr = open(os.devnull, 'rb')
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.49
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2021-07-
|
99
|
+
date: 2021-07-30 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|