metasploit-payloads 2.0.48 → 2.0.49

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/data/android/meterpreter.jar +0 -0
  5. data/data/android/metstage.jar +0 -0
  6. data/data/android/shell.jar +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  10. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  14. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  18. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  22. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  26. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.py +5 -3
  30. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  31. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  35. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  36. data/data/meterpreter/metsrv.x64.dll +0 -0
  37. data/data/meterpreter/metsrv.x86.dll +0 -0
  38. data/data/meterpreter/screenshot.x64.dll +0 -0
  39. data/data/meterpreter/screenshot.x86.dll +0 -0
  40. data/lib/metasploit-payloads/version.rb +1 -1
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5b4ebeff606061a918b56af763ae9805ab29e677ed65babebc048750b77e1e64
4
- data.tar.gz: '038ad1767ddd11bcc6f28bde15ba5db94b69cce108ffd125c006849787b2cf02'
3
+ metadata.gz: 310f0933ca0bacbd6aa05e311982746b0ab67f0d124669fd14dc02f4a6a11f15
4
+ data.tar.gz: be3df4ac77d9de64faae0b0cc38f6f2229164d9f56305e2329f15b87b551e9e6
5
5
  SHA512:
6
- metadata.gz: 01147ee86c2d166c2747d956779ad48d56341b7e320f28929512c83def63388adf2a6afa218b3f854fc092b6d7d69261e1fc963b999f6536f151c11f13e0fcbe
7
- data.tar.gz: 37bd7b524e2d7622e9b97dfa6d780aa3490d2dcb0f3ba7b3b40098db9e36664dccad08bd01a8c9908c8323f7c0acd1165185aca466975319495c174fd10c09a3
6
+ metadata.gz: ab7dbf2146d40382acdc6ac1fda6aefd03d704f5ddc8a91dd7806942b2896a5796b57b9045251878ba25046b1d2cc8a5896d76f84b87e230b24f183b12822378
7
+ data.tar.gz: 16480cba21adaeb5d69ec237fdcd84df0da9b7491ce5d57946022aaeba9ddabda39fbb67c5a9b9dd6b36174ecf6dd16933e23d50079a1709189765b2097459b6
checksums.yaml.gz.sig CHANGED
Binary file
data.tar.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -649,6 +649,7 @@ PROCESS_EXECUTE_FLAG_HIDDEN = (1 << 0)
649
649
  PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
650
650
  PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
651
651
  PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
652
+ PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
652
653
 
653
654
  PROCESS_ARCH_UNKNOWN = 0
654
655
  PROCESS_ARCH_X86 = 1
@@ -1146,11 +1147,12 @@ def stdapi_sys_process_execute(request, response):
1146
1147
  flags = packet_get_tlv(request, TLV_TYPE_PROCESS_FLAGS)['value']
1147
1148
  if len(cmd) == 0:
1148
1149
  return ERROR_FAILURE, response
1149
- if os.path.isfile('/bin/sh'):
1150
- args = ['/bin/sh', '-c', cmd + ' ' + raw_args]
1150
+ if os.path.isfile('/bin/sh') and (flags & PROCESS_EXECUTE_FLAG_SUBSHELL):
1151
+ args = ['/bin/sh', '-c', cmd, raw_args]
1151
1152
  else:
1152
1153
  args = [cmd]
1153
1154
  args.extend(shlex.split(raw_args))
1155
+
1154
1156
  if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
1155
1157
  if has_pty:
1156
1158
  master, slave = pty.openpty()
@@ -1161,7 +1163,7 @@ def stdapi_sys_process_execute(request, response):
1161
1163
  termios.tcsetattr(master, termios.TCSADRAIN, settings)
1162
1164
  except:
1163
1165
  pass
1164
- proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0)
1166
+ proc_h = STDProcess(args, stdin=slave, stdout=slave, stderr=slave, bufsize=0, preexec_fn=os.setsid)
1165
1167
  proc_h.stdin = os.fdopen(master, 'wb')
1166
1168
  proc_h.stdout = os.fdopen(master, 'rb')
1167
1169
  proc_h.stderr = open(os.devnull, 'rb')
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.48'
3
+ VERSION = '2.0.49'
4
4
 
5
5
  def self.version
6
6
  VERSION
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.48
4
+ version: 2.0.49
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-07-16 00:00:00.000000000 Z
99
+ date: 2021-07-30 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file