metasploit-payloads 2.0.57 → 2.0.58

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  31. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  32. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  34. data/data/meterpreter/meterpreter.py +37 -1
  35. data/data/meterpreter/metsrv.x64.dll +0 -0
  36. data/data/meterpreter/metsrv.x86.dll +0 -0
  37. data/data/meterpreter/screenshot.x64.dll +0 -0
  38. data/data/meterpreter/screenshot.x86.dll +0 -0
  39. data/lib/metasploit-payloads/version.rb +1 -1
  40. data.tar.gz.sig +0 -0
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 828c2137d88b9ecf8a48064976e436f178a4e69bfc3a01b2aac2e880f605e78e
4
- data.tar.gz: b5ee9b456a820e72fa918aafb258347b812469de22f47e0bc01d4ea039100d07
3
+ metadata.gz: a58e73e2dbd154fef6fca2f4ced7bfc6810c553ce18382641439b558f194f4eb
4
+ data.tar.gz: b64ae99e93c956aa973358ebf391d72ef5911a97ccff7285180c118fdfcafd2f
5
5
  SHA512:
6
- metadata.gz: 19d25d6d1db9e626ea6746c59a4d7344a72435e0c36b46357b2e8dfb27361383b3264b38f24038aaeb9fba6607fbbbcbeef017f81437b3dae9c11dcb2c927506
7
- data.tar.gz: a7810ce9c9f07f4438450fb9f2a611a7c4aed844d14035a263784f241074ed773ff4661cf550386839eb939c9ec9adf143d8202161ba969a7f341c2f712ae2e3
6
+ metadata.gz: 033ac0bcf5e8fea4b0a1fe99f4e95c3b7f1004b83071a1bd6c00c03a583550dc0f5ee222007b97da26579c17e97880da2e929412498dedf205a4e2b98febc0d9
7
+ data.tar.gz: 5393ec39455bfb49987c56ef4577a352f3e051646ef4290a7d8f333de433c73f35ed085a1934fdcee5d6248db70f0e124c2cad97c9b712b85b31cd9acae1fab5
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -596,6 +596,16 @@ class MeterpreterChannel(object):
596
596
  response += tlv_pack(TLV_TYPE_LENGTH, self.write(channel_data))
597
597
  return ERROR_SUCCESS, response
598
598
 
599
+ def core_seek(self, request, response):
600
+ offset = packet_get_tlv(request, TLV_TYPE_SEEK_OFFSET)['value']
601
+ whence = packet_get_tlv(request, TLV_TYPE_SEEK_WHENCE)['value']
602
+ self.seek(offset, whence)
603
+ return ERROR_SUCCESS, response
604
+
605
+ def core_tell(self, request, response):
606
+ response += tlv_pack(TLV_TYPE_SEEK_POS, self.tell())
607
+ return ERROR_SUCCESS, response
608
+
599
609
  def close(self):
600
610
  raise NotImplementedError()
601
611
 
@@ -614,6 +624,12 @@ class MeterpreterChannel(object):
614
624
  def write(self, data):
615
625
  raise NotImplementedError()
616
626
 
627
+ def seek(self, offset, whence=os.SEEK_SET):
628
+ raise NotImplementedError()
629
+
630
+ def tell(self):
631
+ raise NotImplementedError()
632
+
617
633
  #@export
618
634
  class MeterpreterFile(MeterpreterChannel):
619
635
  def __init__(self, file_obj):
@@ -632,6 +648,12 @@ class MeterpreterFile(MeterpreterChannel):
632
648
  def write(self, data):
633
649
  self.file_obj.write(data)
634
650
  return len(data)
651
+
652
+ def seek(self, offset, whence=os.SEEK_SET):
653
+ self.file_obj.seek(offset, whence)
654
+
655
+ def tell(self):
656
+ return self.file_obj.tell()
635
657
  export(MeterpreterFile)
636
658
 
637
659
  #@export
@@ -1565,7 +1587,7 @@ class PythonMeterpreter(object):
1565
1587
  return ERROR_FAILURE, response
1566
1588
  channel = self.channels[channel_id]
1567
1589
  status, response = channel.core_eof(request, response)
1568
- return ERROR_SUCCESS, response
1590
+ return status, response
1569
1591
 
1570
1592
  def _core_channel_interact(self, request, response):
1571
1593
  channel_id = packet_get_tlv(request, TLV_TYPE_CHANNEL_ID)['value']
@@ -1605,6 +1627,20 @@ class PythonMeterpreter(object):
1605
1627
  self.handle_dead_resource_channel(channel_id)
1606
1628
  return status, response
1607
1629
 
1630
+ def _core_channel_seek(self, request, response):
1631
+ channel_id = packet_get_tlv(request, TLV_TYPE_CHANNEL_ID)['value']
1632
+ if channel_id not in self.channels:
1633
+ return ERROR_FAILURE, response
1634
+ channel = self.channels[channel_id]
1635
+ return channel.core_seek(request, response)
1636
+
1637
+ def _core_channel_tell(self, request, response):
1638
+ channel_id = packet_get_tlv(request, TLV_TYPE_CHANNEL_ID)['value']
1639
+ if channel_id not in self.channels:
1640
+ return ERROR_FAILURE, response
1641
+ channel = self.channels[channel_id]
1642
+ return channel.core_tell(request, response)
1643
+
1608
1644
  def create_response(self, request):
1609
1645
  response = struct.pack('>I', PACKET_TYPE_RESPONSE)
1610
1646
  commd_id_tlv = packet_get_tlv(request, TLV_TYPE_COMMAND_ID)
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.57'
3
+ VERSION = '2.0.58'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.57
4
+ version: 2.0.58
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-09-27 00:00:00.000000000 Z
99
+ date: 2021-09-28 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file