metasploit-payloads 2.0.70 → 2.0.71

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.php +32 -1
  29. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  30. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  31. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  33. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  35. data/data/meterpreter/metsrv.x64.dll +0 -0
  36. data/data/meterpreter/metsrv.x86.dll +0 -0
  37. data/data/meterpreter/screenshot.x64.dll +0 -0
  38. data/data/meterpreter/screenshot.x86.dll +0 -0
  39. data/lib/metasploit-payloads/version.rb +1 -1
  40. data.tar.gz.sig +0 -0
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 29090f59f988b40d273c21bc0fb021a35206f52e0ebd9b16b5ae3e67dd7c4f63
4
- data.tar.gz: e8a384302f31872a9eca8f8fa4442168cccb8bac52a85acee495bd2627c5594f
3
+ metadata.gz: 0d0b2154d9c104589060d8d93c4dd2e4b2bce7630447df977bdf58743ba841a6
4
+ data.tar.gz: ec2378bb9a1065e71551bc5217dfe0a1ad57f6a518af3f494202f08a790a753c
5
5
  SHA512:
6
- metadata.gz: 41c2dab60f2bcde25c34bbcaba29fb7348ea267821786fd265433bf279fae05c628e6f70028d4612c7beeba66fa1efff7e56a06d5799f360291e3c6a0bdd102e
7
- data.tar.gz: a1b42fc24b67d5ed77029e576c2d1604a1fd03b91d0527454531d51783baf834755ebd565736a620fa2174fdfed2a8add2bd6759b7f7307c9916679b864c29c9
6
+ metadata.gz: 9013684cf8fcfbf4b2479d1921d2c582dc4f0b8a94ebcd9d7d2fc456504764c8fbf90338dd01ac8e9d83ac1c6bcf949dd860ffde7d1687c91867f38c47e69bab
7
+ data.tar.gz: cef9b94a255e638d87c37c52e4d021a22ad9c3a007383cfe4317efb2f2d2f199f7e55681a0955d266f1dde68f3f8684fe587acbb6eb96963d1af5a2553cee1a4
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -483,6 +483,30 @@ function resolve_host($hostname, $family) {
483
483
  }
484
484
  }
485
485
 
486
+ if (!function_exists('rmtree')) {
487
+ function rmtree($path) {
488
+ $dents = safe_glob($path . '/*');
489
+ foreach ($dents as $dent) {
490
+ if (in_array($dent, array('.','..'))) {
491
+ continue;
492
+ }
493
+
494
+ $subpath = $path . DIRECTORY_SEPARATOR . $dent;
495
+ if (@is_link($subpath)) {
496
+ $ret = unlink($subpath);
497
+ } elseif (@is_dir($subpath)) {
498
+ $ret = rmtree($subpath);
499
+ } else {
500
+ $ret = @unlink($subpath);
501
+ }
502
+ if (!$ret) {
503
+ return false;
504
+ }
505
+ }
506
+ return @rmdir($path);
507
+ }
508
+ }
509
+
486
510
  #
487
511
  # Need to nail down what this should actually do. Ruby's File.expand_path is
488
512
  # for canonicalizing a path (e.g., removing /./ and ../) and expanding "~" into
@@ -533,7 +557,14 @@ register_command('stdapi_fs_delete_dir', COMMAND_ID_STDAPI_FS_DELETE_DIR);
533
557
  function stdapi_fs_delete_dir($req, &$pkt) {
534
558
  my_print("doing rmdir");
535
559
  $path_tlv = packet_get_tlv($req, TLV_TYPE_DIRECTORY_PATH);
536
- $ret = @rmdir(canonicalize_path($path_tlv['value']));
560
+ $path = canonicalize_path($path_tlv['value']);
561
+
562
+ $ret = false;
563
+ if (@is_link($path)) {
564
+ $ret = @unlink($path);
565
+ } elseif (@is_dir($path)) {
566
+ $ret = rmtree($path);
567
+ }
537
568
  return $ret ? ERROR_SUCCESS : ERROR_FAILURE;
538
569
  }
539
570
  }
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.70'
3
+ VERSION = '2.0.71'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.70
4
+ version: 2.0.71
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2022-01-21 00:00:00.000000000 Z
99
+ date: 2022-01-24 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file