rex-socket 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/.gitignore +9 -0
- data/.rspec +2 -0
- data/.travis.yml +5 -0
- data/CODE_OF_CONDUCT.md +49 -0
- data/Gemfile +4 -0
- data/README.md +32 -0
- data/Rakefile +6 -0
- data/bin/console +14 -0
- data/bin/setup +8 -0
- data/lib/rex/socket.rb +798 -0
- data/lib/rex/socket/comm.rb +120 -0
- data/lib/rex/socket/comm/local.rb +529 -0
- data/lib/rex/socket/ip.rb +132 -0
- data/lib/rex/socket/parameters.rb +372 -0
- data/lib/rex/socket/range_walker.rb +470 -0
- data/lib/rex/socket/ssh_factory.rb +46 -0
- data/lib/rex/socket/ssl_tcp.rb +374 -0
- data/lib/rex/socket/ssl_tcp_server.rb +220 -0
- data/lib/rex/socket/subnet_walker.rb +76 -0
- data/lib/rex/socket/switch_board.rb +289 -0
- data/lib/rex/socket/tcp.rb +79 -0
- data/lib/rex/socket/tcp_server.rb +70 -0
- data/lib/rex/socket/udp.rb +165 -0
- data/lib/rex/socket/version.rb +5 -0
- data/lib/rex/socket/x509_certificate.rb +92 -0
- data/rex-socket.gemspec +30 -0
- metadata +205 -0
- metadata.gz.sig +2 -0
@@ -0,0 +1,165 @@
|
|
1
|
+
# -*- coding: binary -*-
|
2
|
+
require 'rex/socket'
|
3
|
+
|
4
|
+
###
|
5
|
+
#
|
6
|
+
# This class provides methods for interacting with a UDP socket.
|
7
|
+
#
|
8
|
+
###
|
9
|
+
module Rex::Socket::Udp
|
10
|
+
|
11
|
+
include Rex::Socket
|
12
|
+
|
13
|
+
##
|
14
|
+
#
|
15
|
+
# Factory
|
16
|
+
#
|
17
|
+
##
|
18
|
+
|
19
|
+
#
|
20
|
+
# Creates the client using the supplied hash.
|
21
|
+
#
|
22
|
+
def self.create(hash = {})
|
23
|
+
hash['Proto'] = 'udp'
|
24
|
+
# If we have are to bind to a LocalHost we must be a Server to avail of pivoting.
|
25
|
+
# Rex::Socket::Parameters will subsequently turn off the sever flag after the correct
|
26
|
+
# comm has been chosen.
|
27
|
+
if( hash['LocalHost'] )
|
28
|
+
hash['Server'] = true
|
29
|
+
end
|
30
|
+
self.create_param(Rex::Socket::Parameters.from_hash(hash))
|
31
|
+
end
|
32
|
+
|
33
|
+
#
|
34
|
+
# Wrapper around the base socket class' creation method that automatically
|
35
|
+
# sets the parameter's protocol to UDP.
|
36
|
+
#
|
37
|
+
def self.create_param(param)
|
38
|
+
param.proto = 'udp'
|
39
|
+
Rex::Socket.create_param(param)
|
40
|
+
end
|
41
|
+
|
42
|
+
##
|
43
|
+
#
|
44
|
+
# UDP connected state methods
|
45
|
+
#
|
46
|
+
##
|
47
|
+
|
48
|
+
#
|
49
|
+
# Write the supplied datagram to the connected UDP socket.
|
50
|
+
#
|
51
|
+
def write(gram)
|
52
|
+
begin
|
53
|
+
return syswrite(gram)
|
54
|
+
rescue ::Errno::EHOSTUNREACH,::Errno::ENETDOWN,::Errno::ENETUNREACH,::Errno::ENETRESET,::Errno::EHOSTDOWN,::Errno::EACCES,::Errno::EINVAL,::Errno::EADDRNOTAVAIL
|
55
|
+
return nil
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
alias put write
|
60
|
+
|
61
|
+
#
|
62
|
+
# Read a datagram from the UDP socket.
|
63
|
+
#
|
64
|
+
def read(length = 65535)
|
65
|
+
if length < 0
|
66
|
+
length = 65535
|
67
|
+
end
|
68
|
+
return sysread(length)
|
69
|
+
end
|
70
|
+
|
71
|
+
#
|
72
|
+
# Read a datagram from the UDP socket with a timeout
|
73
|
+
#
|
74
|
+
def timed_read(length = 65535, timeout=def_read_timeout)
|
75
|
+
begin
|
76
|
+
if ((rv = ::IO.select([ fd ], nil, nil, timeout)) and
|
77
|
+
(rv[0]) and (rv[0][0] == fd)
|
78
|
+
)
|
79
|
+
return read(length)
|
80
|
+
else
|
81
|
+
return ''
|
82
|
+
end
|
83
|
+
rescue Exception
|
84
|
+
return ''
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
#alias send write
|
89
|
+
#alias recv read
|
90
|
+
|
91
|
+
##
|
92
|
+
#
|
93
|
+
# UDP non-connected state methods
|
94
|
+
#
|
95
|
+
##
|
96
|
+
|
97
|
+
#
|
98
|
+
# Sends a datagram to the supplied host:port with optional flags.
|
99
|
+
#
|
100
|
+
def sendto(gram, peerhost, peerport, flags = 0)
|
101
|
+
|
102
|
+
# Catch unconnected IPv6 sockets talking to IPv4 addresses
|
103
|
+
peer = Rex::Socket.resolv_nbo(peerhost)
|
104
|
+
if (peer.length == 4 and self.ipv == 6)
|
105
|
+
peerhost = Rex::Socket.getaddress(peerhost, true)
|
106
|
+
if peerhost[0,7].downcase != '::ffff:'
|
107
|
+
peerhost = '::ffff:' + peerhost
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
begin
|
112
|
+
send(gram, flags, Rex::Socket.to_sockaddr(peerhost, peerport))
|
113
|
+
rescue ::Errno::EHOSTUNREACH,::Errno::ENETDOWN,::Errno::ENETUNREACH,::Errno::ENETRESET,::Errno::EHOSTDOWN,::Errno::EACCES,::Errno::EINVAL,::Errno::EADDRNOTAVAIL
|
114
|
+
return nil
|
115
|
+
end
|
116
|
+
|
117
|
+
end
|
118
|
+
|
119
|
+
#
|
120
|
+
# Receives a datagram and returns the data and host:port of the requestor
|
121
|
+
# as [ data, host, port ].
|
122
|
+
#
|
123
|
+
def recvfrom(length = 65535, timeout=def_read_timeout)
|
124
|
+
|
125
|
+
begin
|
126
|
+
if ((rv = ::IO.select([ fd ], nil, nil, timeout)) and
|
127
|
+
(rv[0]) and (rv[0][0] == fd)
|
128
|
+
)
|
129
|
+
data, saddr = recvfrom_nonblock(length)
|
130
|
+
af, host, port = Rex::Socket.from_sockaddr(saddr)
|
131
|
+
|
132
|
+
return [ data, host, port ]
|
133
|
+
else
|
134
|
+
return [ '', nil, nil ]
|
135
|
+
end
|
136
|
+
rescue ::Timeout::Error
|
137
|
+
return [ '', nil, nil ]
|
138
|
+
rescue ::Interrupt
|
139
|
+
raise $!
|
140
|
+
rescue ::Exception
|
141
|
+
return [ '', nil, nil ]
|
142
|
+
end
|
143
|
+
end
|
144
|
+
|
145
|
+
#
|
146
|
+
# Calls recvfrom and only returns the data
|
147
|
+
#
|
148
|
+
def get(timeout=nil)
|
149
|
+
data, saddr, sport = recvfrom(65535, timeout)
|
150
|
+
return data
|
151
|
+
end
|
152
|
+
|
153
|
+
#
|
154
|
+
# The default number of seconds to wait for a read operation to timeout.
|
155
|
+
#
|
156
|
+
def def_read_timeout
|
157
|
+
10
|
158
|
+
end
|
159
|
+
|
160
|
+
def type?
|
161
|
+
return 'udp'
|
162
|
+
end
|
163
|
+
|
164
|
+
end
|
165
|
+
|
@@ -0,0 +1,92 @@
|
|
1
|
+
# -*- coding: binary -*-
|
2
|
+
|
3
|
+
require 'openssl'
|
4
|
+
|
5
|
+
module Rex
|
6
|
+
module Socket
|
7
|
+
|
8
|
+
###
|
9
|
+
#
|
10
|
+
# This class parses the contents of a PEM-encoded X509 certificate file containing
|
11
|
+
# a private key, a public key, and any appended glue certificates.
|
12
|
+
#
|
13
|
+
###
|
14
|
+
class X509Certificate
|
15
|
+
|
16
|
+
#
|
17
|
+
# Parse a certificate in unified PEM format that contains a private key and
|
18
|
+
# one or more certificates. The first certificate is the primary, while any
|
19
|
+
# additional certificates are treated as intermediary certificates. This emulates
|
20
|
+
# the behavior of web servers like nginx.
|
21
|
+
#
|
22
|
+
# @param [String] ssl_cert
|
23
|
+
# @return [String, String, Array]
|
24
|
+
def self.parse_pem(ssl_cert)
|
25
|
+
cert = nil
|
26
|
+
key = nil
|
27
|
+
chain = nil
|
28
|
+
|
29
|
+
certs = []
|
30
|
+
ssl_cert.scan(/-----BEGIN\s*[^\-]+-----+\r?\n[^\-]*-----END\s*[^\-]+-----\r?\n?/nm).each do |pem|
|
31
|
+
if pem =~ /PRIVATE KEY/
|
32
|
+
key = OpenSSL::PKey::RSA.new(pem)
|
33
|
+
elsif pem =~ /CERTIFICATE/
|
34
|
+
certs << OpenSSL::X509::Certificate.new(pem)
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
cert = certs.shift
|
39
|
+
if certs.length > 0
|
40
|
+
chain = certs
|
41
|
+
end
|
42
|
+
|
43
|
+
[key, cert, chain]
|
44
|
+
end
|
45
|
+
|
46
|
+
#
|
47
|
+
# Parse a certificate in unified PEM format from a file
|
48
|
+
#
|
49
|
+
# @param [String] ssl_cert_file
|
50
|
+
# @return [String, String, Array]
|
51
|
+
def self.parse_pem_file(ssl_cert_file)
|
52
|
+
data = ''
|
53
|
+
::File.open(ssl_cert_file, 'rb') do |fd|
|
54
|
+
data << fd.read(fd.stat.size)
|
55
|
+
end
|
56
|
+
parse_pem(data)
|
57
|
+
end
|
58
|
+
|
59
|
+
#
|
60
|
+
# Parse a certificate in unified PEM format and retrieve
|
61
|
+
# the SHA1 hash.
|
62
|
+
#
|
63
|
+
# @param [String] ssl_cert
|
64
|
+
# @return [String]
|
65
|
+
def self.get_cert_hash(ssl_cert)
|
66
|
+
hcert = parse_pem(ssl_cert)
|
67
|
+
|
68
|
+
unless hcert and hcert[0] and hcert[1]
|
69
|
+
raise ArgumentError, "Could not parse a private key and certificate"
|
70
|
+
end
|
71
|
+
|
72
|
+
Rex::Text.sha1_raw(hcert[1].to_der)
|
73
|
+
end
|
74
|
+
|
75
|
+
#
|
76
|
+
# Parse a file that contains a certificate in unified PEM
|
77
|
+
# format and retrieve the SHA1 hash.
|
78
|
+
#
|
79
|
+
# @param [String] ssl_cert_file
|
80
|
+
# @return [String]
|
81
|
+
def self.get_cert_file_hash(ssl_cert_file)
|
82
|
+
data = ''
|
83
|
+
::File.open(ssl_cert_file, 'rb') do |fd|
|
84
|
+
data << fd.read(fd.stat.size)
|
85
|
+
end
|
86
|
+
get_cert_hash(data)
|
87
|
+
end
|
88
|
+
|
89
|
+
end
|
90
|
+
|
91
|
+
end
|
92
|
+
end
|
data/rex-socket.gemspec
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'rex/socket/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "rex-socket"
|
8
|
+
spec.version = Rex::Socket::VERSION
|
9
|
+
spec.authors = ["David Maloney"]
|
10
|
+
spec.email = ["DMaloney@rapid7.com"]
|
11
|
+
|
12
|
+
spec.summary = %q{The Ruby Exploitation (Rex) Socket Abstraction Library.}
|
13
|
+
spec.description = %q{The Ruby Exploitation (Rex) Socket Abstraction Library. This library
|
14
|
+
includes all of the code needed to turn sockets into Rex::Sockets with the functionality
|
15
|
+
for things like L3 pivoting used by Metasploit. }
|
16
|
+
spec.homepage = "https://github.com/rapid7/rex-socket"
|
17
|
+
|
18
|
+
|
19
|
+
|
20
|
+
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
21
|
+
spec.bindir = "exe"
|
22
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
23
|
+
spec.require_paths = ["lib"]
|
24
|
+
|
25
|
+
spec.add_development_dependency "bundler", "~> 1.12"
|
26
|
+
spec.add_development_dependency "rake", "~> 10.0"
|
27
|
+
spec.add_development_dependency "rspec", "~> 3.0"
|
28
|
+
|
29
|
+
spec.add_runtime_dependency "rex-core"
|
30
|
+
end
|
metadata
ADDED
@@ -0,0 +1,205 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: rex-socket
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- David Maloney
|
8
|
+
autorequire:
|
9
|
+
bindir: exe
|
10
|
+
cert_chain:
|
11
|
+
- |
|
12
|
+
-----BEGIN CERTIFICATE-----
|
13
|
+
MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG
|
14
|
+
A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv
|
15
|
+
b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw
|
16
|
+
MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i
|
17
|
+
YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT
|
18
|
+
aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ
|
19
|
+
jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp
|
20
|
+
xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp
|
21
|
+
1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG
|
22
|
+
snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ
|
23
|
+
U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8
|
24
|
+
9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E
|
25
|
+
BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B
|
26
|
+
AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz
|
27
|
+
yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE
|
28
|
+
38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP
|
29
|
+
AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad
|
30
|
+
DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME
|
31
|
+
HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==
|
32
|
+
-----END CERTIFICATE-----
|
33
|
+
- |
|
34
|
+
-----BEGIN CERTIFICATE-----
|
35
|
+
MIIEKDCCAxCgAwIBAgILBAAAAAABL07hNVwwDQYJKoZIhvcNAQEFBQAwVzELMAkG
|
36
|
+
A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv
|
37
|
+
b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw0xMTA0MTMxMDAw
|
38
|
+
MDBaFw0xOTA0MTMxMDAwMDBaMFExCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i
|
39
|
+
YWxTaWduIG52LXNhMScwJQYDVQQDEx5HbG9iYWxTaWduIENvZGVTaWduaW5nIENB
|
40
|
+
IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCyTxTnEL7XJnKr
|
41
|
+
NpfvU79ChF5Y0Yoo/ENGb34oRFALdV0A1zwKRJ4gaqT3RUo3YKNuPxL6bfq2RsNq
|
42
|
+
o7gMJygCVyjRUPdhOVW4w+ElhlI8vwUd17Oa+JokMUnVoqni05GrPjxz7/Yp8cg1
|
43
|
+
0DB7f06SpQaPh+LO9cFjZqwYaSrBXrta6G6V/zuAYp2Zx8cvZtX9YhqCVVrG+kB3
|
44
|
+
jskwPBvw8jW4bFmc/enWyrRAHvcEytFnqXTjpQhU2YM1O46MIwx1tt6GSp4aPgpQ
|
45
|
+
STic0qiQv5j6yIwrJxF+KvvO3qmuOJMi+qbs+1xhdsNE1swMfi9tBoCidEC7tx/0
|
46
|
+
O9dzVB/zAgMBAAGjgfowgfcwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYB
|
47
|
+
Af8CAQAwHQYDVR0OBBYEFAhu2Lacir/tPtfDdF3MgB+oL1B6MEcGA1UdIARAMD4w
|
48
|
+
PAYEVR0gADA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNv
|
49
|
+
bS9yZXBvc2l0b3J5LzAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3JsLmdsb2Jh
|
50
|
+
bHNpZ24ubmV0L3Jvb3QuY3JsMBMGA1UdJQQMMAoGCCsGAQUFBwMDMB8GA1UdIwQY
|
51
|
+
MBaAFGB7ZhpFDZfKiVAvfQTNNKj//P1LMA0GCSqGSIb3DQEBBQUAA4IBAQAiXMXd
|
52
|
+
PfQLcNjj9efFjgkBu7GWNlxaB63HqERJUSV6rg2kGTuSnM+5Qia7O2yX58fOEW1o
|
53
|
+
kdqNbfFTTVQ4jGHzyIJ2ab6BMgsxw2zJniAKWC/wSP5+SAeq10NYlHNUBDGpeA07
|
54
|
+
jLBwwT1+170vKsPi9Y8MkNxrpci+aF5dbfh40r5JlR4VeAiR+zTIvoStvODG3Rjb
|
55
|
+
88rwe8IUPBi4A7qVPiEeP2Bpen9qA56NSvnwKCwwhF7sJnJCsW3LZMMSjNaES2dB
|
56
|
+
fLEDF3gJ462otpYtpH6AA0+I98FrWkYVzSwZi9hwnOUtSYhgcqikGVJwQ17a1kYD
|
57
|
+
sGgOJO9K9gslJO8k
|
58
|
+
-----END CERTIFICATE-----
|
59
|
+
- |
|
60
|
+
-----BEGIN CERTIFICATE-----
|
61
|
+
MIIEyjCCA7KgAwIBAgISESEyE8rNriS4+1dc8jOHEUL8MA0GCSqGSIb3DQEBBQUA
|
62
|
+
MFExCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMScwJQYD
|
63
|
+
VQQDEx5HbG9iYWxTaWduIENvZGVTaWduaW5nIENBIC0gRzIwHhcNMTMxMDExMTUx
|
64
|
+
NTM4WhcNMTYxMDExMTUxNTM4WjBgMQswCQYDVQQGEwJVUzEWMBQGA1UECBMNTWFz
|
65
|
+
c2FjaHVzZXR0czEPMA0GA1UEBxMGQm9zdG9uMRMwEQYDVQQKEwpSYXBpZDcgTExD
|
66
|
+
MRMwEQYDVQQDEwpSYXBpZDcgTExDMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
|
67
|
+
CgKCAQEAhD//7+739c69hssg0mD6CXgf2JkuWTcU81dgD7aKcoEPqU8e1FseBvDW
|
68
|
+
/Q5fNK2H2NgHV/Msn18zXuK0PkaJXqj/vDsuKB3Hq0BiR2AwyDdEw8K5MK5bgQc2
|
69
|
+
tmcVtEAejRoy1Uv5UyfaAYAxG6zsma3buV1fjnEAC3VouRg4+EX/f65H/a6srntK
|
70
|
+
5Etp3D71k2f0oUl8dOqOmSsRJQQ5zSs4ktDvpjAmsvzoA+1svceLYU95mvQsIw2T
|
71
|
+
edpmibGMwGw/HmgV+YWBgF5UGvax6zbC2i6DF2YHnDfkNb8/1MEIaxOTAbJTazTK
|
72
|
+
8laCQOyay6L1BNPQKjZBgOge8LZq1wIDAQABo4IBizCCAYcwDgYDVR0PAQH/BAQD
|
73
|
+
AgeAMEwGA1UdIARFMEMwQQYJKwYBBAGgMgEyMDQwMgYIKwYBBQUHAgEWJmh0dHBz
|
74
|
+
Oi8vd3d3Lmdsb2JhbHNpZ24uY29tL3JlcG9zaXRvcnkvMAkGA1UdEwQCMAAwEwYD
|
75
|
+
VR0lBAwwCgYIKwYBBQUHAwMwPgYDVR0fBDcwNTAzoDGgL4YtaHR0cDovL2NybC5n
|
76
|
+
bG9iYWxzaWduLmNvbS9ncy9nc2NvZGVzaWduZzIuY3JsMIGGBggrBgEFBQcBAQR6
|
77
|
+
MHgwQAYIKwYBBQUHMAKGNGh0dHA6Ly9zZWN1cmUuZ2xvYmFsc2lnbi5jb20vY2Fj
|
78
|
+
ZXJ0L2dzY29kZXNpZ25nMi5jcnQwNAYIKwYBBQUHMAGGKGh0dHA6Ly9vY3NwMi5n
|
79
|
+
bG9iYWxzaWduLmNvbS9nc2NvZGVzaWduZzIwHQYDVR0OBBYEFE536JwFx9SpaEi3
|
80
|
+
w8pcq2GRFA5BMB8GA1UdIwQYMBaAFAhu2Lacir/tPtfDdF3MgB+oL1B6MA0GCSqG
|
81
|
+
SIb3DQEBBQUAA4IBAQAGpGXHtFLjTTivV+xQPwtZhfPuJ7f+VGTMSAAYWmfzyHXM
|
82
|
+
YMFYUWJzSFcuVR2YfxtbS45P7U5Qopd7jBQ0Ygk5h2a+B5nE4+UlhHj665d0zpYM
|
83
|
+
1eWndMaO6WBOYnqtNyi8Dqqc1foKZDNHEDggYhGso7OIBunup+N4sPL9PwQ3eYe6
|
84
|
+
mUu8z0E4GXYViaMPOFkqaYnoYgf2L+7L5zKYT4h/NE/P7kj7EbduHgy/v/aAIrNl
|
85
|
+
2SpuQH+SWteq3NXkAmFEEqvLJQ4sbptZt8OP8ghL3pVAvZNFmww/YVszSkShSzcg
|
86
|
+
QdihYCSEL2drS2cFd50jBeq71sxUtxbv82DUa2b+
|
87
|
+
-----END CERTIFICATE-----
|
88
|
+
date: 2016-08-26 00:00:00.000000000 Z
|
89
|
+
dependencies:
|
90
|
+
- !ruby/object:Gem::Dependency
|
91
|
+
name: bundler
|
92
|
+
requirement: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - "~>"
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '1.12'
|
97
|
+
type: :development
|
98
|
+
prerelease: false
|
99
|
+
version_requirements: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - "~>"
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '1.12'
|
104
|
+
- !ruby/object:Gem::Dependency
|
105
|
+
name: rake
|
106
|
+
requirement: !ruby/object:Gem::Requirement
|
107
|
+
requirements:
|
108
|
+
- - "~>"
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '10.0'
|
111
|
+
type: :development
|
112
|
+
prerelease: false
|
113
|
+
version_requirements: !ruby/object:Gem::Requirement
|
114
|
+
requirements:
|
115
|
+
- - "~>"
|
116
|
+
- !ruby/object:Gem::Version
|
117
|
+
version: '10.0'
|
118
|
+
- !ruby/object:Gem::Dependency
|
119
|
+
name: rspec
|
120
|
+
requirement: !ruby/object:Gem::Requirement
|
121
|
+
requirements:
|
122
|
+
- - "~>"
|
123
|
+
- !ruby/object:Gem::Version
|
124
|
+
version: '3.0'
|
125
|
+
type: :development
|
126
|
+
prerelease: false
|
127
|
+
version_requirements: !ruby/object:Gem::Requirement
|
128
|
+
requirements:
|
129
|
+
- - "~>"
|
130
|
+
- !ruby/object:Gem::Version
|
131
|
+
version: '3.0'
|
132
|
+
- !ruby/object:Gem::Dependency
|
133
|
+
name: rex-core
|
134
|
+
requirement: !ruby/object:Gem::Requirement
|
135
|
+
requirements:
|
136
|
+
- - ">="
|
137
|
+
- !ruby/object:Gem::Version
|
138
|
+
version: '0'
|
139
|
+
type: :runtime
|
140
|
+
prerelease: false
|
141
|
+
version_requirements: !ruby/object:Gem::Requirement
|
142
|
+
requirements:
|
143
|
+
- - ">="
|
144
|
+
- !ruby/object:Gem::Version
|
145
|
+
version: '0'
|
146
|
+
description: "The Ruby Exploitation (Rex) Socket Abstraction Library. This library\n
|
147
|
+
\ includes all of the code needed to turn sockets into Rex::Sockets
|
148
|
+
with the functionality\n for things like L3 pivoting used
|
149
|
+
by Metasploit. "
|
150
|
+
email:
|
151
|
+
- DMaloney@rapid7.com
|
152
|
+
executables: []
|
153
|
+
extensions: []
|
154
|
+
extra_rdoc_files: []
|
155
|
+
files:
|
156
|
+
- ".gitignore"
|
157
|
+
- ".rspec"
|
158
|
+
- ".travis.yml"
|
159
|
+
- CODE_OF_CONDUCT.md
|
160
|
+
- Gemfile
|
161
|
+
- README.md
|
162
|
+
- Rakefile
|
163
|
+
- bin/console
|
164
|
+
- bin/setup
|
165
|
+
- lib/rex/socket.rb
|
166
|
+
- lib/rex/socket/comm.rb
|
167
|
+
- lib/rex/socket/comm/local.rb
|
168
|
+
- lib/rex/socket/ip.rb
|
169
|
+
- lib/rex/socket/parameters.rb
|
170
|
+
- lib/rex/socket/range_walker.rb
|
171
|
+
- lib/rex/socket/ssh_factory.rb
|
172
|
+
- lib/rex/socket/ssl_tcp.rb
|
173
|
+
- lib/rex/socket/ssl_tcp_server.rb
|
174
|
+
- lib/rex/socket/subnet_walker.rb
|
175
|
+
- lib/rex/socket/switch_board.rb
|
176
|
+
- lib/rex/socket/tcp.rb
|
177
|
+
- lib/rex/socket/tcp_server.rb
|
178
|
+
- lib/rex/socket/udp.rb
|
179
|
+
- lib/rex/socket/version.rb
|
180
|
+
- lib/rex/socket/x509_certificate.rb
|
181
|
+
- rex-socket.gemspec
|
182
|
+
homepage: https://github.com/rapid7/rex-socket
|
183
|
+
licenses: []
|
184
|
+
metadata: {}
|
185
|
+
post_install_message:
|
186
|
+
rdoc_options: []
|
187
|
+
require_paths:
|
188
|
+
- lib
|
189
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
190
|
+
requirements:
|
191
|
+
- - ">="
|
192
|
+
- !ruby/object:Gem::Version
|
193
|
+
version: '0'
|
194
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
195
|
+
requirements:
|
196
|
+
- - ">="
|
197
|
+
- !ruby/object:Gem::Version
|
198
|
+
version: '0'
|
199
|
+
requirements: []
|
200
|
+
rubyforge_project:
|
201
|
+
rubygems_version: 2.4.8
|
202
|
+
signing_key:
|
203
|
+
specification_version: 4
|
204
|
+
summary: The Ruby Exploitation (Rex) Socket Abstraction Library.
|
205
|
+
test_files: []
|