mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-09 04:26:11 +02:00
add ndkstager to data/exploits
This commit is contained in:
parent
dbfe67573d
commit
4a4c759a4b
BIN
data/exploits/CVE-2012-6636/armeabi/libndkstager.so
Normal file
BIN
data/exploits/CVE-2012-6636/armeabi/libndkstager.so
Normal file
Binary file not shown.
BIN
data/exploits/CVE-2012-6636/mips/libndkstager.so
Normal file
BIN
data/exploits/CVE-2012-6636/mips/libndkstager.so
Normal file
Binary file not shown.
BIN
data/exploits/CVE-2012-6636/x86/libndkstager.so
Normal file
BIN
data/exploits/CVE-2012-6636/x86/libndkstager.so
Normal file
Binary file not shown.
@ -114,7 +114,8 @@ module Exploit::Android
|
||||
|
||||
# The NDK stager is used to launch a hidden APK
|
||||
def ndkstager(stagename, arch)
|
||||
data = MetasploitPayloads.read('android', 'libs', NDK_FILES[arch] || arch, 'libndkstager.so')
|
||||
stager_file = File.join( Msf::Config.data_directory, "exploits", "CVE-2012-6636", NDK_FILES[arch] || arch, 'libndkstager.so')
|
||||
data = File.read(stager_file, {:mode => 'rb'})
|
||||
data.gsub!('PLOAD', stagename)
|
||||
end
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user