Commit Graph

3458 Commits

Author SHA1 Message Date
Metasploit d08cbb07bd Bump metasploit-payloads to 2.0.167 2024-02-20 12:11:35 -06:00
Christophe De La Fuente 0ee45fa625
Land #698, Update mimikatz 2024-02-20 18:46:13 +01:00
Spencer McIntyre 52d58af59a Update mimikatz to 45c42c71 2024-01-30 16:30:26 -05:00
Metasploit 7ff8ee535f Bump metasploit-payloads to 2.0.166 2024-01-19 11:20:36 -06:00
Spencer McIntyre 1adafcd2fb
Land #694, Use direct syscalls in the RDI loader
This updates the RDI loader used by the Windows Meterpreter to use
direct system calls to prevent questionable behavior from being
identified through hooks implemented by external applications.
2024-01-19 12:05:10 -05:00
Christophe De La Fuente c7abd47585 Update the ReflectiveDLLInjection submodule to the upstream repository 2024-01-19 17:43:25 +01:00
Christophe De La Fuente 83fa146f75
Update ReflectiveDLLInjection submodule to pull in new trampoline detection logic 2024-01-16 18:27:36 +01:00
Christophe De La Fuente 1556007bfd
Update ReflectiveDLLInjection submodule to pull in Win10/8 x86 fix 2024-01-12 19:24:01 +01:00
Christophe De La Fuente a5e33d167d
Remove include DirectSyscall.c 2024-01-10 15:01:19 +01:00
Christophe De La Fuente 7082431dae
Pull in changes from ReflectiveDLLInjection to support direct syscalls
- Includes ColdGate.c in each project
- Change railgun macro name to stdcall_func
- Update VS configs
- Update cmake files for mingw
- Fix cmake files for kiwi builds
- Update ReflectiveDLLInjection module to verify if CI passes
- Update include file names & ReflectiveDLLInjection submodule
2024-01-08 18:53:17 +01:00
Metasploit 6143148e22 Bump metasploit-payloads to 2.0.165 2024-01-08 04:52:57 -06:00
adfoster-r7 e46cdad8e9
Land #693, Fix incorrect Memory Search variable name 2024-01-08 10:39:26 +00:00
sjanusz-r7 aeb6945bd2 Fix incorrect Memory Search variable name 2024-01-08 10:10:16 +00:00
Metasploit d8fb9eaf95 Bump metasploit-payloads to 2.0.164 2024-01-04 11:54:24 -06:00
adfoster-r7 2430d20255
Land #686, Add Windows Memory Search support using regex 2024-01-04 17:41:39 +00:00
sjanusz-r7 4f19a1c4ae Fix Memory Search variable shadowing 2024-01-04 16:34:08 +00:00
Metasploit 1731613130 Bump metasploit-payloads to 2.0.163 2023-12-12 04:44:00 -06:00
adfoster-r7 ea4ac6b392
Land #689, Add github actions for Windows Visual Studio 2019 C Meterpreter payload 2023-12-12 10:29:33 +00:00
sjanusz-r7 92d04de09c Add maximum match length limit to regex matcher 2023-12-11 14:06:32 +00:00
sjanusz-r7 8f51ee7e6d Move defs to top of file, remove pointer-to-pointer, make RegexNeedle contain static-size arrays 2023-12-11 14:06:32 +00:00
sjanusz-r7 72b39289d0 Compile regex in-place, rename CHAR to CHAR_RE due to Windows typedef'ing CHAR, correctly free compiled needle and associated buffer 2023-12-11 14:06:32 +00:00
sjanusz-r7 6e2889d64c Add Windows Memory Search support using regex 2023-12-11 14:06:30 +00:00
adfoster-r7 851e23e07b Add github actions for Windows C Meterpreter payload 2023-12-08 03:01:37 +00:00
Metasploit 6858efcdb8 Bump metasploit-payloads to 2.0.162 2023-12-05 09:42:39 -06:00
bwatters-r7 4810c5cc6a
Land #687, Add version detection for newer Windows
Merge branch 'land-687' into upstream-master
2023-12-05 09:28:06 -06:00
Spencer McIntyre 4e789ee80f Identify Windows Server 2003 as well 2023-11-29 15:56:38 -05:00
Spencer McIntyre 6bedffb29a Add version detection for newer Windows
Add version detection by checking the build number for Server 2019,
Server 2022 and Windows 11.
2023-11-28 13:32:34 -05:00
Metasploit f539248b2e Bump metasploit-payloads to 2.0.161 2023-11-22 10:03:21 -06:00
Spencer McIntyre 9f8a20c8be
Land #685, Fix Java TCP server socket binding
Don't listen on IPv6 when 0.0.0.0 srvhost is requested
2023-11-22 10:49:09 -05:00
Spencer McIntyre e12217d5ed Set line endings to LF as the other files Java use 2023-11-22 10:28:30 -05:00
Ashley Donaldson 167fedee4b Use versioning functionality for this change; also, fix it 2023-11-21 15:28:01 +11:00
Ashley Donaldson 926b6ec6da Don't listen on IPv6 when 0.0.0.0 srvhost is requested 2023-11-20 14:53:20 +11:00
Metasploit 2b3e70ca91 Bump metasploit-payloads to 2.0.160 2023-10-24 09:43:11 -05:00
adfoster-r7 0d77538da2
Land #682, Swap ChaCha20 to AES-256-CBC for at-rest encryption 2023-10-24 15:29:18 +01:00
sjanusz-r7 cf1b82f07e Test AES-256-CBC and ChaCha20 crypto 2023-10-24 14:26:35 +01:00
sjanusz-r7 1bc7e3e3ae Use the correct encrypted payload header in tests 2023-10-24 14:25:49 +01:00
sjanusz-r7 aaf3d1130e Don't run rspec tests twice 2023-10-24 11:53:07 +01:00
sjanusz-r7 1a17ffc65b Allow for backwards-compatible decryption 2023-10-24 11:52:40 +01:00
sjanusz-r7 62c599b2ff Swap ChaCha20 to AES-256-CBC for at-rest encryption 2023-10-24 10:07:07 +01:00
Metasploit bf5bc65b88 Bump metasploit-payloads to 2.0.159 2023-10-16 06:08:07 -05:00
adfoster-r7 5894466c3c
Land #680, Correctly encrypt Java & Android files in Rake task 2023-10-16 11:54:20 +01:00
sjanusz-r7 dddb65e342 Glob directories recursively when copying files 2023-10-16 11:24:30 +01:00
sjanusz-r7 eb5f2bdcd2 Correctly encrypt Java & Android files in Rake task 2023-10-13 16:51:13 +01:00
Metasploit d2808773b5 Bump metasploit-payloads to 2.0.158 2023-10-13 07:19:53 -05:00
adfoster-r7 5d29d8f4d7
Land #679, Add at rest encryption to Meterpreter payloads 2023-10-13 13:01:44 +01:00
sjanusz-r7 1f843612af Use random sequence of bytes for key & iv 2023-10-13 12:52:30 +01:00
sjanusz-r7 4b921c26ff Use a parsable header for at rest encrypted payloads 2023-10-13 12:28:22 +01:00
sjanusz-r7 6c3e6a26a0 Remove redundant receive call 2023-10-13 11:36:02 +01:00
sjanusz-r7 0f146a91a2 Fix hash mismatch by creating a digest of encrypted file contents 2023-10-12 17:19:25 +01:00
sjanusz-r7 10caac0285 Pad encryption header to 64 bytes 2023-10-12 17:11:06 +01:00