From 288b39e37f0a6c591b2a61b12d58e111a186b917 Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Mon, 25 Jul 2016 23:01:44 -0500 Subject: [PATCH] update to mettle 0.0.6 --- Gemfile.lock | 4 ++-- metasploit-framework.gemspec | 2 +- modules/payloads/stages/linux/armle/mettle.rb | 3 ++- 3 files changed, 5 insertions(+), 4 deletions(-) diff --git a/Gemfile.lock b/Gemfile.lock index 00388895bb..9ea972c9d2 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -16,7 +16,7 @@ PATH metasploit-model metasploit-payloads (= 1.1.13) metasploit_data_models - metasploit_payloads-mettle + metasploit_payloads-mettle (= 0.0.6) msgpack net-ssh network_interface @@ -166,7 +166,7 @@ GEM postgres_ext railties (~> 4.2.6) recog (~> 2.0) - metasploit_payloads-mettle (0.0.5) + metasploit_payloads-mettle (0.0.6) method_source (0.8.2) mime-types (3.1) mime-types-data (~> 3.2015) diff --git a/metasploit-framework.gemspec b/metasploit-framework.gemspec index ed176395f3..05e76a9370 100644 --- a/metasploit-framework.gemspec +++ b/metasploit-framework.gemspec @@ -72,7 +72,7 @@ Gem::Specification.new do |spec| # Needed for Meterpreter spec.add_runtime_dependency 'metasploit-payloads', '1.1.13' # Needed for the next-generation POSIX Meterpreter - spec.add_runtime_dependency 'metasploit_payloads-mettle' + spec.add_runtime_dependency 'metasploit_payloads-mettle', '0.0.6' # Needed by msfgui and other rpc components spec.add_runtime_dependency 'msgpack' # get list of network interfaces, like eth* from OS. diff --git a/modules/payloads/stages/linux/armle/mettle.rb b/modules/payloads/stages/linux/armle/mettle.rb index 0faed424b9..89792efc77 100644 --- a/modules/payloads/stages/linux/armle/mettle.rb +++ b/modules/payloads/stages/linux/armle/mettle.rb @@ -5,6 +5,7 @@ require 'msf/core' require 'msf/base/sessions/meterpreter_armle_linux' +require 'msf/base/sessions/meterpreter_options' require 'rex/elfparsey' module MetasploitModule @@ -79,6 +80,6 @@ module MetasploitModule end def generate_stage(_opts = {}) - MetasploitPayloads::Mettle.read('arm-linux-musleabi', 'mettle.bin') + MetasploitPayloads::Mettle.read('armv5l-linux-musleabi', 'mettle.bin') end end