add ndkstager to data/exploits

GSoC/Meterpreter_Web_Console
Tim W 2018-10-05 15:10:21 +08:00
parent dbfe67573d
commit 4a4c759a4b
4 changed files with 2 additions and 1 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -114,7 +114,8 @@ module Exploit::Android
# The NDK stager is used to launch a hidden APK # The NDK stager is used to launch a hidden APK
def ndkstager(stagename, arch) def ndkstager(stagename, arch)
data = MetasploitPayloads.read('android', 'libs', NDK_FILES[arch] || arch, 'libndkstager.so') stager_file = File.join( Msf::Config.data_directory, "exploits", "CVE-2012-6636", NDK_FILES[arch] || arch, 'libndkstager.so')
data = File.read(stager_file, {:mode => 'rb'})
data.gsub!('PLOAD', stagename) data.gsub!('PLOAD', stagename)
end end