Land #10851, add ndkstager to data/exploits

GSoC/Meterpreter_Web_Console
Brent Cook 2018-10-23 12:04:57 -05:00
commit b65f467ada
No known key found for this signature in database
GPG Key ID: 1FFAA0B24B708F96
4 changed files with 2 additions and 1 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -114,7 +114,8 @@ module Exploit::Android
# The NDK stager is used to launch a hidden APK # The NDK stager is used to launch a hidden APK
def ndkstager(stagename, arch) def ndkstager(stagename, arch)
data = MetasploitPayloads.read('android', 'libs', NDK_FILES[arch] || arch, 'libndkstager.so') stager_file = File.join( Msf::Config.data_directory, "exploits", "CVE-2012-6636", NDK_FILES[arch] || arch, 'libndkstager.so')
data = File.read(stager_file, {:mode => 'rb'})
data.gsub!('PLOAD', stagename) data.gsub!('PLOAD', stagename)
end end