Skip to content

Commit a60e578

Browse files
author
Brent Cook
committed
update mettle->meterpreter references in modules
1 parent 12ed3da commit a60e578

File tree

10 files changed

+15
-34
lines changed

10 files changed

+15
-34
lines changed

modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Exploit::Remote
97
Rank = NormalRanking
108

@@ -67,7 +65,7 @@ def initialize(info={})
6765
'Space' => 2048,
6866
'DisableNops' => true,
6967
},
70-
#'DefaultOptions' => { 'PAYLOAD' => 'linux/armle/mettle/reverse_tcp' },
68+
#'DefaultOptions' => { 'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp' },
7169
'Platform' => 'linux',
7270
'Arch' => [ARCH_ARMLE], # TODO: , ARCH_X86, ARCH_X64, ARCH_MIPSLE],
7371
'Targets' =>
@@ -354,7 +352,7 @@ def initialize(info={})
354352
register_options(
355353
[
356354
OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation', false])
357-
], self.class)
355+
])
358356
=end
359357
end
360358

modules/exploits/android/local/futex_requeue.rb

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
require 'rex'
8-
96
class MetasploitModule < Msf::Exploit::Local
107
Rank = ExcellentRanking
118

@@ -39,7 +36,7 @@ def initialize(info={})
3936
'DefaultOptions' =>
4037
{
4138
'WfsDelay' => 300,
42-
'PAYLOAD' => 'linux/armle/mettle/reverse_tcp',
39+
'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp',
4340
},
4441
'DefaultTarget' => 0,
4542
'Targets' => [

modules/exploits/android/local/put_user_vroot.rb

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
require 'rex'
8-
96
class MetasploitModule < Msf::Exploit::Local
107
Rank = ExcellentRanking
118

@@ -44,7 +41,7 @@ def initialize(info={})
4441
'DefaultOptions' =>
4542
{
4643
'WfsDelay' => 120,
47-
'PAYLOAD' => 'linux/armle/mettle/reverse_tcp',
44+
'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp',
4845
},
4946
'DefaultTarget' => 0,
5047
}

modules/exploits/linux/http/dlink_hnap_login_bof.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,13 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
# Payload working status:
97
# MIPS:
108
# - all valid payloads working (the ones that we are able to send without null bytes)
119
# ARM:
1210
# - inline rev/bind shell works (bind... meh sometimes)
1311
# - stager rev/bind shell FAIL
14-
# - mettle rev/bind fails with sigsegv standalone, but works under strace or gdb...
12+
# - meterpreter rev/bind fails with sigsegv standalone, but works under strace or gdb...
1513

1614
class MetasploitModule < Msf::Exploit::Remote
1715
Rank = ExcellentRanking
@@ -95,7 +93,7 @@ def initialize(info = {})
9593
OptString.new('SRVPORT', [true, 'Port for the HTTP server (ARM only)', '3333']),
9694
OptString.new('SHELL', [true, 'Don\'t change this', '/bin/sh']),
9795
OptString.new('SHELLARG', [true, 'Don\'t change this', 'sh']),
98-
], self.class)
96+
])
9997
end
10098

10199
def check

modules/exploits/linux/http/huawei_hg532n_cmdinject.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
76
require 'base64'
87

98
class MetasploitModule < Msf::Exploit::Remote
@@ -40,7 +39,7 @@ def initialize(info = {})
4039
'Privileged' => true,
4140
'DefaultOptions' =>
4241
{
43-
'PAYLOAD' => 'linux/mipsbe/mettle_reverse_tcp'
42+
'PAYLOAD' => 'linux/mipsbe/meterpreter_reverse_tcp'
4443
},
4544
'Targets' =>
4645
[

modules/exploits/linux/http/mvpower_dvr_shell_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ def initialize(info = {})
4545
'Arch' => ARCH_ARMLE,
4646
'DefaultOptions' =>
4747
{
48-
'PAYLOAD' => 'linux/armle/mettle_reverse_tcp',
48+
'PAYLOAD' => 'linux/armle/meterpreter_reverse_tcp',
4949
'CMDSTAGER::FLAVOR' => 'wget'
5050
},
5151
'Targets' =>

modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Exploit::Remote
97

108
Rank = ExcellentRanking
@@ -39,14 +37,14 @@ def initialize(info = {})
3937
'DisclosureDate' => 'Dec 06 2016',
4038
'DefaultOptions' =>
4139
{
42-
'PAYLOAD' => 'linux/armle/mettle_reverse_tcp'
40+
'PAYLOAD' => 'linux/armle/meterpreter_reverse_tcp'
4341
}
4442
))
4543

4644
register_options(
4745
[
4846
Opt::RPORT(80)
49-
], self.class)
47+
])
5048

5149
deregister_options('URIPATH')
5250
end

modules/exploits/linux/local/bpf_priv_esc.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Exploit::Local
97
Rank = GoodRanking
108

@@ -43,7 +41,7 @@ def initialize(info={})
4341
],
4442
'DefaultOptions' =>
4543
{
46-
'payload' => 'linux/x64/mettle/reverse_tcp',
44+
'payload' => 'linux/x64/meterpreter/reverse_tcp',
4745
'PrependFork' => true,
4846
'WfsDelay' => 60 # we can chew up a lot of CPU for this, so we want to give time for payload to come through
4947
},
@@ -56,7 +54,7 @@ def initialize(info={})
5654
OptString.new('WritableDir', [ true, 'A directory where we can write files', '/tmp' ]),
5755
OptEnum.new('COMPILE', [ true, 'Compile on target', 'Auto', ['Auto', 'True', 'False']]),
5856
OptInt.new('MAXWAIT', [ true, 'Max seconds to wait for decrementation in seconds', 120 ])
59-
], self.class)
57+
])
6058
end
6159

6260
def check

modules/exploits/linux/local/ntfs3g_priv_esc.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Exploit::Local
97
Rank = GoodRanking
108

@@ -41,7 +39,7 @@ def initialize(info={})
4139
],
4240
'DefaultOptions' =>
4341
{
44-
'payload' => 'linux/x64/mettle/reverse_tcp',
42+
'payload' => 'linux/x64/meterpreter/reverse_tcp',
4543
'PrependFork' => true,
4644
},
4745
'DefaultTarget' => 1,
@@ -51,7 +49,7 @@ def initialize(info={})
5149
))
5250
register_options([
5351
OptString.new('WritableDir', [ true, 'A directory where we can write files', '/tmp' ])
54-
], self.class)
52+
])
5553
end
5654

5755
def check

modules/exploits/multi/local/allwinner_backdoor.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require "msf/core"
7-
86
class MetasploitModule < Msf::Exploit::Local
97
Rank = ExcellentRanking
108

@@ -35,7 +33,7 @@ def initialize(info = {})
3533
"Platform" => [ "android", "linux" ],
3634
"DisclosureDate" => "Apr 30 2016",
3735
"DefaultOptions" => {
38-
"payload" => "linux/armle/mettle/reverse_tcp"
36+
"payload" => "linux/armle/meterpreter/reverse_tcp"
3937
},
4038
"Privileged" => true,
4139
"Arch" => ARCH_ARMLE,

0 commit comments

Comments
 (0)