Bump mettle

This commit is contained in:
adfoster-r7
2026-01-16 11:00:03 +00:00
parent c03043dada
commit 350a39c274
21 changed files with 43 additions and 24 deletions
+2 -2
View File
@@ -48,7 +48,7 @@ PATH
metasploit-model
metasploit-payloads (= 2.0.239)
metasploit_data_models (>= 6.0.7)
metasploit_payloads-mettle (= 1.0.45)
metasploit_payloads-mettle (= 1.0.46)
mqtt
msgpack (~> 1.6.0)
mutex_m
@@ -363,7 +363,7 @@ GEM
railties (~> 7.0)
recog
webrick
metasploit_payloads-mettle (1.0.45)
metasploit_payloads-mettle (1.0.46)
method_source (1.1.0)
mime-types (3.7.0)
logger
+1 -1
View File
@@ -76,7 +76,7 @@ Gem::Specification.new do |spec|
# Needed for Meterpreter
spec.add_runtime_dependency 'metasploit-payloads', '2.0.239'
# Needed for the next-generation POSIX Meterpreter
spec.add_runtime_dependency 'metasploit_payloads-mettle', '1.0.45'
spec.add_runtime_dependency 'metasploit_payloads-mettle', '1.0.46'
# Needed by msfgui and other rpc components
# Locked until build env can handle newer version. See: https://github.com/msgpack/msgpack-ruby/issues/334
spec.add_runtime_dependency 'msgpack', '~> 1.6.0'
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1184672
CachedSize = 1184784
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1184672
CachedSize = 1184784
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -6,7 +6,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1184672
CachedSize = 1184784
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -6,7 +6,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106544
CachedSize = 1106688
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -6,7 +6,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106544
CachedSize = 1106688
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -6,7 +6,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106544
CachedSize = 1106688
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106844
CachedSize = 1106988
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106844
CachedSize = 1106988
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1106844
CachedSize = 1106988
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1685392
CachedSize = 1685400
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1685392
CachedSize = 1685400
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1685392
CachedSize = 1685400
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1583440
CachedSize = 1583636
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1583440
CachedSize = 1583636
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1583440
CachedSize = 1583636
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1588440
CachedSize = 1588444
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1588440
CachedSize = 1588444
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
@@ -7,7 +7,7 @@
# Module generated by tools/modules/generate_mettle_payloads.rb
module MetasploitModule
CachedSize = 1588440
CachedSize = 1588444
include Msf::Payload::Single
include Msf::Sessions::MeterpreterOptions::Linux
+22 -3
View File
@@ -2,9 +2,26 @@ require 'spec_helper'
RSpec.describe Msf::Post::Linux::System do
subject do
mod = Msf::Module.new
mod.extend(Msf::Post::Linux::System)
mod
clazz = Class.new(Msf::Module) do
include Msf::Post::Linux::System
def session
raise 'no session present'
end
end
clazz.new
end
let(:session) do
instance_double(
Msf::Sessions::Meterpreter,
type: 'shell',
session_host: '192.0.2.2',
platform: 'linux'
)
end
before(:each) do
allow(subject).to receive(:session).and_return(session)
end
describe '#get_sysinfo' do
@@ -307,6 +324,7 @@ RSpec.describe Msf::Post::Linux::System do
end
it 'raises an error if unable to retrieve hostname' do
allow(subject).to receive(:command_exists?).with('uname').and_return(true)
allow(subject).to receive(:cmd_exec).with('uname -n').and_raise(StandardError)
expect { subject.get_hostname }.to raise_error('Unable to retrieve hostname')
end
@@ -326,6 +344,7 @@ RSpec.describe Msf::Post::Linux::System do
end
it 'raises an error if unable to gather shell name' do
allow(subject).to receive(:command_exists?).with('ps').and_return(true)
allow(subject).to receive(:cmd_exec).with('ps -p $$').and_raise(StandardError)
expect { subject.get_shell_name }.to raise_error('Unable to gather shell name')
end