Updated Malicious Java Payload description.
Changed default connect-back host address to the BeEF host address. git-svn-id: https://beef.googlecode.com/svn/trunk@1409 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
@@ -19,8 +19,8 @@ beef:
|
||||
enable: true
|
||||
category: "Exploits"
|
||||
name: "Java Payload"
|
||||
description: "Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.<br/>Before launching it, be sure to have the JavaPayload StagerHandler listening<br/>, i.e.: java javapayload.handler.stager.StagerHandler <payload> <IP> <PORT> -- JSh"
|
||||
description: "Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.<br /><br />Before launching it, be sure to have the JavaPayload StagerHandler listening,<br />i.e.: java javapayload.handler.stager.StagerHandler <payload> <IP> <port> -- JSh<br /><br />Windows Vista is not supported."
|
||||
authors: ["antisnatchor"]
|
||||
target:
|
||||
not_working: ["FF"]
|
||||
user_notify: ["All"]
|
||||
user_notify: ["All"]
|
||||
|
||||
Reference in New Issue
Block a user