Updated Malicious Java Payload description.

Changed default connect-back host address to the BeEF host address.



git-svn-id: https://beef.googlecode.com/svn/trunk@1409 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
bcoles@gmail.com
2011-11-06 17:11:15 +00:00
parent 3fadfaf258
commit 16c29cdf53
2 changed files with 5 additions and 4 deletions

View File

@@ -19,8 +19,8 @@ beef:
enable: true
category: "Exploits"
name: "Java Payload"
description: "Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.<br/>Before launching it, be sure to have the JavaPayload StagerHandler listening<br/>, i.e.: java javapayload.handler.stager.StagerHandler <payload> <IP> <PORT> -- JSh"
description: "Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.<br /><br />Before launching it, be sure to have the JavaPayload StagerHandler listening,<br />i.e.: java javapayload.handler.stager.StagerHandler &lt;payload&gt; &lt;IP&gt; &lt;port&gt; -- JSh<br /><br />Windows Vista is not supported."
authors: ["antisnatchor"]
target:
not_working: ["FF"]
user_notify: ["All"]
user_notify: ["All"]