beef: module: jboss_jmx_upload_exploit: enable: true category: "Network" name: "Jboss 6.0.0M1 JMX Deploy Exploit" description: "Deploy a JSP reverse shell (Metasploit one) using the JMX exposed deploymentFileRepository MBean of JBoss. The first request made is a HEAD one to bypass auth and deploy the malicious JSP, the second request is a GET one that triggers the reverse connection to the specified MSF listener.
Remember to run the MSF multi/hanlder listener with java/jsp_shell_reverse_tcp as payload." authors: ["antisnatchor", "l33tb0y"] target: working: ["ALL"]