-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Module: Java Payload
bcoles edited this page Mar 24, 2019
·
3 revisions
Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.
Before launching it, be sure to have the JavaPayload StagerHandler listening, i.e.: java javapayload.handler.stager.StagerHandler <payload> <IP> <port> -- JSh
Note that modern Java (as of Java 7u51) will outright refuse to execute self-signed Java applets unless they're added to the exception list.
Refer to the README for more information.
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK