From dfbf747df10b3dc0495e8139d94a7d72a8ddf46b Mon Sep 17 00:00:00 2001 From: TrustedSec Date: Mon, 27 Jun 2016 10:58:49 -0400 Subject: [PATCH] changed the hta payload around for reverse_https --- src/webattack/hta/main.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/webattack/hta/main.py b/src/webattack/hta/main.py index 62010660b..490f7af9a 100644 --- a/src/webattack/hta/main.py +++ b/src/webattack/hta/main.py @@ -15,18 +15,18 @@ def gen_hta_cool_stuff(): port = input("Enter the port for the reverse payload [443]: ") if port == "": port = "443" - print("""Select the payload you want to deliver:\n\n 1. Meterpreter Reverse TCP\n 2. Meterpreter Reverse HTTP\n 3. Meterpreter Reverse HTTPS\n""") + print("""Select the payload you want to deliver:\n\n 1. Meterpreter Reverse HTTPS\n 2. Meterpreter Reverse HTTP\n 3. Meterpreter Reverse TCP\n""") selection = input("Enter the payload number [1-3]: ") # define the payloads if selection == "": - selection = "3" + selection = "1" if selection == "1": - selection = "windows/meterpreter/reverse_tcp" + selection = "windows/meterpreter/reverse_https" if selection == "2": selection = "windows/meterpreter/reverse_http" if selection == "3": - selection = "windows/meterpreter/reverse_https" + selection = "windows/meterpreter/reverse_tcp" # generate powershell code print_status(