Skip to content

Module: Java Payload

bcoles edited this page Mar 24, 2019 · 3 revisions

Summary

Inject a malicious signed Java Applet (JavaPayload) that connects back to the attacker giving basic shell commands, command exec and wget.

Before launching it, be sure to have the JavaPayload StagerHandler listening, i.e.: java javapayload.handler.stager.StagerHandler <payload> <IP> <port> -- JSh

Note that modern Java (as of Java 7u51) will outright refuse to execute self-signed Java applets unless they're added to the exception list.

Refer to the README for more information.

Clone this wiki locally