Add comment to explain the applet delivery methods
parent
641fd3c6ce
commit
79bfdf3ca6
|
@ -166,6 +166,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def generate_html
|
||||
jnlp_uri = "#{get_uri}/#{@jnlp_name}.jnlp"
|
||||
|
||||
# When the browser is IE, the ActvX is used in order to load the malicious JNLP, allowing click2play bypass
|
||||
# Else an <applet> tag is used to load the malicious applet, this time there isn't click2play bypass
|
||||
html = %Q|
|
||||
<html>
|
||||
<body>
|
||||
|
|
Loading…
Reference in New Issue