Add comment to explain the applet delivery methods

unstable
jvazquez-r7 2013-06-07 14:20:21 -05:00
parent 641fd3c6ce
commit 79bfdf3ca6
1 changed files with 2 additions and 0 deletions

View File

@ -166,6 +166,8 @@ class Metasploit3 < Msf::Exploit::Remote
def generate_html
jnlp_uri = "#{get_uri}/#{@jnlp_name}.jnlp"
# When the browser is IE, the ActvX is used in order to load the malicious JNLP, allowing click2play bypass
# Else an <applet> tag is used to load the malicious applet, this time there isn't click2play bypass
html = %Q|
<html>
<body>