Gaurav Jain

Results 48 comments of Gaurav Jain

Hey! So I've studied a few other exploits using java payloads and I think we can use metasploit's java payload in the jar form since the jar files should bypass...

@bwatters-r7 can you assign this issue to me?

Hi! I've successfully been able to get a shell using the `java/shell_reverse_tcp` payload(none of the other payloads work). But I've noticed that the payload again uses `getRuntime().exec()` to run commands...

@bwatters-r7 could you please look into the PR and provide some feedback if possible? Thanks.

I don't think this issue has been completely resolved, there are two more modules that need to be modified to use the payload.

Unassigning myself for now since I'm unable to setup the environment to exploit adselfservice plus due to hardware limitations, however I've modified the exploit for adselfservice plus, so if anyone's...

Can you provide additional setup details? What mode are you using? Which website were you trying to access?

~https://github.com/mitmproxy/mitmproxy/pull/7589 should fix this~