Java Signed Applet Attack
This attack starts a web server hosting a self-signed Java applet. Visitors are asked to give the applet permission to run. When a visitor grants this permission, you gain access to their system.
The Java Signed Applet Attack uses Cobalt Strike’s Java injector. On Windows, the Java injector will inject shellcode for a Windows listener directly into memory for you
Navigate to Attacks -> Signed Applet Attack.
Parameters
1) Local URL/Host/Path
2) Listener
3) SSL
Press Launch to start the attack.
Last updated