diff --git a/plugins/JavaPwn.py b/plugins/JavaPwn.py index 8cd61db..7fe4206 100644 --- a/plugins/JavaPwn.py +++ b/plugins/JavaPwn.py @@ -22,6 +22,7 @@ class JavaPwn(BrowserProfiler, Plugin): self.options = options self.msfip = options.msfip self.msfport = options.msfport + self.rpcip = options.rpcip if not self.msfip: sys.exit('[-] JavaPwn plugin requires --msfip') @@ -36,7 +37,7 @@ class JavaPwn(BrowserProfiler, Plugin): self.sploited_ips = [] # store ip of pwned or not vulnarable clients so we don't re-exploit try: - msf = msfrpc.Msfrpc({}) #create an instance of msfrpc libarary + msf = msfrpc.Msfrpc({"host" : self.rpcip}) #create an instance of msfrpc libarary msf.login('msf', 'abc123') version = msf.call('core.version')['version'] print "[*] Succesfully connected to Metasploit v%s" % version @@ -165,6 +166,7 @@ class JavaPwn(BrowserProfiler, Plugin): def add_options(self, options): options.add_argument('--msfip', dest='msfip', help='IP Address of MSF') options.add_argument('--msfport', dest='msfport', default='8080', help='Port of MSF web-server [default: 8080]') + options.add_argument('--rpcip', dest='rpcip', default='127.0.0.1', help='IP of MSF MSGRPC server [default: localhost]') def finish(self): '''This will be called when shutting down'''