Skip to content

Commit 2b02174

Browse files
committed
Yank Android->jsobfu integration. Not really needed currently.
1 parent b96a7ed commit 2b02174

File tree

3 files changed

+3
-12
lines changed

3 files changed

+3
-12
lines changed

lib/msf/core/exploit/android.rb

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,9 @@
11
# -*- coding: binary -*-
22
require 'msf/core'
3-
require 'msf/core/exploit/jsobfu'
43

54
module Msf
65
module Exploit::Android
76

8-
include Msf::Exploit::JSObfu
9-
107
# Since the NDK stager is used, arch detection must be performed
118
SUPPORTED_ARCHES = [ ARCH_ARMLE, ARCH_MIPSLE, ARCH_X86 ]
129

@@ -23,7 +20,7 @@ module Exploit::Android
2320

2421
def add_javascript_interface_exploit_js(arch)
2522
stagename = Rex::Text.rand_text_alpha(5)
26-
js_obfuscate %Q|
23+
%Q|
2724
function exec(runtime, cmdArr) {
2825
var ch = 0;
2926
var output = '';

modules/exploits/android/browser/webview_addjavascriptinterface.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ def initialize(info = {})
7474
:os_flavor => 'Android'
7575
}
7676
))
77+
78+
deregister_options('JsObfuscate')
7779
end
7880

7981
# Hooked to prevent BrowserExploitServer from attempting to do JS detection

spec/lib/msf/core/exploit/android_spec.rb

Lines changed: 0 additions & 8 deletions
This file was deleted.

0 commit comments

Comments
 (0)