I was testing out the Java Applet attack on the SET pentest program, but when I click run on the java applet that opens up when accessing the page, my AV (AVAST free version), blocked the executable.
Has anyone had this issue? is there a way to bypass the AV?
FYI: i'm running BT4R2 on a virtual environment. the machine being "attacked" is a windows 7 home premium running Avast free version 5.0.677.
The attack options on the Java Applet attack were Windows Reverse_TCP Meterpreter with Backdoor executable.