Added missing cloned_page directory to web_cloner. Added readme.txt on that directory. Enabled the social engineering extension by default. Enabled all the obfuscation techniques in the evasion extension config.

This commit is contained in:
antisnatchor
2012-09-17 10:58:07 +01:00
parent 87e3262bae
commit 074ca17e42
4 changed files with 15 additions and 5 deletions

3
.gitignore vendored
View File

@@ -1,4 +1,3 @@
beef.db
test/msf-test
custom-config.yaml
extensions/social_engineering/web_cloner/cloned_pages
custom-config.yaml

View File

@@ -93,7 +93,7 @@ beef:
metasploit:
enable: false
social_engineering:
enable: false
enable: true
evasion:
enable: false
console:

View File

@@ -26,5 +26,4 @@ beef:
beef: "beef"
Beef: "Beef"
evercookie: "evercookie"
#chain: ["scramble", "minify"]
chain: ["minify", "base64", "whitespace"]
chain: ["scramble", "minify", "base_64", "whitespace"]

View File

@@ -0,0 +1,12 @@
This is the directory where the cloned pages will be placed.
If you cloce beefproject.com, there will be 2 files:
- beefproject.com <- original, unmodified
- beefproject.com_mod <- modified one
In case you want to further modify the beefproject.com_mod manually,
and serve it throught BeEF, do the following:
- clone the page
- modify the x_mod file
- clone the same page again, adding the "use_existing":"true" parameter in the RESTful API call.
In this way the x_mod page will be served, with your custom modifications.