clean up modules to assist in testing
This commit is contained in:
@@ -8,7 +8,7 @@ beef:
|
||||
get_visited_urls:
|
||||
enable: true
|
||||
category: "Browser"
|
||||
name: "Get Visited URLs"
|
||||
name: "Get Visited URLs (Old Browsers)"
|
||||
description: "This module will detect whether or not the hooked browser has visited the specified URL(s)"
|
||||
authors: ["passbe"]
|
||||
target:
|
||||
|
||||
@@ -8,7 +8,7 @@ beef:
|
||||
site_redirect:
|
||||
enable: true
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Redirect Browser"
|
||||
name: "Redirect Browser (Standard)"
|
||||
description: "This module will redirect the selected hooked browser to the address specified in the 'Redirect URL' input."
|
||||
authors: ["wade", "vo"]
|
||||
target:
|
||||
|
||||
@@ -8,7 +8,7 @@ beef:
|
||||
Shell_shocked:
|
||||
enable: true
|
||||
category: "Exploits"
|
||||
name: "Shell Shock"
|
||||
name: "Shell Shock (CVE-2014-6271)"
|
||||
description: "Attempt to use vulnerability CVE-2014-627 to execute arbitrary code. The default command attempts to get a reverse shell.<br/>Note: Set the LHOST and LPORT."
|
||||
authors: ["Stephane Chazelas", "mz", "radoen"]
|
||||
target:
|
||||
|
||||
@@ -8,7 +8,7 @@ beef:
|
||||
physical_location:
|
||||
enable: true
|
||||
category: "Host"
|
||||
name: "Get Geolocation"
|
||||
name: "Get Geolocation (API)"
|
||||
description: "This module will retrieve the physical location of the hooked browser using the geolocation API."
|
||||
authors: ["antisnatchor"]
|
||||
target:
|
||||
|
||||
@@ -8,7 +8,7 @@ beef:
|
||||
ping_sweep:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Ping Sweep"
|
||||
name: "Ping Sweep (JS XHR)"
|
||||
description: "Discover active hosts in the internal network of the hooked browser using JavaScript XHR.<br/><br/>Note: set the IP address range to 'common' to scan a list of common LAN addresses."
|
||||
authors: ["bcoles"]
|
||||
target:
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
beef:
|
||||
module:
|
||||
ping_sweep_java:
|
||||
enable: true
|
||||
enable: false
|
||||
category: "Network"
|
||||
name: "Ping Sweep (Java)"
|
||||
description: "Discover active hosts in the internal network of the hooked browser. Same logic of the Ping Sweep module, but using an unsigned Java applet to work in browsers other than Firefox.<br> For Firefox, use the normal PingSweep module."
|
||||
|
||||
@@ -8,7 +8,7 @@ beef:
|
||||
port_scanner:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Port Scanner"
|
||||
name: "Port Scanner (Multiple Methods)"
|
||||
description: "Scan ports in a given hostname, using WebSockets, CORS and img tags. It uses the three methods to avoid blocked ports or Same Origin Policy.<br/><br/>Note: The user may see authentication popups in the event any of the target ports are web servers using HTTP authentication."
|
||||
authors: ["javier.marcos"]
|
||||
target:
|
||||
|
||||
@@ -10,7 +10,7 @@ beef:
|
||||
phonegap_persistence:
|
||||
enable: true
|
||||
category: "Phonegap"
|
||||
name: "Persistence"
|
||||
name: "Persistence (PhoneGap)"
|
||||
description: "Insert the BeEF hook into PhoneGap's index.html (iPhone only). This module requires the PhoneGap API."
|
||||
authors: ["mh"]
|
||||
target:
|
||||
|
||||
Reference in New Issue
Block a user