Metasploit connection issues fixed. BeEF core now sets every extensions path. The msf extension was also using a path variable. Fixes issue 410
git-svn-id: https://beef.googlecode.com/svn/trunk@1140 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
@@ -24,7 +24,7 @@ beef:
|
||||
metasploit:
|
||||
enable: true
|
||||
host: "127.0.0.1"
|
||||
path: "/RPC2"
|
||||
url-path: "/RPC2"
|
||||
port: 55553
|
||||
user: "msf"
|
||||
pass: "abc123"
|
||||
|
||||
@@ -31,7 +31,7 @@ module Metasploit
|
||||
return if (not @enabled)
|
||||
|
||||
host = @config.get('beef.extension.metasploit.host')
|
||||
path = @config.get('beef.extension.metasploit.path')
|
||||
path = @config.get('beef.extension.metasploit.url-path')
|
||||
port = @config.get('beef.extension.metasploit.port')
|
||||
@un = @config.get('beef.extension.metasploit.user')
|
||||
@pw = @config.get('beef.extension.metasploit.pass')
|
||||
|
||||
Reference in New Issue
Block a user