Metasploit connection issues fixed. BeEF core now sets every extensions path. The msf extension was also using a path variable. Fixes issue 410

git-svn-id: https://beef.googlecode.com/svn/trunk@1140 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
passbe
2011-07-30 12:04:37 +00:00
parent 1378394142
commit 3797e6bffa
2 changed files with 2 additions and 2 deletions

View File

@@ -24,7 +24,7 @@ beef:
metasploit:
enable: true
host: "127.0.0.1"
path: "/RPC2"
url-path: "/RPC2"
port: 55553
user: "msf"
pass: "abc123"

View File

@@ -31,7 +31,7 @@ module Metasploit
return if (not @enabled)
host = @config.get('beef.extension.metasploit.host')
path = @config.get('beef.extension.metasploit.path')
path = @config.get('beef.extension.metasploit.url-path')
port = @config.get('beef.extension.metasploit.port')
@un = @config.get('beef.extension.metasploit.user')
@pw = @config.get('beef.extension.metasploit.pass')