Moved Router and Switch categories under Exploits category

Added Social Engineering category
This commit is contained in:
bcoles
2012-05-20 18:32:44 +09:30
parent 56443cfdf4
commit 460b619cc1
36 changed files with 13 additions and 12 deletions

View File

@@ -17,7 +17,7 @@ beef:
module:
bt_home_hub_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "BT Home Hub CSRF"
description: "Attempts to enable remote administration and change the tech password on a BT Home Hub wireless router."
authors: ["bcoles"]

View File

@@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5367_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "Comtrend CT-5367 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5367 router."
authors: ["bcoles"]

View File

@@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5624_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "Comtrend CT-5624 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5624 router."
authors: ["bcoles"]

View File

@@ -17,7 +17,7 @@ beef:
module:
dlink_dsl500t_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "D-Link DSL500T CSRF"
description: "Attempts to change the password on a D-Link DSL500T router."
authors: ["bcoles"]

View File

@@ -17,7 +17,7 @@ beef:
module:
linksys_befsr41_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "Linksys BEFSR41 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
authors: ["Martin Barbella"]

View File

@@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g2_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "Linksys WRT54G2 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
authors: ["Martin Barbella"]

View File

@@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g_csrf:
enable: true
category: "Router"
category: ["Exploits","Router"]
name: "Linksys WRT54G CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
authors: ["Martin Barbella"]

View File

@@ -17,7 +17,7 @@ beef:
module:
Netgear_gs108t_csrf:
enable: true
category: "Switch"
category: ["Exploits","Switch"]
name: "Netgear GS108T CSRF"
description: "Attempts to change the password on a Netgear GS108T managed switch."
authors: ["Bart Leppens"]

View File

@@ -17,7 +17,7 @@ beef:
module:
google_search:
enable: true
category: "Browser"
category: "Misc"
name: "Google Search"
description: "This module uses the hooked browser to search Google."
authors: ["bcoles"]

View File

@@ -340,6 +340,7 @@ Clippy.prototype.hahaha = function() {
document.body.appendChild(div);
_c.openBubble("<%== @thankyoumessage %>");
setTimeout(function () { _c.killClippy(); }, 5000);
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=user has accepted');
}
Clippy.prototype.addHelp = function(_help, is_startphrase) {

View File

@@ -17,7 +17,7 @@ beef:
module:
clippy:
enable: true
category: "Misc"
category: "Social Engineering"
name: "Clippy"
description: "Brings up a clippy image and asks the user to do stuff."
authors: ["vt [nick.freeman@security-assessment.com]", "denden [denis.andzakovic@security-assessment.com]"]

View File

@@ -17,7 +17,7 @@ beef:
module:
pretty_theft:
enable: true
category: "Misc"
category: "Social Engineering"
name: "Pretty Theft"
description: "Asks the user for their username and password using a tidy floating div."
authors: ["vt [nick.freeman@security-assessment.com]", "xntrik"]

View File

@@ -17,7 +17,7 @@ beef:
module:
tabnabbing:
enable: true
category: "Browser"
category: "Social Engineering"
name: "TabNabbing"
description: "This module redirects to the specified URL after the tab has been inactive for a specified amount of time."
authors: ["bcoles"]