Moved Router and Switch categories under Exploits category
Added Social Engineering category
This commit is contained in:
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
bt_home_hub_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "BT Home Hub CSRF"
|
||||
description: "Attempts to enable remote administration and change the tech password on a BT Home Hub wireless router."
|
||||
authors: ["bcoles"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
comtrend_ct5367_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "Comtrend CT-5367 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5367 router."
|
||||
authors: ["bcoles"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
comtrend_ct5624_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "Comtrend CT-5624 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5624 router."
|
||||
authors: ["bcoles"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
dlink_dsl500t_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "D-Link DSL500T CSRF"
|
||||
description: "Attempts to change the password on a D-Link DSL500T router."
|
||||
authors: ["bcoles"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_befsr41_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "Linksys BEFSR41 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
|
||||
authors: ["Martin Barbella"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_wrt54g2_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "Linksys WRT54G2 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
|
||||
authors: ["Martin Barbella"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_wrt54g_csrf:
|
||||
enable: true
|
||||
category: "Router"
|
||||
category: ["Exploits","Router"]
|
||||
name: "Linksys WRT54G CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
|
||||
authors: ["Martin Barbella"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
Netgear_gs108t_csrf:
|
||||
enable: true
|
||||
category: "Switch"
|
||||
category: ["Exploits","Switch"]
|
||||
name: "Netgear GS108T CSRF"
|
||||
description: "Attempts to change the password on a Netgear GS108T managed switch."
|
||||
authors: ["Bart Leppens"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
google_search:
|
||||
enable: true
|
||||
category: "Browser"
|
||||
category: "Misc"
|
||||
name: "Google Search"
|
||||
description: "This module uses the hooked browser to search Google."
|
||||
authors: ["bcoles"]
|
||||
@@ -340,6 +340,7 @@ Clippy.prototype.hahaha = function() {
|
||||
document.body.appendChild(div);
|
||||
_c.openBubble("<%== @thankyoumessage %>");
|
||||
setTimeout(function () { _c.killClippy(); }, 5000);
|
||||
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=user has accepted');
|
||||
|
||||
}
|
||||
Clippy.prototype.addHelp = function(_help, is_startphrase) {
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
clippy:
|
||||
enable: true
|
||||
category: "Misc"
|
||||
category: "Social Engineering"
|
||||
name: "Clippy"
|
||||
description: "Brings up a clippy image and asks the user to do stuff."
|
||||
authors: ["vt [nick.freeman@security-assessment.com]", "denden [denis.andzakovic@security-assessment.com]"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
pretty_theft:
|
||||
enable: true
|
||||
category: "Misc"
|
||||
category: "Social Engineering"
|
||||
name: "Pretty Theft"
|
||||
description: "Asks the user for their username and password using a tidy floating div."
|
||||
authors: ["vt [nick.freeman@security-assessment.com]", "xntrik"]
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
tabnabbing:
|
||||
enable: true
|
||||
category: "Browser"
|
||||
category: "Social Engineering"
|
||||
name: "TabNabbing"
|
||||
description: "This module redirects to the specified URL after the tab has been inactive for a specified amount of time."
|
||||
authors: ["bcoles"]
|
||||
Reference in New Issue
Block a user