Fixes issue #688
Added spaces to comma delemetered data in config.yaml files This should fix an issue reported to affect Ruby 1.9.2
This commit is contained in:
@@ -22,5 +22,5 @@ beef:
|
||||
description: "This module will retrieve rapid history extraction through non-destructive cache timing.\nBased on work done at http://lcamtuf.coredump.cx/cachetime/"
|
||||
authors: ["keith_lee @keith55 http://milo2012.wordpress.com"]
|
||||
target:
|
||||
working: ["FF","IE"]
|
||||
not_working: ["O","C","S"]
|
||||
working: ["FF", "IE"]
|
||||
not_working: ["O", "C", "S"]
|
||||
|
||||
@@ -17,11 +17,11 @@ beef:
|
||||
module:
|
||||
ajax_fingerprint:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Fingerprint Ajax"
|
||||
description: "Fingerprint Ajax and JS libraries present on the hooked page."
|
||||
authors: ["qswain"]
|
||||
target:
|
||||
working: ["FF","S"]
|
||||
working: ["FF", "S"]
|
||||
not_working: ["C"]
|
||||
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
alert_dialog:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Create Alert Dialog"
|
||||
description: "Sends an alert dialog to the hooked browser."
|
||||
authors: ["wade", "bm"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
deface_web_page:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Replace Content (Deface)"
|
||||
description: "Overwrite the page, title and shortcut icon on the hooked page."
|
||||
authors: ["antisnatchor"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_cookie:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Cookie"
|
||||
description: "This module will retrieve the session cookie from the current page."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_local_storage:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Local Storage"
|
||||
description: "Extracts data from the HTML5 localStorage object."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_page_html:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Page HTML"
|
||||
description: "This module will retrieve the HTML from the current page."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_page_links:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Page HREFs"
|
||||
description: "This module will retrieve HREFs from the target page."
|
||||
authors: ["vo"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_session_storage:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Session Storage"
|
||||
description: "Extracts data from the HTML5 sessionStorage object."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
get_stored_credentials:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Get Stored Credentials"
|
||||
description: "This module retrieves saved username/password combinations from the login page on the hooked domain.<br /><br />It will fail if more than one set of domain credentials are saved in the browser."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
link_rewrite:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Replace HREFs"
|
||||
description: "This module will rewrite all the href attributes of all matched links."
|
||||
authors: ["passbe"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
link_rewrite_sslstrip:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Replace HREFs (HTTPS)"
|
||||
description: "This module will rewrite all the href attributes of HTTPS links to use HTTP instead of HTTPS. Links relative to the web root are not rewritten."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,10 +17,10 @@ beef:
|
||||
module:
|
||||
mobilesafari_address_spoofing:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "iOS Address Bar Spoofing"
|
||||
description: "Mobile Safari iOS 5.1 Address Bar Spoofing. This is fixed in latest version of Mobile Safari (the URL turns 'blank')"
|
||||
authors: ["bcoles","xntrik","majorsecurity.net"]
|
||||
authors: ["bcoles", "xntrik", "majorsecurity.net"]
|
||||
target:
|
||||
working:
|
||||
S:
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
prompt_dialog:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Create Prompt Dialog"
|
||||
description: "Sends a prompt dialog to the hooked browser."
|
||||
authors: ["wade", "bm"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
replace_video:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Replace Videos"
|
||||
description: "Replaces an object selected with jQuery (all embed tags by default) with an embed tag containing the youtube video of your choice (rickroll by default)."
|
||||
authors: ["Yori Kvitchko", "antisnatchor"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
rickroll:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Redirect Browser (Rickroll)"
|
||||
description: "Overwrite the body of the page the victim is on with a full screen Rickroll."
|
||||
authors: ["Yori Kvitchko"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
site_redirect:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Redirect Browser"
|
||||
description: "This module will redirect the selected hooked browser to the address specified in the 'Redirect URL' input."
|
||||
authors: ["wade", "vo"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
site_redirect_iframe:
|
||||
enable: true
|
||||
category: ["Browser","Hooked Domain"]
|
||||
category: ["Browser", "Hooked Domain"]
|
||||
name: "Redirect Browser (iFrame)"
|
||||
description: "This module creates a 100% x 100% overlaying iframe and keeps the browers hooked to the framework. The content of the iframe, page title, page shortcut icon and the time delay are specified in the parameters below.<br><br>The content of the URL bar will not be changed in the hooked browser."
|
||||
authors: ["ethicalhack3r", "Yori Kvitchko"]
|
||||
|
||||
@@ -19,7 +19,7 @@ beef:
|
||||
module:
|
||||
Dlink_dcs_series_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Camera"]
|
||||
category: ["Exploits", "Camera"]
|
||||
name: "Dlink DCS series CSRF"
|
||||
description: "Attempts to change the password on a Dlink DCS series camera."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -22,4 +22,4 @@ beef:
|
||||
description: "This module attempts to deploy a malicious war file on an Oracle GlassFish Server 3.1.1 (build 12). It makes advantage of a CSRF bug in the REST interface.<br />For more information refer to <a href='http://blog.malerisch.net/2012/04/oracle-glassfish-server-rest-csrf.html'>http://blog.malerisch.net/2012/04/oracle-glassfish-server-rest-csrf.html</a>."
|
||||
authors: ["Bart Leppens"]
|
||||
target:
|
||||
working: ["FF","S","C"]
|
||||
working: ["FF", "S", "C"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
bt_home_hub_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "BT Home Hub CSRF"
|
||||
description: "Attempts to enable remote administration and change the tech password on a BT Home Hub wireless router."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
comtrend_ct5367_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Comtrend CT-5367 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5367 router."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
comtrend_ct5624_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Comtrend CT-5624 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5624 router."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
dlink_dsl500t_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "D-Link DSL500T CSRF"
|
||||
description: "Attempts to change the password on a D-Link DSL500T router."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
Huawei_smartax_mt880_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Huawei SmartAX MT880 CSRF"
|
||||
description: "Attempts to add an administrator account on a Huawei SmartAX MT880 router."
|
||||
authors: ["bcoles"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_befsr41_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Linksys BEFSR41 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
|
||||
authors: ["Martin Barbella"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_wrt54g2_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Linksys WRT54G2 CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
|
||||
authors: ["Martin Barbella"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
linksys_wrt54g_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Router"]
|
||||
category: ["Exploits", "Router"]
|
||||
name: "Linksys WRT54G CSRF"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
|
||||
authors: ["Martin Barbella"]
|
||||
|
||||
@@ -17,7 +17,7 @@ beef:
|
||||
module:
|
||||
Netgear_gs108t_csrf:
|
||||
enable: true
|
||||
category: ["Exploits","Switch"]
|
||||
category: ["Exploits", "Switch"]
|
||||
name: "Netgear GS108T CSRF"
|
||||
description: "Attempts to change the password on a Netgear GS108T managed switch."
|
||||
authors: ["Bart Leppens"]
|
||||
|
||||
Reference in New Issue
Block a user