Updated metasploit for AR

This commit is contained in:
Ben Passmore
2019-11-30 15:18:49 +10:00
parent 3950e934a6
commit 8b244c6f58
2 changed files with 3 additions and 3 deletions

View File

@@ -118,7 +118,7 @@ module BeEF
msf = BeEF::Extension::Metasploit::RpcClient.instance
if msf_key != nil && msf.login
msf_module_options = msf.call('module.options', 'exploit', msf_key)
com = BeEF::Core::Models::CommandModule.first(:name => mod)
com = BeEF::Core::Models::CommandModule.where(:name => mod).first
if msf_module_options
options = BeEF::Extension::Metasploit.translate_options(msf_module_options)
options << {
@@ -193,7 +193,7 @@ module BeEF
if msf_key != nil && msf.login
msf_module_options = msf.call('module.options', 'payload', payload)
com = BeEF::Core::Models::CommandModule.first(:name => mod)
com = BeEF::Core::Models::CommandModule.where(:name => mod).first
if msf_module_options
options = BeEF::Extension::Metasploit.translate_options(msf_module_options)
return options

View File

@@ -8,7 +8,7 @@
class Msf_module < BeEF::Core::Command
def output
command = BeEF::Core::Models::Command.first(:id => @command_id)
command = BeEF::Core::Models::Command.find(@command_id)
data = JSON.parse(command['data'])
sploit_url = data[0]['sploit_url']