Moved module configuration elements into thier config.yaml. File and Data keys have not been moved yet. When migration is started the module's database elements are pushed into their config hash. This is in preperation for the admin_ui refactor

git-svn-id: https://beef.googlecode.com/svn/trunk@915 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
passbe
2011-04-21 04:59:55 +00:00
parent 7b6c546555
commit 8e033aac83
32 changed files with 167 additions and 3 deletions

View File

@@ -3,6 +3,18 @@ beef:
detect_local_settings:
enable: true
category: "Network"
name: "Detect local settings"
description: "Grab the local network settings (ie internal ip address)."
authors: ["pdp", "wade", "bm"]
target:
working: ["FF", "C"]
not_working: ["IE"]
fingerprint_local_network:
enable: false
category: "Network"
name: "Fingerprint local network"
description: "Scan common local network IP addresses for embedded devices."
authors: ["bcoles@gmail.com", "wade"]
target:
user_notify: ["FF", "IE"]
not_working: ["O"]

View File

@@ -3,3 +3,4 @@ beef:
inter-protocol:
enable: false
category: "Network"
name: "Inter-Protocol"

View File

@@ -3,3 +3,8 @@ beef:
linksys_befsr41_csrf:
enable: true
category: "Network"
name: "Linksys BEFSR41 CSRF Exploit"
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
authors: ["Martin Barbella"]
target:
working: ["ALL"]

View File

@@ -3,3 +3,8 @@ beef:
linksys_wrt54g2_csrf:
enable: true
category: "Network"
name: "Linksys WRT54G2 CSRF Exploit"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
authors: ["Martin Barbella"]
target:
working: ["ALL"]

View File

@@ -3,3 +3,8 @@ beef:
linksys_wrt54g_csrf:
enable: true
category: "Network"
name: "Linksys WRT54G CSRF Exploit"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
authors: ["Martin Barbella"]
target:
working: ["ALL"]

View File

@@ -3,3 +3,8 @@ beef:
vtiger_crm_upload_exploit:
enable: true
category: "Network"
name: "VTiger CRM Upload Exploit"
description: "This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM <a href=\"http://www.vtiger.com/\">vtiger 5.0.4</a><br />The default PHP requires a listener, so don't forget to start one, for example: nc -l 8888."
authors: ["wade", "bm", "pipes", "xntrik"]
target:
working: ["ALL"]