Moved module configuration elements into thier config.yaml. File and Data keys have not been moved yet. When migration is started the module's database elements are pushed into their config hash. This is in preperation for the admin_ui refactor
git-svn-id: https://beef.googlecode.com/svn/trunk@915 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
This commit is contained in:
@@ -3,6 +3,18 @@ beef:
|
||||
detect_local_settings:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Detect local settings"
|
||||
description: "Grab the local network settings (ie internal ip address)."
|
||||
authors: ["pdp", "wade", "bm"]
|
||||
target:
|
||||
working: ["FF", "C"]
|
||||
not_working: ["IE"]
|
||||
fingerprint_local_network:
|
||||
enable: false
|
||||
category: "Network"
|
||||
name: "Fingerprint local network"
|
||||
description: "Scan common local network IP addresses for embedded devices."
|
||||
authors: ["bcoles@gmail.com", "wade"]
|
||||
target:
|
||||
user_notify: ["FF", "IE"]
|
||||
not_working: ["O"]
|
||||
|
||||
@@ -3,3 +3,4 @@ beef:
|
||||
inter-protocol:
|
||||
enable: false
|
||||
category: "Network"
|
||||
name: "Inter-Protocol"
|
||||
|
||||
@@ -3,3 +3,8 @@ beef:
|
||||
linksys_befsr41_csrf:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Linksys BEFSR41 CSRF Exploit"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
|
||||
authors: ["Martin Barbella"]
|
||||
target:
|
||||
working: ["ALL"]
|
||||
|
||||
@@ -3,3 +3,8 @@ beef:
|
||||
linksys_wrt54g2_csrf:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Linksys WRT54G2 CSRF Exploit"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
|
||||
authors: ["Martin Barbella"]
|
||||
target:
|
||||
working: ["ALL"]
|
||||
|
||||
@@ -3,3 +3,8 @@ beef:
|
||||
linksys_wrt54g_csrf:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "Linksys WRT54G CSRF Exploit"
|
||||
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
|
||||
authors: ["Martin Barbella"]
|
||||
target:
|
||||
working: ["ALL"]
|
||||
|
||||
@@ -3,3 +3,8 @@ beef:
|
||||
vtiger_crm_upload_exploit:
|
||||
enable: true
|
||||
category: "Network"
|
||||
name: "VTiger CRM Upload Exploit"
|
||||
description: "This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM <a href=\"http://www.vtiger.com/\">vtiger 5.0.4</a><br />The default PHP requires a listener, so don't forget to start one, for example: nc -l 8888."
|
||||
authors: ["wade", "bm", "pipes", "xntrik"]
|
||||
target:
|
||||
working: ["ALL"]
|
||||
|
||||
Reference in New Issue
Block a user