Modules: Resolve many Rubocop violations
This commit is contained in:
@@ -4,27 +4,25 @@
|
||||
# See the file 'doc/COPYING' for copying permission
|
||||
#
|
||||
class Browser_autopwn < BeEF::Core::Command
|
||||
def self.options
|
||||
@conf = BeEF::Core::Configuration.instance
|
||||
@uri = 'Enter AutoPwn URL Here'
|
||||
|
||||
def self.options
|
||||
@conf = BeEF::Core::Configuration.instance
|
||||
@uri = 'Enter AutoPwn URL Here'
|
||||
begin
|
||||
if @conf.get('beef.extension.metasploit.enable')
|
||||
host = @conf.get('beef.extension.metasploit.callback_host')
|
||||
url = @conf.get('beef.extension.metasploit.autopwn_url')
|
||||
@uri = "http://#{host}:8080/#{url}"
|
||||
end
|
||||
end
|
||||
return [
|
||||
{ 'name' => 'sploit_url', 'description' => 'The URL to exploit', 'ui_label' => 'Listener URL', 'value' => @uri, 'width'=>'200px' },
|
||||
]
|
||||
if @conf.get('beef.extension.metasploit.enable')
|
||||
host = @conf.get('beef.extension.metasploit.callback_host')
|
||||
url = @conf.get('beef.extension.metasploit.autopwn_url')
|
||||
@uri = "http://#{host}:8080/#{url}"
|
||||
end
|
||||
|
||||
[
|
||||
{ 'name' => 'sploit_url', 'description' => 'The URL to exploit', 'ui_label' => 'Listener URL', 'value' => @uri, 'width' => '200px' }
|
||||
]
|
||||
end
|
||||
|
||||
# This method is being called when a hooked browser sends some
|
||||
# data back to the framework.
|
||||
#
|
||||
def post_execute
|
||||
save({'result' => @datastore['result']})
|
||||
save({ 'result' => @datastore['result'] })
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
Reference in New Issue
Block a user