diff --git a/modules/host/get_internal_ip_webrtc/command.js b/modules/host/get_internal_ip_webrtc/command.js index 93dbbc404..f7ec7605e 100755 --- a/modules/host/get_internal_ip_webrtc/command.js +++ b/modules/host/get_internal_ip_webrtc/command.js @@ -21,12 +21,11 @@ beef.execute(function() { "iceServers": [ ], }); iceGatherer.onlocalcandidate = function (evt) { - if (oEvent.candidate.type) { + if (evt.candidate.type) { // There may be multiple IP addresses - beef.debug(JSON.Stringify(evt.candidate)); if (evt.candidate.type == "host") { // The ones marked "host" are local IP addresses - processIPs(oEvent.candidate.ip); + processIPs(evt.candidate.ip); }; } else { retResults(); diff --git a/modules/host/get_internal_ip_webrtc/config.yaml b/modules/host/get_internal_ip_webrtc/config.yaml index 2ecf74a22..32d62ffd9 100755 --- a/modules/host/get_internal_ip_webrtc/config.yaml +++ b/modules/host/get_internal_ip_webrtc/config.yaml @@ -10,7 +10,7 @@ beef: category: "Host" name: "Get Internal IP WebRTC" description: "Retrieve the internal (behind NAT) IP address of the victim machine using WebRTC Peer-to-Peer connection framework. Code from http://net.ipcalf.com/" - authors: ["xntrik", "@natevw"] + authors: ["skylined", "xntrik", "@natevw"] target: working: ["C", "FF"] not_working: ["ALL"]