diff --git a/modules/exploits/local_host/firefox_extension_dropper/config.yaml b/modules/exploits/local_host/firefox_extension_dropper/config.yaml index 02284661a..cefbb1211 100644 --- a/modules/exploits/local_host/firefox_extension_dropper/config.yaml +++ b/modules/exploits/local_host/firefox_extension_dropper/config.yaml @@ -8,9 +8,9 @@ beef: firefox_extension_dropper: enable: true category: ["Exploits", "Local Host"] - name: "Firefox Extension Dropper" + name: "Firefox Extension (Dropper)" description: "Create on the fly a malicious Firefox extension that embeds a dropper you can specify (add it to the 'dropper' directory).

The extension is based on the original work from Michael Schierl and his Metasploit module." authors: ["antisnatchor"] target: user_notify: ["FF"] - not_working: ["All"] \ No newline at end of file + not_working: ["All"] diff --git a/modules/exploits/local_host/firefox_extension_dropper/module.rb b/modules/exploits/local_host/firefox_extension_dropper/module.rb index a8f01a926..13a782f0a 100644 --- a/modules/exploits/local_host/firefox_extension_dropper/module.rb +++ b/modules/exploits/local_host/firefox_extension_dropper/module.rb @@ -16,7 +16,7 @@ class Firefox_extension_dropper < BeEF::Core::Command get '/' do response['Content-Type'] = "application/x-xpinstall" extension_path = settings.extension_path - print_info "Serving malicious Firefox Extension Dropper: #{extension_path}" + print_info "Serving malicious Firefox Extension (Dropper): #{extension_path}" send_file "#{extension_path}", :type => 'application/x-xpinstall', :disposition => 'inline'