diff --git a/modules/exploits/local_host/firefox_extension_dropper/config.yaml b/modules/exploits/local_host/firefox_extension_dropper/config.yaml
index 02284661a..cefbb1211 100644
--- a/modules/exploits/local_host/firefox_extension_dropper/config.yaml
+++ b/modules/exploits/local_host/firefox_extension_dropper/config.yaml
@@ -8,9 +8,9 @@ beef:
firefox_extension_dropper:
enable: true
category: ["Exploits", "Local Host"]
- name: "Firefox Extension Dropper"
+ name: "Firefox Extension (Dropper)"
description: "Create on the fly a malicious Firefox extension that embeds a dropper you can specify (add it to the 'dropper' directory).
The extension is based on the original work from Michael Schierl and his Metasploit module."
authors: ["antisnatchor"]
target:
user_notify: ["FF"]
- not_working: ["All"]
\ No newline at end of file
+ not_working: ["All"]
diff --git a/modules/exploits/local_host/firefox_extension_dropper/module.rb b/modules/exploits/local_host/firefox_extension_dropper/module.rb
index a8f01a926..13a782f0a 100644
--- a/modules/exploits/local_host/firefox_extension_dropper/module.rb
+++ b/modules/exploits/local_host/firefox_extension_dropper/module.rb
@@ -16,7 +16,7 @@ class Firefox_extension_dropper < BeEF::Core::Command
get '/' do
response['Content-Type'] = "application/x-xpinstall"
extension_path = settings.extension_path
- print_info "Serving malicious Firefox Extension Dropper: #{extension_path}"
+ print_info "Serving malicious Firefox Extension (Dropper): #{extension_path}"
send_file "#{extension_path}",
:type => 'application/x-xpinstall',
:disposition => 'inline'