Commit Graph

6 Commits

Author SHA1 Message Date
bcoles
0485a1ab7e Added 3x router CSRF exploits:
o Comtrend CT5367
o Comtrend CT5624
o D-Link DSL500T
2012-03-04 14:55:00 +10:30
bcoles
5c678a2550 Added cleanup() function to router exploits
Removed `username:password@` portion of example target URLs as
unfortunately this triggers warnings in most modern browsers. The
modules target CSRF vulnerabilities and it's expected and
acceptable behaviour to rely on the user having an authorized session by
default.

"Advanced users" will be familiar with the `username:password@` trick
and can add it to the URL if they desire.
2012-03-03 20:43:56 +10:30
Wade Alcorn
06899ca267 Year updated from 2011 to 2012 2011-12-31 22:24:36 +10:00
passbe
2e70f86866 Added pre_execute, execute and post_execute to modules.
git-svn-id: https://beef.googlecode.com/svn/trunk@1197 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-08-17 04:04:32 +00:00
wade@bindshell.net
20a5ce41e7 slight name change for linksys modules
git-svn-id: https://beef.googlecode.com/svn/trunk@1141 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-07-30 15:32:10 +00:00
bcoles@gmail.com
1b5f0783d5 Added a 'Router' command module branch and moved the modules targeting
routers to it.

This fixes issue 413

A    modules/router
AM + modules/router/linksys_befsr41_csrf
M    modules/router/linksys_befsr41_csrf/config.yaml
AM + modules/router/linksys_wrt54g_csrf
M    modules/router/linksys_wrt54g_csrf/config.yaml
AM + modules/router/linksys_wrt54g2_csrf
M    modules/router/linksys_wrt54g2_csrf/config.yaml
D    modules/network/linksys_befsr41_csrf
D    modules/network/linksys_wrt54g_csrf
D    modules/network/linksys_wrt54g2_csrf


git-svn-id: https://beef.googlecode.com/svn/trunk@1137 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-07-29 18:02:44 +00:00