# # Copyright (c) 2006-2015 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Crypto # @note the minimum length of the security token TOKEN_MINIMUM_LENGTH = 15 # Generate a secure random token # @param [Integer] len The length of the secure token # @return [String] Security token def self.secure_token(len = nil) # get default length from config config = BeEF::Core::Configuration.instance token_length = len || config.get('beef.crypto_default_value_length').to_i # type checking raise Exception::TypeError, "Token length is less than the minimum length enforced by the framework: #{TOKEN_MINIMUM_LENGTH}" if (token_length < TOKEN_MINIMUM_LENGTH) # return random hex string return OpenSSL::Random.random_bytes(token_length).unpack("H*")[0] end # Generate a secure random token, 20 chars, used as an auth token for the RESTful API. # After creation it's stored in the BeEF configuration object => conf.get('beef.api_token') # @return [String] Security token def self.api_token config = BeEF::Core::Configuration.instance token_length = 20 # return random hex string token = OpenSSL::Random.random_bytes(token_length).unpack("H*")[0] config.set('beef.api_token', token) token end # Generates a unique identifier for DNS rules. # # @return [String] 8-character hex identifier def self.dns_rule_id id = nil length = 4 begin id = OpenSSL::Random.random_bytes(length).unpack('H*')[0] BeEF::Core::Models::Dns::Rule.each { |rule| throw StandardError if id == rule.id } rescue StandardError retry end id.to_s end end end end