# # Copyright (c) 2006-2015 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: groovyshell_server_command_execution: enable: true category: "Exploits" name: "GroovyShell Server Command Execution" description: "This module uses the GroovyShell Server interface (default port 6789) to execute operating system commands.

The target address can be on the hooked browser's subnet which is potentially not directly accessible from the Internet.

The results of the commands are not returned to BeEF.

Note: Spaces in the command are not supported." authors: ["bcoles"] target: working: ["FF", "C"] not_working: ["IE"]