# # Copyright (c) 2006-2016 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_burp < BeEF::Core::Command def post_execute save({'result' => @datastore['result']}) configuration = BeEF::Core::Configuration.instance if configuration.get("beef.extension.network.enable") == true if @datastore['results'] =~ /^has_burp=true&response=PROXY ([\d\.]+:[\d]+)/ ip = $1.split(':')[0] port = $1.split(':')[1] session_id = @datastore['beefhook'] if BeEF::Filters.is_valid_ip?(ip) print_debug("Hooked browser found network service [ip: #{ip}, port: #{port}]") BeEF::Core::Models::NetworkService.add(:hooked_browser_id => session_id, :proto => 'http', :ip => ip, :port => port, :type => 'Burp Proxy') end end end end end