# # Copyright (c) 2006-2025 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - https://beefproject.com # See the file 'doc/COPYING' for copying permission # ################################################################################ # For more information see: http://itsecuritysolutions.org/2012-08-12-WANem-v2.3-multiple-vulnerabilities/ ################################################################################ class Wanem_command_execution < BeEF::Core::Command def self.options @configuration = BeEF::Core::Configuration.instance lhost = @configuration.beef_host lhost = '' if lhost == '0.0.0.0' [ { 'name' => 'rhost', 'ui_label' => 'Target Host', 'value' => '192.168.1.1' }, { 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '80' }, { 'name' => 'lhost', 'ui_label' => 'Local Host', 'value' => lhost }, { 'name' => 'lport', 'ui_label' => 'Local Port', 'value' => '4444' } ] end def post_execute save({ 'result' => @datastore['result'] }) end end