Files
beef/modules/exploits/router/ddwrt_v24_sp1_csrf/config.yaml

17 lines
573 B
YAML

#
# Copyright (c) 2006-2014 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
ddwrt_v24_sp1_csrf:
enable: true
category: ['Exploits', 'Router']
name: 'DD-WRT v24 SP1 CSRF'
description: 'Abuses a CSRF vulnerability in DD-WRT v24 SP1 to enable remote
administration with a new root password.'
authors: ['soh_cah_toa']
target:
working: ['ALL']