Files
beef/modules/exploits/router/linksys_e2500_shell/module.rb
2024-12-25 11:40:55 +10:00

18 lines
548 B
Ruby

#
# Copyright (c) 2006-2025 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Linksys_e2500_shell < BeEF::Core::Command
def self.options
[
{ 'name' => 'base', 'ui_label' => 'Router web root', 'value' => 'http://192.168.1.1/' },
{ 'name' => 'payload', 'ui_label' => 'Path to exploit payload', 'value' => 'http://192.0.2.2/payload' }
]
end
def post_execute
save({ 'result' => @datastore['result'] })
end
end