Files
beef/config.ini
scotty.b.brown@gmail.com 04a261577e (Fixes issue 9)
This is the first cut at the tunneling proxy - it is by no means perfect - but it should be functional.

git-svn-id: https://beef.googlecode.com/svn/trunk@849 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-04-04 11:04:41 +00:00

52 lines
1.2 KiB
INI

beef_version = '0.4.2.4-alpha'
# subnet of browser ip addresses that can hook to the framework
permitted_hooking_subnet = "0.0.0.0/0"
# subnet of browser ip addresses that can connect to the UI
#permitted_ui_subnet = "127.0.0.1/32"
permitted_ui_subnet = "0.0.0.0/0"
http_host = "0.0.0.0"
http_port = "3000"
http_dns = "localhost"
# if running behind a nat set the public ip address here
#http_public = "66.102.11.104"
http_proxy_enable = 1
http_proxy_bind_address = "127.0.0.1"
http_proxy_bind_port = "6789"
http_demo_path = "/demos/basic.html"
http_panel_path = "/ui/panel"
hook_file = "/hook.js"
ui_username = "beef"
ui_password = "beef"
hook_session_name="BEEFHOOK"
session_cookie_name="BEEFSESSION"
crypto_default_value_length=80
login_fail_delay=1 # in seconds
database_file_name = "beef.db"
favicon_file_name = "favicon.ico"
favicon_dir = "/public/images"
# Enable MSF by changing enable_msf to 1
# Then set msf_callback_host to be the public IP of your MSF server
# Ensure you load the xmlrpc interface in Metasploit
# msf > load xmlrpc Pass=abc123 ServerType=Web
#
enable_msf = 0
msf_host = "127.0.0.1"
msf_path = "/RPC2"
msf_port = 55553
msf_user = "msf"
msf_pass = "abc123"
msf_callback_host = "127.0.0.1"