Files
beef/modules/exploits/qemu_monitor_migrate_cmd_exec/config.yaml
2022-01-06 03:05:43 +00:00

16 lines
870 B
YAML

#
# Copyright (c) 2006-2022 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
qemu_monitor_migrate_cmd_exec:
enable: true
category: "Exploits"
name: "QEMU Monitor 'migrate' Command Execution"
description: "This module attempts to get a reverse shell from <a href='https://www.qemu.org/docs/master/system/monitor.html'>QEMU monitor service</a> (TCP or Telnet) using the 'migrate' command.<br/><br/>Works only if SSL/TLS and authentication are disabled. See: <a href='https://www.qemu.org/docs/master/system/security.html#monitor-console-qmp-and-hmp'>https://www.qemu.org/docs/master/system/security.html</a>."
authors: ["bcoles"]
target:
working: ["ALL"]