Files
beef/modules/exploits/router/3com_officeconnect_cmd_exec/module.rb
2015-12-30 08:11:57 +10:00

20 lines
505 B
Ruby

#
# Copyright (c) 2006-2016 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Com_officeconnect_cmd_exec < BeEF::Core::Command
def self.options
return [
{'name' => 'base', 'ui_label' => 'Router web root', 'value' => 'http://192.168.1.1/'},
{'name' => 'cmd', 'ui_label' => 'Command', 'value' => 'reboot'}
]
end
def post_execute
save({'result' => @datastore['result']})
end
end