Files
beef/extensions/metasploit/config.yaml
2024-12-25 12:43:13 +10:00

49 lines
1.9 KiB
YAML

#
# Copyright (c) 2006-2025 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# Enable MSF integration by changing beef.extension.metasploit.enable
# to true in BeEF's main config.yaml file.
#
# Ensure you load the msgrpc interface in Metasploit before starting BeEF:
# msf > load msgrpc ServerHost=127.0.0.1 Pass=abc123 SSL=y
#
# Ensure that the IP address supplied to Metasploit with the 'ServerHost'
# parameter is the same IP address as specified in beef.extension.metasploit.host
#
# Ensure that the IP address specified in beef.extension.metasploit.callback_host
# is the publicly accessible IP address for victim connections to Metasploit.
beef:
extension:
metasploit:
name: 'Metasploit'
enable: false
# Metasploit msgrpc connection options
host: "127.0.0.1"
port: 55552
user: "msf"
pass: "abc123"
uri: '/api'
ssl: true
ssl_version: 'TLS1'
ssl_verify: true
# Public connect back host IP address for victim connections to Metasploit
callback_host: "127.0.0.1"
# URIPATH from Metasploit Browser AutoPwn server module
autopwn_url: "autopwn"
# Start msfrpcd automatically with BeEF
auto_msfrpcd: false
auto_msfrpcd_timeout: 120
msf_path: [
{os: 'osx', path: '/opt/local/msf/'},
{os: 'bt5r3', path: '/opt/metasploit/msf3/'},
{os: 'bt5', path: '/opt/framework3/msf3/'},
{os: 'backbox', path: '/opt/backbox/msf/'},
{os: 'kali', path: '/usr/share/metasploit-framework/'},
{os: 'pentoo', path: '/usr/lib/metasploit'},
{os: 'custom', path: ''}
]