* fixed offline zombie not deleting * Bump jsdoc-to-markdown from 6.0.1 to 7.0.1 (#2161) Bumps [jsdoc-to-markdown](https://github.com/jsdoc2md/jsdoc-to-markdown) from 6.0.1 to 7.0.1. - [Release notes](https://github.com/jsdoc2md/jsdoc-to-markdown/releases) - [Commits](https://github.com/jsdoc2md/jsdoc-to-markdown/compare/v6.0.1...v7.0.1) --- updated-dependencies: - dependency-name: jsdoc-to-markdown dependency-type: direct:development update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> * Bug: Core - 1785 Fixed public hook url configuration settings (#2163) * added spec file for testing changes * added local host getter to configuration class * added default value 0.0.0.0 for local host if it's not set * added port config getter with default * added port config getter with default * fixed spelling errors for port * added public configuration values and validation * removed logic from public port as it was not required * added beef host to configuration class * added beef port to configuration class and removed default http.port logic from public_port * fixed rubocop errors and refactored spec tests * added beef host configuration values used for external resources * added beef url to configuration * added spec file for testing changes * added local host getter to configuration class * added default value 0.0.0.0 for local host if it's not set * added port config getter with default * added port config getter with default * fixed spelling errors for port * added public configuration values and validation * removed logic from public port as it was not required * added beef host to configuration class * added beef port to configuration class and removed default http.port logic from public_port * fixed rubocop errors and refactored spec tests * added beef host configuration values used for external resources * added beef url to configuration * created command spec file * add before statement to load all enabled modules to test command class * add spec to check if configuration instance exists by setting and accessing a config variable * updated http proto for beef host * reverting changes on this file, dev values set * removed some unessessary checks * fixed grammar test now we're only testing one configuration attribute * added hook url for contextual usage * refactoring admin_ui with new code usage * fixed issue with the location of the beef.http.https.public_enabled * refactored powershell module and extension * adding the new config setting for public https beign enabled * refactor qrcode extension * replace video fake plugin refactor * social engineering refactoring * phonegap module refactoring * exploit refactoing * network module refactoing * ipec module refactoring * host module refactoring * debug refactoring * browser refactoring * social engineering extension refactoring * core main server refactoring * core main console banner refactoring * removing dev test * fixed area with location of http.https.enabled * changed the hook url definition to return the hook file path * updated banners to use new configuration getters * updated extensions and modules with the hook url change * added new public.host configuration settings and validations for depicated usage of public * updated to use public.port configuration * added validation for old configuration public_port * updated to use public https configuration setting * updated config with new settings format * fixed get to point to new locations * fixed pointer to hook_file_path * Update extensions/social_engineering/web_cloner/web_cloner.rb Co-authored-by: bcoles <bcoles@gmail.com> * updated enabled to enable * making sure default configuration file does not have preset values Co-authored-by: bcoles <bcoles@gmail.com> * bumped versions to 0.5.2.0 * Usability: #2145. Added user input request for beef update within 'beef' install script (#2162) * added user input request for beef update * swaped git pull from system to backticks * flags added for auto update and timout to input * updated install.txt to reference the update-beef script (#2160) Co-authored-by: Andrew Wheatley <a@andrews-mini.home> Co-authored-by: Isaac Powell <36595182+DeezyE@users.noreply.github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: bcoles <bcoles@gmail.com>
160 lines
6.5 KiB
YAML
160 lines
6.5 KiB
YAML
#
|
|
# Copyright (c) 2006-2021 Wade Alcorn - wade@bindshell.net
|
|
# Browser Exploitation Framework (BeEF) - http://beefproject.com
|
|
# See the file 'doc/COPYING' for copying permission
|
|
#
|
|
# BeEF Configuration file
|
|
|
|
beef:
|
|
version: '0.5.2.0'
|
|
# More verbose messages (server-side)
|
|
debug: false
|
|
# More verbose messages (client-side)
|
|
client_debug: false
|
|
# Used for generating secure tokens
|
|
crypto_default_value_length: 80
|
|
|
|
# Credentials to authenticate in BeEF.
|
|
# Used by both the RESTful API and the Admin interface
|
|
credentials:
|
|
user: "beef"
|
|
passwd: "beef"
|
|
|
|
# Interface / IP restrictions
|
|
restrictions:
|
|
# subnet of IP addresses that can hook to the framework
|
|
permitted_hooking_subnet: ["0.0.0.0/0", "::/0"]
|
|
# subnet of IP addresses that can connect to the admin UI
|
|
#permitted_ui_subnet: ["127.0.0.1/32", "::1/128"]
|
|
permitted_ui_subnet: ["0.0.0.0/0", "::/0"]
|
|
# subnet of IP addresses that cannot be hooked by the framework
|
|
excluded_hooking_subnet: []
|
|
# slow API calls to 1 every api_attempt_delay seconds
|
|
api_attempt_delay: "0.05"
|
|
|
|
# HTTP server
|
|
http:
|
|
debug: false #Thin::Logging.debug, very verbose. Prints also full exception stack trace.
|
|
host: "0.0.0.0"
|
|
port: "3000"
|
|
|
|
# Decrease this setting to 1,000 (ms) if you want more responsiveness
|
|
# when sending modules and retrieving results.
|
|
# NOTE: A poll timeout of less than 5,000 (ms) might impact performance
|
|
# when hooking lots of browsers (50+).
|
|
# Enabling WebSockets is generally better (beef.websocket.enable)
|
|
xhr_poll_timeout: 1000
|
|
|
|
# Host Name / Domain Name
|
|
# If you want BeEF to be accessible via hostname or domain name (ie, DynDNS),
|
|
# These settings will be used to create a public facing URL
|
|
# This public facing URL will be used for all hook related calls
|
|
# set the public setting below:
|
|
# public: ""
|
|
# host: "" # public hostname/IP address
|
|
# port: "" # public port will default to 80 if no https 443 if https
|
|
# and local if not set but there is a public host
|
|
# https: false # true/false
|
|
|
|
# Reverse Proxy / NAT
|
|
# If you want BeEF to be accessible behind a reverse proxy or NAT,
|
|
# set both the publicly accessible hostname/IP address and port below:
|
|
# NOTE: Allowing the reverse proxy will enable a vulnerability where the ui/panel can be spoofed
|
|
# by altering the X-FORWARDED-FOR ip address in the request header.
|
|
allow_reverse_proxy: false
|
|
|
|
# Hook
|
|
hook_file: "/hook.js"
|
|
hook_session_name: "BEEFHOOK"
|
|
|
|
# Allow one or multiple origins to access the RESTful API using CORS
|
|
# For multiple origins use: "http://browserhacker.com, http://domain2.com"
|
|
restful_api:
|
|
allow_cors: false
|
|
cors_allowed_domains: "http://browserhacker.com"
|
|
|
|
# Prefer WebSockets over XHR-polling when possible.
|
|
websocket:
|
|
enable: false
|
|
port: 61985 # WS: good success rate through proxies
|
|
# Use encrypted 'WebSocketSecure'
|
|
# NOTE: works only on HTTPS domains and with HTTPS support enabled in BeEF
|
|
secure: true
|
|
secure_port: 61986 # WSSecure
|
|
ws_poll_timeout: 5000 # poll BeEF every x second, this affects how often the browser can have a command execute on it
|
|
ws_connect_timeout: 500 # useful to help fingerprinting finish before establishing the WS channel
|
|
|
|
# Imitate a specified web server (default root page, 404 default error page, 'Server' HTTP response header)
|
|
web_server_imitation:
|
|
enable: true
|
|
type: "apache" # Supported: apache, iis, nginx
|
|
hook_404: false # inject BeEF hook in HTTP 404 responses
|
|
hook_root: false # inject BeEF hook in the server home page
|
|
# Experimental HTTPS support for the hook / admin / all other Thin managed web services
|
|
https:
|
|
enable: false
|
|
# Enabled this config setting if you're external facing uri is using https
|
|
public_enabled: false
|
|
# In production environments, be sure to use a valid certificate signed for the value
|
|
# used in beef.http.public (the domain name of the server where you run BeEF)
|
|
key: "beef_key.pem"
|
|
cert: "beef_cert.pem"
|
|
|
|
database:
|
|
file: "beef.db"
|
|
|
|
# Autorun Rule Engine
|
|
autorun:
|
|
# this is used when rule chain_mode type is nested-forward, needed as command results are checked via setInterval
|
|
# to ensure that we can wait for async command results. The timeout is needed to prevent infinite loops or eventually
|
|
# continue execution regardless of results.
|
|
# If you're chaining multiple async modules, and you expect them to complete in more than 5 seconds, increase the timeout.
|
|
result_poll_interval: 300
|
|
result_poll_timeout: 5000
|
|
|
|
# If the modules doesn't return status/results and timeout exceeded, continue anyway with the chain.
|
|
# This is useful to call modules (nested-forward chain mode) that are not returning their status/results.
|
|
continue_after_timeout: true
|
|
|
|
# Enables DNS lookups on zombie IP addresses
|
|
dns_hostname_lookup: false
|
|
|
|
# IP Geolocation
|
|
# NOTE: requires MaxMind database. Run ./updated-geoipdb to install.
|
|
geoip:
|
|
enable: true
|
|
database: '/opt/GeoIP/GeoLite2-City.mmdb'
|
|
|
|
# Integration with PhishingFrenzy
|
|
# If enabled BeEF will try to get the UID parameter value from the hooked URI, as this is used by PhishingFrenzy
|
|
# to uniquely identify the victims. In this way you can easily associate phishing emails with hooked browser.
|
|
integration:
|
|
phishing_frenzy:
|
|
enable: false
|
|
|
|
# You may override default extension configuration parameters here
|
|
# Note: additional experimental extensions are available in the 'extensions' directory
|
|
# and can be enabled via their respective 'config.yaml' file
|
|
extension:
|
|
admin_ui:
|
|
enable: true
|
|
base_path: "/ui"
|
|
demos:
|
|
enable: true
|
|
events:
|
|
enable: true
|
|
evasion:
|
|
enable: false
|
|
requester:
|
|
enable: true
|
|
proxy:
|
|
enable: true
|
|
network:
|
|
enable: true
|
|
metasploit:
|
|
enable: false
|
|
social_engineering:
|
|
enable: true
|
|
xssrays:
|
|
enable: true
|