#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#56# Enable MSF integration by changing beef.extension.metasploit.enable7# to true in BeEF's main config.yaml file.8#9# Ensure you load the msgrpc interface in Metasploit before starting BeEF:10# msf > load msgrpc ServerHost=127.0.0.1 Pass=abc123 SSL=y11#12# Ensure that the IP address supplied to Metasploit with the 'ServerHost'13# parameter is the same IP address as specified in beef.extension.metasploit.host14#15# Ensure that the IP address specified in beef.extension.metasploit.callback_host16# is the publicly accessible IP address for victim connections to Metasploit.1718beef:19extension:20metasploit:21name: 'Metasploit'22enable: false23# Metasploit msgrpc connection options24host: "127.0.0.1"25port: 5555226user: "msf"27pass: "abc123"28uri: '/api'29ssl: true30ssl_version: 'TLS1'31ssl_verify: true32# Public connect back host IP address for victim connections to Metasploit33callback_host: "127.0.0.1"34# URIPATH from Metasploit Browser AutoPwn server module35autopwn_url: "autopwn"36# Start msfrpcd automatically with BeEF37auto_msfrpcd: false38auto_msfrpcd_timeout: 12039msf_path: [40{os: 'osx', path: '/opt/local/msf/'},41{os: 'bt5r3', path: '/opt/metasploit/msf3/'},42{os: 'bt5', path: '/opt/framework3/msf3/'},43{os: 'backbox', path: '/opt/backbox/msf/'},44{os: 'kali', path: '/usr/share/metasploit-framework/'},45{os: 'pentoo', path: '/usr/lib/metasploit'},46{os: 'custom', path: ''}47]484950