Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
beefproject
GitHub Repository: beefproject/beef
Path: blob/master/extensions/metasploit/config.yaml
1154 views
1
#
2
# Copyright (c) 2006-2025 Wade Alcorn - [email protected]
3
# Browser Exploitation Framework (BeEF) - https://beefproject.com
4
# See the file 'doc/COPYING' for copying permission
5
#
6
7
# Enable MSF integration by changing beef.extension.metasploit.enable
8
# to true in BeEF's main config.yaml file.
9
#
10
# Ensure you load the msgrpc interface in Metasploit before starting BeEF:
11
# msf > load msgrpc ServerHost=127.0.0.1 Pass=abc123 SSL=y
12
#
13
# Ensure that the IP address supplied to Metasploit with the 'ServerHost'
14
# parameter is the same IP address as specified in beef.extension.metasploit.host
15
#
16
# Ensure that the IP address specified in beef.extension.metasploit.callback_host
17
# is the publicly accessible IP address for victim connections to Metasploit.
18
19
beef:
20
extension:
21
metasploit:
22
name: 'Metasploit'
23
enable: false
24
# Metasploit msgrpc connection options
25
host: "127.0.0.1"
26
port: 55552
27
user: "msf"
28
pass: "abc123"
29
uri: '/api'
30
ssl: true
31
ssl_version: 'TLS1'
32
ssl_verify: true
33
# Public connect back host IP address for victim connections to Metasploit
34
callback_host: "127.0.0.1"
35
# URIPATH from Metasploit Browser AutoPwn server module
36
autopwn_url: "autopwn"
37
# Start msfrpcd automatically with BeEF
38
auto_msfrpcd: false
39
auto_msfrpcd_timeout: 120
40
msf_path: [
41
{os: 'osx', path: '/opt/local/msf/'},
42
{os: 'bt5r3', path: '/opt/metasploit/msf3/'},
43
{os: 'bt5', path: '/opt/framework3/msf3/'},
44
{os: 'backbox', path: '/opt/backbox/msf/'},
45
{os: 'kali', path: '/usr/share/metasploit-framework/'},
46
{os: 'pentoo', path: '/usr/lib/metasploit'},
47
{os: 'custom', path: ''}
48
]
49
50