Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
beefproject
GitHub Repository: beefproject/beef
Path: blob/master/modules/exploits/wanem_command_execution/module.rb
1154 views
1
#
2
# Copyright (c) 2006-2025 Wade Alcorn - [email protected]
3
# Browser Exploitation Framework (BeEF) - https://beefproject.com
4
# See the file 'doc/COPYING' for copying permission
5
#
6
################################################################################
7
# For more information see: http://itsecuritysolutions.org/2012-08-12-WANem-v2.3-multiple-vulnerabilities/
8
################################################################################
9
class Wanem_command_execution < BeEF::Core::Command
10
def self.options
11
@configuration = BeEF::Core::Configuration.instance
12
lhost = @configuration.beef_host
13
lhost = '' if lhost == '0.0.0.0'
14
[
15
{ 'name' => 'rhost', 'ui_label' => 'Target Host', 'value' => '192.168.1.1' },
16
{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '80' },
17
{ 'name' => 'lhost', 'ui_label' => 'Local Host', 'value' => lhost },
18
{ 'name' => 'lport', 'ui_label' => 'Local Port', 'value' => '4444' }
19
]
20
end
21
22
def post_execute
23
save({ 'result' => @datastore['result'] })
24
end
25
end
26
27