Path: blob/master/modules/network/internal_network_fingerprinting/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#56class Internal_network_fingerprinting < BeEF::Core::Command7def self.options8[9{ 'name' => 'ipRange', 'ui_label' => 'Scan IP range (C class)', 'value' => '192.168.0.1-192.168.0.254' },10{ 'name' => 'ports', 'ui_label' => 'Ports to test', 'value' => '80,8080' },11{ 'name' => 'threads', 'ui_label' => 'Workers', 'value' => '3' },12{ 'name' => 'wait', 'ui_label' => 'Wait (s) between each request for each worker', 'value' => '5' },13{ 'name' => 'timeout', 'ui_label' => 'Timeout for each request (s)', 'value' => '10' }14]15end1617def post_execute18content = {}19content['discovered'] = @datastore['discovered'] unless @datastore['discovered'].nil?20content['url'] = @datastore['url'] unless @datastore['url'].nil?21content['fail'] = 'No devices/applications have been discovered.' if content.empty?22save content2324configuration = BeEF::Core::Configuration.instance25return unless configuration.get('beef.extension.network.enable') == true && (@datastore['results'] =~ /^proto=(.+)&ip=(.+)&port=(\d+)&discovered=(.+)&url=(.+)/)2627proto = Regexp.last_match(1)28ip = Regexp.last_match(2)29port = Regexp.last_match(3)30discovered = Regexp.last_match(4)31url = Regexp.last_match(5)32session_id = @datastore['beefhook']33if BeEF::Filters.is_valid_ip?(ip)34print_debug("Hooked browser found '#{discovered}' [ip: #{ip}]")35BeEF::Core::Models::NetworkService.create(hooked_browser_id: session_id, proto: proto, ip: ip, port: port, type: discovered)36end37end38end394041