Path: blob/master/modules/social_engineering/gmail_phishing/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5class Gmail_phishing < BeEF::Core::Command6def self.options7@configuration = BeEF::Core::Configuration.instance8proto = @configuration.beef_proto9beef_host = @configuration.beef_host10beef_port = @configuration.beef_port11base_host = "#{proto}://#{beef_host}:#{beef_port}"1213xss_hook_url = "#{base_host}/demos/plain.html"14logout_gmail_interval = 10_00015wait_seconds_before_redirect = 100016[17{ 'name' => 'xss_hook_url',18'description' => 'The URI including the XSS to hook a browser. If the XSS is not exploitable via an URI, ' \19'simply leave this field empty, but this means you will loose the hooked browser after executing this module.',20'ui_label' => 'XSS hook URI',21'value' => xss_hook_url,22'width' => '300px' }, {23'name' => 'logout_gmail_interval',24'description' => 'The victim is continuously loged out of Gmail. This is the interval in ms.',25'ui_label' => 'Gmail logout interval (ms)',26'value' => logout_gmail_interval,27'width' => '100px'28}, {29'name' => 'wait_seconds_before_redirect',30'description' => 'When the user submits his credentials on the phishing page, we have to wait (in ms) ' \31'before we redirect to the real Gmail page, so that BeEF gets the credentials in time.',32'ui_label' => 'Redirect delay (ms)',33'value' => wait_seconds_before_redirect,34'width' => '100px'35}36]37end3839def post_execute40content = {}41content['Result'] = @datastore['result']42save content43end44end454647