Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #
- # Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
- # Browser Exploitation Framework (BeEF) - http://beefproject.com
- # See the file 'doc/COPYING' for copying permission
- #
- # Enable MSF by changing extension:metasploit:enable to true
- # Then set msf_callback_host to be the public IP of your MSF server
- #
- # Ensure you load the xmlrpc interface in Metasploit
- # msf > load msgrpc ServerHost=10.211.55.2 Pass=abc123 ServerType=Web
- # Please note that the ServerHost parameter must have the same value of host and callback_host variables here below.
- # Also always use the IP of your machine where MSF is listening.
- beef:
- extension:
- metasploit:
- name: 'Metasploit'
- enable: true
- host: "192.168.1.102"
- port: 55552
- user: "msf"
- pass: "abc123"
- uri: '/api'
- ssl: false
- ssl_version: 'SSLv3'
- ssl_verify: true
- callback_host: "192.168.1.102"
- autopwn_url: "autopwn"
- auto_msfrpcd: false
- auto_msfrpcd_timeout: 120
- msf_path: [
- {os: 'osx', path: '/opt/local/msf/'},
- {os: 'livecd', path: '/opt/metasploit-framework/'},
- {os: 'bt5r3', path: '/opt/metasploit/msf3/'},
- {os: 'bt5', path: '/opt/framework3/msf3/'},
- {os: 'backbox', path: '/opt/metasploit3/msf3/'},
- {os: 'win', path: 'c:\\metasploit-framework\\'},
- {os: 'custom', path: '/opt/metasploit/app/'}
- ]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement