version bump

This commit is contained in:
byt3bl33d3r 2015-03-10 21:03:33 +01:00
commit caaee53079
7 changed files with 12 additions and 37 deletions

View file

@ -45,6 +45,7 @@ class BeefAutorun(Inject, Plugin):
if not beef.login(beefconfig['user'], beefconfig['pass']):
sys.exit("[-] Error logging in to BeEF!")
print "| |_ Mode: %s" % self.Mode
t = threading.Thread(name="autorun", target=self.autorun, args=(beef,))
t.setDaemon(True)
t.start()

View file

@ -50,7 +50,7 @@ class JavaPwn(BrowserProfiler, Plugin):
msf = msfrpc.Msfrpc({"host": self.rpcip}) #create an instance of msfrpc libarary
msf.login('msf', self.rpcpass)
version = msf.call('core.version')['version']
print "[*] Successfully connected to Metasploit v%s" % version
print "| |_ Connected to Metasploit v%s" % version
except Exception:
sys.exit("[-] Error connecting to MSF! Make sure you started Metasploit and its MSGRPC server")

View file

@ -24,7 +24,6 @@ class Responder(Plugin):
except Exception, e:
sys.exit('[-] Error parsing config for Responder: ' + str(e))
print "[*] Responder plugin online"
DnsCache.getInstance().setCustomAddress(self.ip_address)
for name in ['wpad', 'ISAProxySrv', 'RespProxySrv']:

View file

@ -1,7 +1,3 @@
#
# DNS tampering code stolen from https://github.com/DanMcInerney/dnsspoof
#
from plugins.plugin import Plugin
from time import sleep
import dns.resolver