beefproject / beef

The Browser Exploitation Framework Project
https://beefproject.com
9.83k stars 2.18k forks source link

Add Browser Hooking Filtering #196

Closed passbe closed 12 years ago

passbe commented 12 years ago

Set up a method so that only zombies from a specific subnet can connect.

When the a zombie init request comes from a browser the ZCS will check the source IP.

If that IP is not within the allowed range then an empty script is returned. When the empty script is returned the brower will NOT make another request to the framework. That brower is NOT a zombie and will not poll the ZCS.

If the request source is within the range then that browser becomes a zombie.

By default no restriction is set.

Google Code Issue: http://code.google.com/p/beef/issues/detail?id=54

passbe commented 12 years ago

wade@bindshell.net on August 12, 2010 11:43:49:

This functionality will provide penetration testers with more opportunity to focus on specific targets.

Google Code Comment: http://code.google.com/p/beef/issues/detail?id=54#c1

passbe commented 12 years ago

wade@bindshell.net on October 15, 2010 12:49:29:

Functionality added in r457.

Configuration (in config.ini) is managed by the below settings:

subnet of browser ip addresses that can hook to the framework

permitted_hooking_subnet = "0.0.0.0/0" # no filtering

subnet of browser ip addresses that can connect to the UI

permitted_ui_subnet = "127.0.0.1/32"

permitted_ui_subnet = "0.0.0.0/0" # no filtering

Google Code Comment: http://code.google.com/p/beef/issues/detail?id=54#c6