Skip to content

Commit

Permalink
Fixes issue #688
Browse files Browse the repository at this point in the history
Added spaces to comma delemetered data in config.yaml files

This should fix an issue reported to affect Ruby 1.9.2
  • Loading branch information
bcoles committed Jun 5, 2012
1 parent defc598 commit 6396f7a
Show file tree
Hide file tree
Showing 29 changed files with 32 additions and 32 deletions.
4 changes: 2 additions & 2 deletions modules/browser/get_visited_domains/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,5 +22,5 @@ beef:
description: "This module will retrieve rapid history extraction through non-destructive cache timing.\nBased on work done at http://lcamtuf.coredump.cx/cachetime/"
authors: ["keith_lee @keith55 http://milo2012.wordpress.com"]
target:
working: ["FF","IE"]
not_working: ["O","C","S"]
working: ["FF", "IE"]
not_working: ["O", "C", "S"]
4 changes: 2 additions & 2 deletions modules/browser/hooked_domain/ajax_fingerprint/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,11 +17,11 @@ beef:
module:
ajax_fingerprint:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Fingerprint Ajax"
description: "Fingerprint Ajax and JS libraries present on the hooked page."
authors: ["qswain"]
target:
working: ["FF","S"]
working: ["FF", "S"]
not_working: ["C"]

2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/alert_dialog/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
alert_dialog:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Create Alert Dialog"
description: "Sends an alert dialog to the hooked browser."
authors: ["wade", "bm"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/deface_web_page/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
deface_web_page:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Replace Content (Deface)"
description: "Overwrite the page, title and shortcut icon on the hooked page."
authors: ["antisnatchor"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/get_cookie/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_cookie:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Cookie"
description: "This module will retrieve the session cookie from the current page."
authors: ["bcoles"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_local_storage:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Local Storage"
description: "Extracts data from the HTML5 localStorage object."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/get_page_html/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_page_html:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Page HTML"
description: "This module will retrieve the HTML from the current page."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/get_page_links/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_page_links:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Page HREFs"
description: "This module will retrieve HREFs from the target page."
authors: ["vo"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_session_storage:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Session Storage"
description: "Extracts data from the HTML5 sessionStorage object."
authors: ["bcoles"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
get_stored_credentials:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Get Stored Credentials"
description: "This module retrieves saved username/password combinations from the login page on the hooked domain.<br /><br />It will fail if more than one set of domain credentials are saved in the browser."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/link_rewrite/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
link_rewrite:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Replace HREFs"
description: "This module will rewrite all the href attributes of all matched links."
authors: ["passbe"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
link_rewrite_sslstrip:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Replace HREFs (HTTPS)"
description: "This module will rewrite all the href attributes of HTTPS links to use HTTP instead of HTTPS. Links relative to the web root are not rewritten."
authors: ["bcoles"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,10 +17,10 @@ beef:
module:
mobilesafari_address_spoofing:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "iOS Address Bar Spoofing"
description: "Mobile Safari iOS 5.1 Address Bar Spoofing. This is fixed in latest version of Mobile Safari (the URL turns 'blank')"
authors: ["bcoles","xntrik","majorsecurity.net"]
authors: ["bcoles", "xntrik", "majorsecurity.net"]
target:
working:
S:
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/prompt_dialog/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
prompt_dialog:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Create Prompt Dialog"
description: "Sends a prompt dialog to the hooked browser."
authors: ["wade", "bm"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/replace_video/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
replace_video:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Replace Videos"
description: "Replaces an object selected with jQuery (all embed tags by default) with an embed tag containing the youtube video of your choice (rickroll by default)."
authors: ["Yori Kvitchko", "antisnatchor"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/rickroll/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
rickroll:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Redirect Browser (Rickroll)"
description: "Overwrite the body of the page the victim is on with a full screen Rickroll."
authors: ["Yori Kvitchko"]
Expand Down
2 changes: 1 addition & 1 deletion modules/browser/hooked_domain/site_redirect/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
site_redirect:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Redirect Browser"
description: "This module will redirect the selected hooked browser to the address specified in the 'Redirect URL' input."
authors: ["wade", "vo"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
site_redirect_iframe:
enable: true
category: ["Browser","Hooked Domain"]
category: ["Browser", "Hooked Domain"]
name: "Redirect Browser (iFrame)"
description: "This module creates a 100% x 100% overlaying iframe and keeps the browers hooked to the framework. The content of the iframe, page title, page shortcut icon and the time delay are specified in the parameters below.<br><br>The content of the URL bar will not be changed in the hooked browser."
authors: ["ethicalhack3r", "Yori Kvitchko"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/camera/dlink_dcs_series_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ beef:
module:
Dlink_dcs_series_csrf:
enable: true
category: ["Exploits","Camera"]
category: ["Exploits", "Camera"]
name: "Dlink DCS series CSRF"
description: "Attempts to change the password on a Dlink DCS series camera."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/glassfish_war_upload_xsrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,4 +22,4 @@ beef:
description: "This module attempts to deploy a malicious war file on an Oracle GlassFish Server 3.1.1 (build 12). It makes advantage of a CSRF bug in the REST interface.<br />For more information refer to <a href='http://blog.malerisch.net/2012/04/oracle-glassfish-server-rest-csrf.html'>http://blog.malerisch.net/2012/04/oracle-glassfish-server-rest-csrf.html</a>."
authors: ["Bart Leppens"]
target:
working: ["FF","S","C"]
working: ["FF", "S", "C"]
2 changes: 1 addition & 1 deletion modules/exploits/router/bt_home_hub_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
bt_home_hub_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "BT Home Hub CSRF"
description: "Attempts to enable remote administration and change the tech password on a BT Home Hub wireless router."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/comtrend_ct5367_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5367_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Comtrend CT-5367 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5367 router."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/comtrend_ct5624_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5624_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Comtrend CT-5624 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5624 router."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/dlink_dsl500t_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
dlink_dsl500t_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "D-Link DSL500T CSRF"
description: "Attempts to change the password on a D-Link DSL500T router."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/huawei_smartax_mt880/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
Huawei_smartax_mt880_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Huawei SmartAX MT880 CSRF"
description: "Attempts to add an administrator account on a Huawei SmartAX MT880 router."
authors: ["bcoles"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/linksys_befsr41_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
linksys_befsr41_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Linksys BEFSR41 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
authors: ["Martin Barbella"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/linksys_wrt54g2_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g2_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Linksys WRT54G2 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
authors: ["Martin Barbella"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/router/linksys_wrt54g_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g_csrf:
enable: true
category: ["Exploits","Router"]
category: ["Exploits", "Router"]
name: "Linksys WRT54G CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
authors: ["Martin Barbella"]
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/switch/netgear_gs108t_csrf/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ beef:
module:
Netgear_gs108t_csrf:
enable: true
category: ["Exploits","Switch"]
category: ["Exploits", "Switch"]
name: "Netgear GS108T CSRF"
description: "Attempts to change the password on a Netgear GS108T managed switch."
authors: ["Bart Leppens"]
Expand Down

0 comments on commit 6396f7a

Please sign in to comment.