Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

API Fire Error: authentication failed in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>12}.post_soft_load() #1106

Closed
ccavxx opened this issue Apr 3, 2015 · 10 comments

Comments

@ccavxx
Copy link

ccavxx commented Apr 3, 2015

API Fire Error: authentication failed in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>12}.post_soft_load()

@antisnatchor
Copy link
Contributor

Which version or BeEF and of Metasploit are you using?
Opening issues like this is completely useless...

@bcoles
Copy link
Collaborator

bcoles commented Jun 27, 2015

BeEF authentication to Metasploit RPC is working with Ruby 2.1.6p336 on Kali with and without SSL.

$ head -1 /etc/issue
Fedora release 19 (Schrödinger’s Cat)
$ cat beef.rc
load msgrpc ServerHost=172.16.191.128 Pass=abc123 SSL=y

msf1

$ cat extensions/metasploit/config.yaml 
#
# Copyright (c) 2006-2015 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# Enable MSF by changing extension:metasploit:enable to true
# Then set msf_callback_host to be the public IP of your MSF server
#
# Ensure you load the xmlrpc interface in Metasploit
# msf > load msgrpc ServerHost=IP Pass=abc123
# Please note that the ServerHost parameter must have the same value of host and callback_host variables here below.
# Also always use the IP of your machine where MSF is listening.
beef:
    extension:
        metasploit:
            name: 'Metasploit'
            enable: true
            host: "172.16.191.12"
            port: 55552
            user: "msf"
            pass: "msfabc123"
            uri: '/api'
            # if you need "ssl: true" make sure you start msfrpcd with "SSL=y", like:
            # load msgrpc ServerHost=IP Pass=abc123 SSL=y
            ssl: true
            ssl_version: 'TLSv1'
            ssl_verify: true
            callback_host: "172.16.191.128"
            autopwn_url: "autopwn"
            auto_msfrpcd: false
            auto_msfrpcd_timeout: 120
            msf_path: [ 
              {os: 'custom', path: '/msf-test/'}
            ]

msf2

Closing this issue.

@bcoles bcoles closed this as completed Jun 27, 2015
@Iromhide
Copy link

Iromhide commented Dec 8, 2017

I have the same problem. I updated beef and metasploit and the config.yaml file is correct.

@bcoles
Copy link
Collaborator

bcoles commented Dec 8, 2017

@Iromhide Chances are your config.yaml is not correct.

https://github.com/beefproject/beef/wiki/Configuration#metasploit

There should be more output which indicates the cause of the issue. Can you provide the console output?

@Iromhide
Copy link

My config.yaml file of Metasploit (beef-xss/extansions/metasploit) is the following. I saw that the password should be changed every time with the given password.

screen shot 2017-12-13 at 09 14 15

@bcoles
Copy link
Collaborator

bcoles commented Dec 13, 2017

@Iromhide it looks like your version of BeEF is old. Also, the SSL configuration is wrong.

ssl_version: 'TLS1'

@Iromhide
Copy link

I updated beef with a script I found. Changed the config.yaml files but continue to have the problem.

@David5201
Copy link

i also got the problem . but after changed the password of msf the problem is fixed!

@q2dg
Copy link

q2dg commented Apr 23, 2018

I can confirm it: just changing the default password it works :-S

@jaja83ful
Copy link

Might be as simple as not running as root
running as just user gets me this result
#cd /usr/share/beef-xss/
#./beef

screenshot from 2018-08-23 12-52-07

running as sudo gets me this result
#cd /usr/share/beef-xss/
#.sudo /beef

screenshot from 2018-08-23 12-52-21

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants