-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
API Fire Error: authentication failed in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>12}.post_soft_load() #1106
Comments
Which version or BeEF and of Metasploit are you using? |
BeEF authentication to Metasploit RPC is working with Ruby 2.1.6p336 on Kali with and without SSL. $ head -1 /etc/issue
Fedora release 19 (Schrödinger’s Cat)
$ cat beef.rc
load msgrpc ServerHost=172.16.191.128 Pass=abc123 SSL=y $ cat extensions/metasploit/config.yaml
#
# Copyright (c) 2006-2015 Wade Alcorn - [email protected]
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
# Enable MSF by changing extension:metasploit:enable to true
# Then set msf_callback_host to be the public IP of your MSF server
#
# Ensure you load the xmlrpc interface in Metasploit
# msf > load msgrpc ServerHost=IP Pass=abc123
# Please note that the ServerHost parameter must have the same value of host and callback_host variables here below.
# Also always use the IP of your machine where MSF is listening.
beef:
extension:
metasploit:
name: 'Metasploit'
enable: true
host: "172.16.191.12"
port: 55552
user: "msf"
pass: "msfabc123"
uri: '/api'
# if you need "ssl: true" make sure you start msfrpcd with "SSL=y", like:
# load msgrpc ServerHost=IP Pass=abc123 SSL=y
ssl: true
ssl_version: 'TLSv1'
ssl_verify: true
callback_host: "172.16.191.128"
autopwn_url: "autopwn"
auto_msfrpcd: false
auto_msfrpcd_timeout: 120
msf_path: [
{os: 'custom', path: '/msf-test/'}
] Closing this issue. |
I have the same problem. I updated beef and metasploit and the config.yaml file is correct. |
@Iromhide Chances are your https://github.com/beefproject/beef/wiki/Configuration#metasploit There should be more output which indicates the cause of the issue. Can you provide the console output? |
@Iromhide it looks like your version of BeEF is old. Also, the SSL configuration is wrong.
|
I updated beef with a script I found. Changed the config.yaml files but continue to have the problem. |
i also got the problem . but after changed the password of msf the problem is fixed! |
I can confirm it: just changing the default password it works :-S |
API Fire Error: authentication failed in {:owner=>BeEF::Extension::Metasploit::API::MetasploitHooks, :id=>12}.post_soft_load()
The text was updated successfully, but these errors were encountered: