I'm still amazed by all the things some people just don't know. Script-kiddies often refer to Metasploit if someone asks them how to hack a computer because they think there's simply no other way. Well here I am today trying to increase your set of tools and -of course- skills.
What is beEF?
beEF is the Browser Exploitation Framework and is a Open-source penetration testing tool that focuses on browser-based vulnerabilities. That means that beEF is extremely useful for Social engineers with "fake" website's. This tool is of course also useful for anyone who "need's" it.
First thing you'll need is Linux. And after that you will need to install the beEF software which is found here. You also might have it already installed. It can be found here:
After that you'r ready to use beEF
Go ahead and start beEF. It'll show something like this:
The selected link is the link you should use to connect to you'r beEF UI. But it should open a browser session automatically. The username and password are beef.
Now we need someone to connect to our link. This can be done using the easy, or the hard method. I'm going to focus on the easy one. You just need to send the link from beef to someone. Don't forget to shorten the URL. You'll need the "Hook-URL."
Then you'll get a screen similar to this:
You can clearly see that a browser is connected and is online!
>If you don't know how to shorten an URL, just use google.
>If you'r not sure that beEF is working correctly, open up you'r browser and enter: http://127.0.0.1:3000/demos/basic.html . this should be the result:
What are we able to do know?
Well, we can send certain commands to the victim. Also we get every info there is available about him/her so that's pretty pro. Right!?
Please comment, give kudos and follow me for more amazing tutorials._
Want to help support Null Byte and start making your own money as a white hat hacker? Jump start your White-Hat Hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from Ethical Hacking Professionals.