Difference between revisions of "BeEF"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
== Summary == | == Summary == | ||
'''Browser Exploitation Framework (BeEF)''' | '''Browser Exploitation Framework (BeEF)''' allows the user to start practical client-side-attacks, assess the security of the browser and the possible effects on the network to be tested. | ||
== Requirements == | == Requirements == |
Revision as of 10:47, 10 July 2021
Summary
Browser Exploitation Framework (BeEF) allows the user to start practical client-side-attacks, assess the security of the browser and the possible effects on the network to be tested.
Requirements
As part of this guide, I used Kali (Kali GNU/Linux Rolling 5.10.0-kali3-amd64) as the OS, so it was already preinstalled. I installed Kali on a Virtual machine (VMware® Workstation 15 Pro 15.5.5 build-16285975).
Description
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)