Difference between revisions of "BeEF"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 1: Line 1:
== Summary ==  
== Summary ==  


'''Browser Exploitation Framework (BeEF)'''
'''Browser Exploitation Framework (BeEF)''' allows the user to start practical client-side-attacks, assess the security of the browser and the possible effects on the network to be tested.


== Requirements ==
== Requirements ==

Revision as of 10:47, 10 July 2021

Summary

Browser Exploitation Framework (BeEF) allows the user to start practical client-side-attacks, assess the security of the browser and the possible effects on the network to be tested.

Requirements

As part of this guide, I used Kali (Kali GNU/Linux Rolling 5.10.0-kali3-amd64) as the OS, so it was already preinstalled. I installed Kali on a Virtual machine (VMware® Workstation 15 Pro 15.5.5 build-16285975).

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References