Difference between revisions of "BeEF"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 35: Line 35:
== References ==
== References ==


* https://wikipedia.org
* https://beefproject.com
* https://google.com


[[Category:Documentation]]
[[Category:Pentesting]]

Revision as of 11:08, 10 July 2021

Summary

Browser Exploitation Framework (BeEF) allows the user to start client-side-attacks, assess the security of the browser and the possible effects on the network to be tested.

Requirements

As part of this guide, I used Kali (Kali GNU/Linux Rolling 5.10.0-kali3-amd64) as the OS, so it was already preinstalled. I installed Kali on a Virtual machine (VMware® Workstation 15 Pro 15.5.5 build-16285975).

Example

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

  • WFP-1

References