Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook & Gmail Credentials

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers. Unlike other security frameworks, BeEF passes through the hardened network perimeters and client systems examining the web browser alone.

How BeEf work?

BeEF will hook up web browsers and use them as beachheads for launching directed command modules and further, attacks the system through the browser context.

Let’s see more about these:

1.Stealing Facebook Credential:

When you execute a “Pretty Theft” command to steal the facebook [Or any social media] credential:


A timed out session alert will be seen in the target’s browser, prompting them to login using their user credential.

This credential will be saved in the BeEf database, against the executed command.

2.Fake Add-On Installation:

Create a command to set a pop up alert at the Target’s browser, where malicious URLs can be added at the Plugin URL

Output at the Target’s computer

3.Fake update of Flash player:

Make a fake Flash Player update alert at the Client’s browser, and collect information through it.

Pop up window seen:

4.Exfiltrating Gmail credentials:

Setting BeEf Command to collect the gmail credentials:

A normal gmail homepage the Target would see:

BeEF has a very clean interface, by organizing attacks based on type and also by indicating if the particular attack is relevant to a browser (IE, FF, Chrome etc.). So you can just point and click on the attacks to launch.

This is one serious PenTest Tool that comes on the GUI and shows perfect output, must to be tried!

Pricilla

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago