0% found this document useful (0 votes)
16 views1 page

Beef Browser Exploitation Framework

BeEF (Browser Exploitation Framework) is a Ruby-based tool designed for payload delivery and control of victim browsers through various modules. It utilizes a dynamically generated JavaScript file, hook.js, injected via XSS attacks to exploit browser vulnerabilities. The framework includes features like clipboard stealing, port scanning, and interprotocol exploitation, with color-coded icons indicating the status of each zombie browser.

Uploaded by

George Bratsos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views1 page

Beef Browser Exploitation Framework

BeEF (Browser Exploitation Framework) is a Ruby-based tool designed for payload delivery and control of victim browsers through various modules. It utilizes a dynamically generated JavaScript file, hook.js, injected via XSS attacks to exploit browser vulnerabilities. The framework includes features like clipboard stealing, port scanning, and interprotocol exploitation, with color-coded icons indicating the status of each zombie browser.

Uploaded by

George Bratsos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

BeEF (Browser Exploitation Framework) Cheat Sheet

by binca via cheatography.com/44948/cs/13444/

Overview

Extensive Ruby based framework with interp​rotocol features that focuses on payload delivery.

Various panels control a victim's browser.

If a zombie is offline when a command is issues it is sent when the browser reconn​ects.

The far left panel lists zombies, the next panel contains modules and the far right has descri​ption and config​uration options for the selected module.

Employs JavaSript file hook.js, which is generated on the fly, to hook a browser. This file is injected via a XSS attack. The hook.js file changes based on the
issues commands.

Note: hook.js does not exist locally on the file system but can be viewed when running BeEF by downlo​ading it:wget http:/​/19​2.1​68.1.8​:30​0/h​ook.js**

Icon Color Codes

Green Works on victim

Orange Works but may be visible

Grey Not confirmed to work

Red Does not work

Modules

Auto​run

Clipboard Stealing Steals contents of clipboard

JavaScript Injection

Request Initia​tion Instructs the zombie browser to make HTTP requests as directed. Excellent for CRF attacks or t download software to the
victim. Does not return page content to the attacker.

History Browsing Retrieves history via brute forced and can be used to finger​print victim, map infras​tru​cture, and determine other targets. It
requires a word lists, that is only prepop​ulated with a few terms.

Other Capabi​lities

Controlling Zombies

Port Scanning Port scan a network through the zombie, with a distri​buted network of them there is a low risk of detection.

Browser Exploitation Injects an iframe into the zombie to deliver a browser exploit. This requires a running instance of Metasploit
reachable by the BeEF server. While it supports AutoPWN it is not recomm​ended due to instab​ility.

Interprotocol Exploitation Because many protocols are forgiving and ignore junk including HTTP Request headers, BeEF will inject a payload
of a servic​e-side exploit into an HTTP request to be delivered to the target server by the hooked browser. A
BindShell could be the payload giving the attacker acces throuhg the BeEF controller applic​aiton.

By binca Not published yet. Sponsored by Readability-Score.com


cheatography.com/binca/ Last updated 9th November, 2017. Measure your website readability!
Page 1 of 1. https://readability-score.com

You might also like