BeEF- Browser Exploitation Framework

Technology has no end and has no boundary, we have discussed different web and network vulnerability scanning tools and techniques to exploit something, beside vulnerability scanning tools there are different way and tools available for exploiting, you might hear about server side exploit but what if someone exploitation your browser, yes you must care about your browser too.
 
Below is the small study on browser exploitation, that would really help you to increase your knowledge and skills.


In general browser exploitation means to take advantage of vulnerability in the software (may be OS) to change and alter browser setting without the knowledge of the user. There are different techniques and tools available but this time we will talk about BeEF, the best browser exploitation framework.


BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target, BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. The framework allows the penetration tester to select specific modules (in real-time) to target each browser. 


Tutorial

Well you can get so many tutorial from the official website of BeEF, click here to learn.
BeEF is also available of backtrack so if have an expertise of backtrack platform you might know about it. 


Well here is video tutorial of BeEF, this tutorial is by  Jabra with many thanks we would like to share it here.

 


Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...