SlideShare a Scribd company logo
-Prashanth Sivarajan
Prash.siv@gmail.com
What is BeEF?
BeEF is short for The Browser Exploitation Framework. It is
a penetration testing tool that focuses on the web browser.
Amid growing concerns about web-borne attacks against
clients, including mobile clients, BeEF allows the professional
penetration tester to assess the actual security posture of a
target environment by using client-side attack vectors. Unlike
other security frameworks, BeEF looks past the hardened
network perimeter and client system, and examines
exploitability within the context of the one open door: the
web browser. BeEF will hook one or more web browsers and
use them as beachheads for launching directed command
modules and further attacks against the system from within
the browser context.
How it works
UI Overview
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Command Modules
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Browser Fingerprinting
Detect Plugins
(Quicktime/VLC/Silverlight)
Host Fingerprinting
Detect logged in sessions
Command Modules
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Internal IP Address
Ping Sweep
DNS Enumeration
Port Scanning
Network Fingerprinting
NAT Pinning
Command Modules
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Prompt Fake Login Page
Redirect
Embed iFrames
Fake flash/browser Updates
Flash camera & Mic
permission
Click jacking assist
Command Modules
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Several Device
specific CSRF
modules
Command Modules
Information Gathering
Network Discovery
Social Engineering
Exploit
Persistence
Foreground iframe
Popup Under
Man in the browser
Command Modules
Metasploit Integration
• Start msgrpc on metasploit
• Enable metasploit in config.yaml
• Configure BeEF with msgrpc username and pwd in
extensions/metasploit/config.yaml
• Start beef
Tunnelling Proxy
• Doesn’t work like it used to thanks to same
origin policy of browsers
• Make request in the context of the hooked
browser.
BeEF API Example
• Authenticate
• List hooked browsers
• Make persistent (popup under)
• Determine the type of browser
• if browser.match(/^IE/)
{ add iframe with URL for Metasploit module
ms10_046_shortcut_icon_dllloader}
Else
{execute a different module}

More Related Content

What's hot (20)

PPTX
[OWASP Poland Day] Application security - daily questions & answers
OWASP
 
ODP
Browser Exploitation Framework Tutorial
imlaurel2
 
PDF
Security Issues in Android Custom ROM
Anant Shrivastava
 
PPTX
Nginx warhead
Sergey Belov
 
PPT
Denis Baranov: Root via XSS
qqlan
 
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
PPTX
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
PDF
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
PDF
Designing & Building Secure Web APIs
CodeOps Technologies LLP
 
PDF
Slides null puliya linux basics
Anant Shrivastava
 
PPTX
Telehack: May the Command Line Live Forever
Gregory Hanis
 
PDF
Window Shopping Browser - Bug Hunting in 2012
Roberto Suggi Liverani
 
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 
PDF
I got 99 trends and a # is all of them
Roberto Suggi Liverani
 
PDF
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
 
PPTX
Cross Context Scripting attacks & exploitation
Roberto Suggi Liverani
 
PDF
20+ Ways to Bypass Your macOS Privacy Mechanisms
SecuRing
 
PDF
[OWASP Poland Day] A study of Electron security
OWASP
 
PPTX
[Wroclaw #2] Web Application Security Headers
OWASP
 
PDF
Buffer Overflow Attacks
securityxploded
 
[OWASP Poland Day] Application security - daily questions & answers
OWASP
 
Browser Exploitation Framework Tutorial
imlaurel2
 
Security Issues in Android Custom ROM
Anant Shrivastava
 
Nginx warhead
Sergey Belov
 
Denis Baranov: Root via XSS
qqlan
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
Designing & Building Secure Web APIs
CodeOps Technologies LLP
 
Slides null puliya linux basics
Anant Shrivastava
 
Telehack: May the Command Line Live Forever
Gregory Hanis
 
Window Shopping Browser - Bug Hunting in 2012
Roberto Suggi Liverani
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 
I got 99 trends and a # is all of them
Roberto Suggi Liverani
 
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
 
Cross Context Scripting attacks & exploitation
Roberto Suggi Liverani
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
SecuRing
 
[OWASP Poland Day] A study of Electron security
OWASP
 
[Wroclaw #2] Web Application Security Headers
OWASP
 
Buffer Overflow Attacks
securityxploded
 

Viewers also liked (17)

PPTX
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
PDF
Introduction to Tor
Jaskaran Narula
 
PDF
Social engineering-Sandy Suhling
suhlingse
 
PPT
Social engineering
Nicholas Davis
 
PDF
Social Engineering
William Gregorian
 
PDF
Social Engineering Techniques - The Dark Arts
n|u - The Open Security Community
 
PPTX
Social engineering
Maulik Kotak
 
PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
 
PPTX
Social engineering
Alexander Zhuravlev
 
PPTX
Social engineering
Vîñàý Pãtêl
 
PDF
Social Engineering - Strategy, Tactics, & Case Studies
Praetorian
 
PPTX
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
PDF
Computing Fundamentals
عطاءالمنعم اثیل شیخ
 
PDF
ใบงานที่1
Benyaporn Wirasaratham
 
PDF
PDF Sertifikat
Yova Haura Nofit
 
PPTX
5. Language of Instruction
mohdfidaiy
 
PPT
Renter_Intro_20140618
Albert Lee
 
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
Introduction to Tor
Jaskaran Narula
 
Social engineering-Sandy Suhling
suhlingse
 
Social engineering
Nicholas Davis
 
Social Engineering
William Gregorian
 
Social Engineering Techniques - The Dark Arts
n|u - The Open Security Community
 
Social engineering
Maulik Kotak
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
 
Social engineering
Alexander Zhuravlev
 
Social engineering
Vîñàý Pãtêl
 
Social Engineering - Strategy, Tactics, & Case Studies
Praetorian
 
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
Computing Fundamentals
عطاءالمنعم اثیل شیخ
 
ใบงานที่1
Benyaporn Wirasaratham
 
PDF Sertifikat
Yova Haura Nofit
 
5. Language of Instruction
mohdfidaiy
 
Renter_Intro_20140618
Albert Lee
 
Ad

Similar to Browser exploit framework (20)

PDF
Cq3210191021
IJMER
 
PDF
375 378
Editor IJARCET
 
PPTX
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
 
PDF
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
 
PDF
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
PDF
Effectiveness of AV in Detecting Web Application Backdoors
n|u - The Open Security Community
 
PDF
Application Security Guide for Beginners
Checkmarx
 
PPT
Automated Penetration Testing With Core Impact
Tom Eston
 
PDF
Module 5 (system hacking)
Wail Hassan
 
PPTX
Project Presentation
Inaam Ishaque Shaikh
 
PPTX
Cyber ppt
karthik menon
 
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
PDF
mobsf.pdf
Taseen Ali
 
DOC
Top 10 Web Vulnerability Scanners
wensheng wei
 
PDF
Module 12 (web application vulnerabilities)
Wail Hassan
 
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
PDF
Rethinking-Security-of-Web-Based-System-Apps
Martin Georgiev
 
PDF
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
PDF
vulnerability scanning and reporting tool
Bhagyashri Chalakh
 
Cq3210191021
IJMER
 
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
 
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Effectiveness of AV in Detecting Web Application Backdoors
n|u - The Open Security Community
 
Application Security Guide for Beginners
Checkmarx
 
Automated Penetration Testing With Core Impact
Tom Eston
 
Module 5 (system hacking)
Wail Hassan
 
Project Presentation
Inaam Ishaque Shaikh
 
Cyber ppt
karthik menon
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
mobsf.pdf
Taseen Ali
 
Top 10 Web Vulnerability Scanners
wensheng wei
 
Module 12 (web application vulnerabilities)
Wail Hassan
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
Rethinking-Security-of-Web-Based-System-Apps
Martin Georgiev
 
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
vulnerability scanning and reporting tool
Bhagyashri Chalakh
 
Ad

Recently uploaded (20)

PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PDF
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
Next level data operations using Power Automate magic
Andries den Haan
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PPTX
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
Next level data operations using Power Automate magic
Andries den Haan
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 

Browser exploit framework

  • 2. What is BeEF? BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
  • 5. Information Gathering Network Discovery Social Engineering Exploit Persistence Command Modules
  • 6. Information Gathering Network Discovery Social Engineering Exploit Persistence Browser Fingerprinting Detect Plugins (Quicktime/VLC/Silverlight) Host Fingerprinting Detect logged in sessions Command Modules
  • 7. Information Gathering Network Discovery Social Engineering Exploit Persistence Internal IP Address Ping Sweep DNS Enumeration Port Scanning Network Fingerprinting NAT Pinning Command Modules
  • 8. Information Gathering Network Discovery Social Engineering Exploit Persistence Prompt Fake Login Page Redirect Embed iFrames Fake flash/browser Updates Flash camera & Mic permission Click jacking assist Command Modules
  • 9. Information Gathering Network Discovery Social Engineering Exploit Persistence Several Device specific CSRF modules Command Modules
  • 10. Information Gathering Network Discovery Social Engineering Exploit Persistence Foreground iframe Popup Under Man in the browser Command Modules
  • 11. Metasploit Integration • Start msgrpc on metasploit • Enable metasploit in config.yaml • Configure BeEF with msgrpc username and pwd in extensions/metasploit/config.yaml • Start beef
  • 12. Tunnelling Proxy • Doesn’t work like it used to thanks to same origin policy of browsers • Make request in the context of the hooked browser.
  • 13. BeEF API Example • Authenticate • List hooked browsers • Make persistent (popup under) • Determine the type of browser • if browser.match(/^IE/) { add iframe with URL for Metasploit module ms10_046_shortcut_icon_dllloader} Else {execute a different module}