O'Reilly logo

Penetration Testing Bootcamp by Jason Beltrame

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using BeEF for browser-based exploitation

One of the best tools out there for phishing attacks is BeEF. BeEF uses weaknesses that are found in web browsers for client-side attacks. These attacks hook web browsers and use them as beachheads in order to attack the host directly. It is a very easy attack, as it is often easy to trick users. It shows the importance of making sure your browser is patched and up to date.

BeEF can be placed in many categories, but I consider it an exploitation tool and that is how I plan to use it in my lab. BeEF is a very popular tool for penetration testers as it adds yet another vector for us to test against; it looks beyond perimeter security, and it doesn't require us to change any security or settings against ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required