Basic usage of BeEF when hooking a victim

The following is the basic usage of BeFF while hooking a victim:

  1. Once a victim is hooked, BeEF quickly enumerates information running on the victim's computer.

The following screenshot illustrates what BeEF captures:

  1. Along with host details, BeEF uses a number of exploitation modules to be used on the victim, as seen in the following screenshot:
  1. One module in the network category can scan the victim's ports for post-exploitation assistance:
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.166.149