The following is the basic usage of BeFF while hooking a victim:
- Once a victim is hooked, BeEF quickly enumerates information running on the victim's computer.
The following screenshot illustrates what BeEF captures:
- Along with host details, BeEF uses a number of exploitation modules to be used on the victim, as seen in the following screenshot:
- One module in the network category can scan the victim's ports for post-exploitation assistance: