Summary

In this chapter, we studied a tool called BeEF and hooked it using MITMf. Then, by redirecting the user, we captured their credentials by saying they had been logged out and asked them to re-enter their username and password. Finally, we gained access to the Meterpreter session and also learned how we can detect Trojans both manually and by using a sandbox. 
In the next chapter, we are going to look at performing attacks on an external network. 

 

 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.12.36.30