当前位置:网站首页>Hijacking a user's browser with beef
Hijacking a user's browser with beef
2022-07-01 08:08:00 【Cwillchris】
BeEF( The Browser Exploitation Framework) By Wade Alcorn( Wade · Alcon ) stay 2006 Started in , It is still under maintenance . By ruby Language development framework for browser attacks .
The process of execution , Like this malicious pop-up :
zombie( Corpse ) The victim browser .zombie Be being hook( Hook up ) Of , If the browser accesses a tick ( from js To write ) The page of , Will be hook, The linked browser will execute the initial code and return some information , next zombie Every once in a while Time ( The default is 1 second ) Will go to BeEF Server sends a request , Ask if there is new code to execute .BeEF The server itself It's like a Web application , Divided into front end UI, Back end . The front end will poll the back end for new data to be updated , At the same time, the front end can also send instructions to the back end , BeEF Holders can log in through a browser BeEF Back office management UI.
Click application launch beef , If not, input at the terminal beef-xss install
边栏推荐
- php laravel微信支付
- sqlalchemy创建MySQL_Table
- 源代码加密的意义和措施
- 使用threejs简单Web3D效果
- Gdip - hatchbrush pattern table
- [website architecture] solve 90% of distributed transactions in one move, and introduce the working principles and application scenarios of database transactions and distributed transactions
- Android screen adaptation (using constraintlayout), kotlin array sorting
- php laravel微信支付
- [getting started] enter the integer array and sorting ID, and sort its elements in ascending or descending order
- How to get a SharePoint online site created using the office365 group template
猜你喜欢
seaborn clustermap矩阵添加颜色块
The triode is a great invention
Instead of houses, another kind of capital in China is rising
[dynamic planning] p1020 missile interception (variant of the longest increasing subsequence)
Basic knowledge of MATLAB
图扑软件通过 CMMI5 级认证!| 国际软件领域高权威高等级认证
Significance and measures of source code encryption
Latex formula code
OJ input and output exercise
OJ输入输出练习
随机推荐
[untitled]
getInputStream() has already been called for this request
【入门】输入n个整数,输出其中最小的k个
[force deduction 10 days SQL introduction] Day9 control flow
Implementation and encapsulation of go universal dynamic retry mechanism
String coordinates of number to excel
[getting started] intercepting strings
Array: question brushing record
Missing API interface actual development series (14): ID card real name authentication verification
Latex table
Aardio - [problem] the problem of memory growth during the callback of bass Library
5大组合拳,解决校园6大难题,护航教育信息化建设
038 network security JS
Programmer's regimen
【刷题】字符统计【0】
EDA开源仿真工具verilator入门6:调试实例
Aardio - Shadow Gradient Text
Why some people earn nearly 10billion a year, while others earn 3000 a month: the details you ignore actually make the most money
Vhost kick & call principle
Sqlalchemy creating MySQL_ Table