beEF and Metasploit
Today I will take a note about how to use beef with metasploit
install beef
Although kali includes beef, it still have some issues when I use.
to include latest beef:
git clone https://github.com/beefproject/beef.git
cd beef
bundle install
in beef/, change configure file config.yaml
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_001.png)
change host and callback host value as well ssl as true in beef/extensions/metasploit/config.yaml
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_002.png)
now start metasploit:
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_003.png)
start beef:
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_004.png)
in http://127.0.0.1:3000/ui/authentication
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_005.png)
login beef
now create index.html:
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_006.png)
after that, in metasploit, I use MS12-063
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_007.png)
use IE7 to access malicious index.html. get IE info from beef.
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_008.png)
Search command redirect and feed its url which is generated in msf
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_009.png)
get meterpreter:
![[title manually exploit [alt text]]](/images/blog/misc/beef/Selection_010.png)