BeEF - Gaining Full Control Over Windows Target

Lecture Transcript - BeEF - Gaining Full Control Over Windows Target

OK, so let's see how we can gain full control and get an interpreter session from the target computer.

So again, we're going to go on the commands and we're going to go into social engineering.

Now, there's actually a number of ways that you can use in here to get a reverse shell.

Now, it all depends on how you want to make your social engineering attack.

What we're going to use, we're going to use a notification bar, a fake notification bar, and we're

choosing Firefox because our target is runs on Firefox or are using Firefox.

So what this will do, it will basically tell the user it will display a notification by telling the

user that there is a new update or there is a plug in that you need to install.

Once they install the plug in, then they'll actually install a back door and you'll gain full access

to their computer.

So the way we're going to do this is we're going to use the same back door that we always created and

we've been using.

Now, I actually have it stored in my Web server, so I have it stored and var.

W w w Mel and I have it called off the statistics, but it's the same Back-Door, the same reverse CETP

interpretor that we used before.

So I'm going to give the full address to it here, so it's stored in.

Ten, twenty, fourteen to seven.

That's my actual IP and the name of the file is updated to.

And then denazification denazification is just saying there is an additional plugin that needs to be

installed to display some elements on this page.

Now, you can change this and just say a critical update for Firefox.

Click here to install.

So I'm going to execute.

And if we go into Target, you can see that they're getting a message telling them that there is a new

update for Firefox and click here to download and install.

So the targeted person will be like, oh, you need to install this.

So they downloaded.

And now basically they have a backdoor downloaded on their machine once they try to run this back door

to install the update, they think it's an update, but they'll actually run a backdoor, which will

give us full access to their computer.

Before I run the backdoor, I need to listen on the part exactly like we did before.

So I'm just going to do so options here to show you I'm not going to go through all the steps.

It's using meters, multi harder, same way we did it in the video of this nick for parts.

So we're using meter battery versus GTP.

I have my IP and the port, so I'm just going to do exploit.

And I'm listening for the connections now.

Now let's run the update that we just downloaded.

And if we go into the target, you can see that we got full control over it using M Peter session.

Now, again, this is just an example of one way of gaining full control over the target computer.

There is a number of ways that you can do using beef and there is a number of social engineering attacks

that you can do to gain full access on the target computer.

So, again, I highly recommend you go over the plug ins and experiment with them and see what attacks

you can come up with.



Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.