1 00:00:09,720 --> 00:00:15,610 In the previous examples, we have seen what is meant by social engineering, we have discussed how 2 00:00:15,660 --> 00:00:22,130 social engineering is harmful these days and how people can be easily tricked into revealing the credentials. 3 00:00:22,560 --> 00:00:27,940 And we also discuss different types of social engineering attacks back in this lecture. 4 00:00:28,330 --> 00:00:31,950 We'll see how to install a browser exploitation framework in Cali. 5 00:00:31,960 --> 00:00:37,230 That is the beef framework, which is a framework which is used to carry out most of the attacks. 6 00:00:37,680 --> 00:00:43,110 And we'll also see how to use a beef in carrying out social engineering attacks. 7 00:00:43,120 --> 00:00:45,960 So let us get started with installing beef. 8 00:00:47,230 --> 00:00:52,000 So let us start installing beef, as you can see among my browser. 9 00:00:53,060 --> 00:00:58,520 Michael Machine, I'm sorry, and the first thing that you need to do is you have to go and create a 10 00:00:58,520 --> 00:00:59,050 folder. 11 00:00:59,720 --> 00:01:06,170 So I will create a folder in my home and I just create a new folder and college applications where I 12 00:01:06,170 --> 00:01:08,320 will install all the future applications. 13 00:01:08,930 --> 00:01:15,580 Now, make sure you install all the software or anything you download from it or any browser, any link. 14 00:01:15,950 --> 00:01:19,100 Make sure you install the new software into one particular folder. 15 00:01:20,060 --> 00:01:25,490 So now install the terminal and let's dive in to applications. 16 00:01:27,710 --> 00:01:32,530 Beef is a good framework, which is not only used for social engineering, but it can also be used for 17 00:01:32,540 --> 00:01:33,500 exercise attacks. 18 00:01:34,100 --> 00:01:36,260 So now let's go to Firefox. 19 00:01:38,120 --> 00:01:42,740 In Firefox, go to w w w dot Google dot com. 20 00:01:47,590 --> 00:01:50,020 And their type beef. 21 00:01:51,780 --> 00:01:59,190 Framework for get all you can, just maybe get the first link from GitHub, that is the beef project, 22 00:01:59,790 --> 00:02:00,750 copy the link. 23 00:02:02,000 --> 00:02:06,430 And now you can see if you want to read anything, this is all the beef packages. 24 00:02:07,190 --> 00:02:11,450 So, yes, this is all about beef. 25 00:02:12,910 --> 00:02:18,880 You can read about beef beef allows the provision been driven tester to assess the actual security posture 26 00:02:18,880 --> 00:02:22,100 of a target environment by using blindside attacks. 27 00:02:22,100 --> 00:02:27,110 So basically it uses many of attacks and this is the simple step which is used. 28 00:02:27,790 --> 00:02:29,950 So now let's go to terminal. 29 00:02:32,250 --> 00:02:43,950 And there you have a type pseudo get blown and have to piece the link, and I don't get into the password 30 00:02:43,950 --> 00:02:52,380 freckly machine and it will start downloading beef, will wait till this download get started and install. 31 00:02:53,590 --> 00:02:59,380 So now beef has been successfully downloaded in the applications folder, after everything else, I 32 00:02:59,380 --> 00:03:02,920 can see the beef Boulder and I will go into the beef folder. 33 00:03:05,930 --> 00:03:11,930 So if you can see there is one file Kollars install and you have to execute that file. 34 00:03:14,880 --> 00:03:22,320 So you can see the install, yes, right there now press the install that is install. 35 00:03:24,030 --> 00:03:29,790 And then hit enter, this is the framework, so are you sure you wish to continue? 36 00:03:29,980 --> 00:03:32,010 Yes, I wish to continue. 37 00:03:33,630 --> 00:03:42,570 So hit enter the default value is why you can either press one or press enter now it is downloading 38 00:03:42,570 --> 00:03:46,470 beef and will wait till for the install the beef packages. 39 00:03:47,700 --> 00:03:49,730 It's not about just inserting the packages. 40 00:03:49,740 --> 00:03:52,030 There are some configurations that need to be made. 41 00:03:52,380 --> 00:03:54,630 So make sure you watch this video till the end. 42 00:04:04,210 --> 00:04:06,910 Now, beef has been successfully installed. 43 00:04:08,000 --> 00:04:16,250 If the new command doesn't happen again, installed by running the pseudo dash install, if you get 44 00:04:16,250 --> 00:04:22,820 an error in between, please install by typing pseudo slash install. 45 00:04:23,330 --> 00:04:28,370 You can see the message installed completely successfully runby to launch. 46 00:04:28,410 --> 00:04:31,320 But before that, we have to make some changes. 47 00:04:31,910 --> 00:04:38,980 So now we will just have to change the default password in the configuration, not Whydah A.M.. 48 00:04:38,990 --> 00:04:41,680 Fine, so let us try running the beef. 49 00:04:41,690 --> 00:04:43,850 Let's see what we get as output. 50 00:04:45,290 --> 00:04:53,270 So you have to install beef, but having pseudo dot beef, I'm sorry, pseudo dot slash beef. 51 00:04:55,530 --> 00:04:59,020 So let us wait till beef starts, it will take some time. 52 00:04:59,610 --> 00:05:00,530 So be patient. 53 00:05:00,570 --> 00:05:06,000 So there's an error before username and password is in use, please, Jeanne De-brief couldn't. 54 00:05:06,230 --> 00:05:12,600 So let us now go to the files where we have downloaded the beef and let us find the file config by Ayman. 55 00:05:13,730 --> 00:05:21,740 Just type alerts to get those files present in the beef and you can see there's a file config that why 56 00:05:21,740 --> 00:05:26,840 Amole do not go with the Donaldsonville, which I underscore, just go to the first file. 57 00:05:27,530 --> 00:05:34,700 So pseudo nonno configured via e-mail and then hereinto it will load the file. 58 00:05:35,030 --> 00:05:35,710 And there you go. 59 00:05:35,720 --> 00:05:38,810 You can see the credentials, user and password. 60 00:05:38,810 --> 00:05:41,900 You can change the username and password nembhard. 61 00:05:41,900 --> 00:05:44,390 Make sure you do not keep the default username. 62 00:05:44,390 --> 00:05:46,260 That is the beef and beef. 63 00:05:47,150 --> 00:05:53,780 I will keep the username same as the damn one rybolovlev application that is admin and password. 64 00:05:55,160 --> 00:06:01,940 Then click control or press enter and then again press control. 65 00:06:01,940 --> 00:06:03,200 Extract the divide. 66 00:06:05,740 --> 00:06:07,790 Now, let us try by launching the beef again. 67 00:06:07,940 --> 00:06:13,030 Yes, Kopassus has been successfully changed now, it shouldn't show any error. 68 00:06:13,180 --> 00:06:21,970 Let us see again by hitting pseudo guards, slash beef command sonographer types would assume that is 69 00:06:21,970 --> 00:06:27,910 now we are telling beef that the super user who are using who's using the beef. 70 00:06:29,050 --> 00:06:33,090 And then they slash beef and hit into. 71 00:06:34,730 --> 00:06:38,930 It will take some time to initialised because we are running beef for the first time. 72 00:06:41,680 --> 00:06:44,530 So that for a few seconds before still loading. 73 00:06:59,160 --> 00:06:59,850 There you go. 74 00:07:00,360 --> 00:07:05,940 We have got something we have got the running network interface, that is one seven point zero point 75 00:07:05,940 --> 00:07:09,060 one you warrell and we have also got the hook. 76 00:07:09,060 --> 00:07:09,360 You are. 77 00:07:11,900 --> 00:07:15,110 Is the interface and the worried? 78 00:07:15,920 --> 00:07:20,600 Yes, so what we have to go the you that is a user interface, we have to copy that. 79 00:07:21,860 --> 00:07:29,600 Make sure you copy the address, which belongs to the Ugali machine and just based it there and then 80 00:07:29,600 --> 00:07:30,350 hit Enter. 81 00:07:32,300 --> 00:07:33,150 There you go. 82 00:07:33,200 --> 00:07:39,920 We have successfully installed the before you get username and password, the username is admin, password 83 00:07:39,920 --> 00:07:42,880 is password and then click login. 84 00:07:43,190 --> 00:07:45,290 It will launch the B framework. 85 00:07:45,590 --> 00:07:46,250 There you go. 86 00:07:46,910 --> 00:07:54,650 So we have successfully installed the B framework and you can also visit the site to read more about 87 00:07:54,650 --> 00:07:54,820 it. 88 00:07:54,830 --> 00:08:03,410 You can see on GitHub basically because of browser exploitation Clydeside framework, so it will mostly 89 00:08:03,410 --> 00:08:05,120 execute the plan attacks. 90 00:08:07,210 --> 00:08:16,330 In the next lecture, we will see how to use beef to hook up a browser and how to perform social engineering 91 00:08:16,330 --> 00:08:17,710 attacks on beef. 92 00:08:20,130 --> 00:08:26,070 So this is all we've log's zombies, though, you'll explore all of these, the online browser tab, 93 00:08:26,370 --> 00:08:30,750 the offline browser tabs, everything we'll explore in the next list. 94 00:08:30,960 --> 00:08:34,410 So let us get started with the next list. 95 00:08:35,570 --> 00:08:39,270 If you have any problems, please feel free to ask us. 96 00:08:40,910 --> 00:08:47,160 So in this lecture, we saw how to install the browser exploitation framework, reconfigured to be a 97 00:08:47,180 --> 00:08:49,590 framework to carry out different attacks. 98 00:08:50,000 --> 00:08:56,810 So in the next lecture, be ready with the framework to carry out the social engineering attacks. 99 00:08:56,960 --> 00:09:03,470 Let us see how hackers use this framework to trick people into revealing their credentials.