1 00:00:08,650 --> 00:00:17,110 In this lecture, we learn how to get the credentials of a victim using the beef product, in the last 2 00:00:17,110 --> 00:00:24,010 lecture you saw the installation of the beef framework and in this lecture will actually start learning 3 00:00:24,010 --> 00:00:24,870 the practicals. 4 00:00:25,300 --> 00:00:27,120 So let us get started. 5 00:00:29,680 --> 00:00:37,180 I have loved listening to my colleague the next that I'm going to do this, I'm going to terminate and 6 00:00:37,180 --> 00:00:44,500 then I'm going to launch the B project launch to be project go to the directory where you have installed 7 00:00:44,500 --> 00:00:45,430 the B project. 8 00:00:49,440 --> 00:00:57,570 I have installed beef in the application section before I will go to Beef Ellis' and I will launch and 9 00:00:57,570 --> 00:01:06,880 be launched beef type as you and hit and it will ask for your password and the password of the Cali 10 00:01:06,990 --> 00:01:14,460 machine and not the legal framework into the password for that is your you get your virtual machine 11 00:01:14,940 --> 00:01:17,520 and type dot slash beef. 12 00:01:18,930 --> 00:01:21,660 Please wait till the beef framework starts. 13 00:01:22,230 --> 00:01:25,530 It will take a couple of minutes to start the beef framework. 14 00:01:30,750 --> 00:01:33,500 I've gotten out of that beef is already running. 15 00:01:33,540 --> 00:01:39,720 So, yes, my beef is already running, but I have shown you how to log on to beef, take the euro with 16 00:01:39,720 --> 00:01:44,190 the IP address of your Cali machine, then go to Firefox. 17 00:01:50,340 --> 00:02:02,970 After going to Firefox's type the euro and hit enter, he will get the beef login page, log in to beef 18 00:02:02,970 --> 00:02:03,840 with the password. 19 00:02:03,840 --> 00:02:08,160 I have changed the password to add been one to three and password to password. 20 00:02:08,160 --> 00:02:08,880 One, two, three. 21 00:02:14,600 --> 00:02:21,560 You can see I have successfully logged into the framework, the next thing that we are going to do is 22 00:02:21,560 --> 00:02:22,830 we are going to hook someone. 23 00:02:22,850 --> 00:02:29,810 So copy the hook you all into a text editor so that it will become easier for you to write code. 24 00:02:29,810 --> 00:02:33,640 Now, to hook someone, we need to give the user that you are in. 25 00:02:34,280 --> 00:02:42,350 So either way of doing that is by your exploiting the excess vulnerability or by directly sending the 26 00:02:42,350 --> 00:02:43,240 link to someone. 27 00:02:44,360 --> 00:02:46,630 So no, I will just write. 28 00:02:46,640 --> 00:02:54,620 So we have to write the you are in the script form so that it will get executed on the Exodus page in 29 00:02:54,620 --> 00:02:56,440 the den when they will have application. 30 00:02:57,140 --> 00:03:04,200 So we write script source and in the source section we have to copy that website. 31 00:03:04,220 --> 00:03:06,520 I will copy the website of Hook. 32 00:03:06,590 --> 00:03:07,910 That is the hook you Worrill. 33 00:03:11,070 --> 00:03:13,560 And then I will paste into the source section. 34 00:03:16,190 --> 00:03:23,370 I'm doing this because I'm going to explode the page were in my victim, which will be myself. 35 00:03:23,390 --> 00:03:29,660 I am going to act the victim and the attacker at the same time for the demonstration purposes. 36 00:03:32,440 --> 00:03:38,660 But your job is to just stay the hope you are to someone to hook their browser. 37 00:03:38,720 --> 00:03:40,290 Well, they're using the browser, 38 00:03:44,380 --> 00:03:44,710 so. 39 00:03:45,810 --> 00:03:53,310 To explode excesses when the reality will first need to start to dampen the rebels web application to 40 00:03:53,310 --> 00:04:03,150 start a TV WTG, we need browser and we need to start the party service as well as the my skills of 41 00:04:03,150 --> 00:04:03,420 this. 42 00:04:05,490 --> 00:04:12,450 That is the Bob, and I'm just randomly going out here on this college website and now someone wants 43 00:04:12,450 --> 00:04:16,990 to hook me, so I'll try just pasting that website. 44 00:04:17,610 --> 00:04:18,360 That is the hook. 45 00:04:18,360 --> 00:04:18,780 You are a. 46 00:04:24,980 --> 00:04:25,610 Sudo. 47 00:04:26,910 --> 00:04:30,750 So this Apache start to start the Apache Sova. 48 00:04:36,820 --> 00:04:38,980 Into the password for the machine. 49 00:04:42,040 --> 00:04:42,880 And Sudo. 50 00:04:43,890 --> 00:04:46,590 So was my school start. 51 00:04:48,420 --> 00:04:52,440 Which will start the database for them when the rehabilitative application. 52 00:05:01,140 --> 00:05:07,560 Now, let us go to Firefox's and take the default password that is one twenty seven point zero point 53 00:05:07,560 --> 00:05:14,090 zero debatably for this lecture, we are going to use the WWE, which is already installed in the Karley 54 00:05:14,100 --> 00:05:15,840 machine and not demitasse MLO. 55 00:05:17,790 --> 00:05:27,280 So first thing is to set up the security to look, that is if that script gets executed here. 56 00:05:27,750 --> 00:05:31,990 Right now, the security of this is impossible. 57 00:05:32,010 --> 00:05:35,570 So we'll just see if it gets executed here. 58 00:05:39,630 --> 00:05:41,160 It is copy this script. 59 00:05:43,040 --> 00:05:48,340 And then pasted into the name and let's see if it gets executed or not. 60 00:05:51,000 --> 00:05:58,200 Yes, my name is getting cuter now what I do, I replaced my name with the script and then I hit and 61 00:05:58,770 --> 00:06:06,300 you can see my browser has been hooked into the beef because the link got executed. 62 00:06:06,720 --> 00:06:13,200 And by executing the link in the memorial means that I have click the link so you can see that a lot 63 00:06:13,200 --> 00:06:20,040 of plugins ins go to social engineering, petty theft, that is theft of the credentials will keep dialogued. 64 00:06:20,040 --> 00:06:28,980 I Facebook, Google agree and in the customer will let it be the logo and click execute NALGO to that 65 00:06:28,980 --> 00:06:30,420 browser and see what I've got. 66 00:06:30,510 --> 00:06:31,170 Vola. 67 00:06:31,500 --> 00:06:37,550 I got a dialog box saying that your station has been timed out and it's prompting me to enter my password. 68 00:06:37,560 --> 00:06:42,060 So I'm a victim and I, I will believe that my decision has been timed out. 69 00:06:42,630 --> 00:06:44,400 I will enter the password. 70 00:06:44,430 --> 00:06:50,280 I will not bother to read one, two, three and I will get into some real Facebook password believing 71 00:06:50,280 --> 00:06:51,110 that OK. 72 00:06:51,630 --> 00:06:55,740 Oh, let's see my Facebook account and login again and I login. 73 00:06:56,560 --> 00:06:57,870 Let's go to beef now. 74 00:06:57,870 --> 00:06:59,970 What we have got on the command. 75 00:07:01,240 --> 00:07:03,040 Vola, we've got the password. 76 00:07:04,090 --> 00:07:12,870 We have literally got the password and the victim got tricked easily, the victim didn't check the wall, 77 00:07:13,270 --> 00:07:14,800 it was in front of it. 78 00:07:17,560 --> 00:07:23,170 Now, I will again execute another very well in beef. 79 00:07:24,130 --> 00:07:31,880 So what I'll do is I'll you your job is just to say that you are alleged to be the address of your caliber 80 00:07:31,930 --> 00:07:35,140 machine and then the hook Dargis. 81 00:07:36,150 --> 00:07:41,790 So we'll execute Firefox or blogging, saying that there is some element that needs to be downloaded 82 00:07:42,210 --> 00:07:49,200 for the speech and in the blogging you all, I will give a malicious you word in this example. 83 00:07:49,650 --> 00:07:53,490 I am giving w w w dot Google dot com. 84 00:07:53,520 --> 00:07:56,670 But but a real hacker would give a malicious. 85 00:07:56,670 --> 00:08:03,810 You are there so I will click execute and now I will go to my box. 86 00:08:03,990 --> 00:08:12,090 Vola got a plug in as and as a normal user who does not have the knowledge of that. 87 00:08:12,090 --> 00:08:13,640 She will just really click it. 88 00:08:13,650 --> 00:08:18,850 And now you can see I might add, my page got redirected to Google dot com. 89 00:08:20,520 --> 00:08:23,060 So this is how hackers use this framework. 90 00:08:23,070 --> 00:08:29,160 This is a part of free market is not only used for social engineering, but it has also got many other 91 00:08:29,160 --> 00:08:30,370 components as well. 92 00:08:33,230 --> 00:08:41,300 So I will execute another one to test whether it has got anything and not there are no Velzy players 93 00:08:41,900 --> 00:08:43,780 detected on my screen. 94 00:08:43,790 --> 00:08:53,690 So moving in this way, I will again choose to view the toolbar one to see whether there are any toolbars. 95 00:08:54,290 --> 00:08:59,690 This is the Jimmy Page and literally everything is available on the beef framework. 96 00:09:00,140 --> 00:09:06,080 And that is why it is considered as one of the most powerful frameworks for social engineering attacks, 97 00:09:06,380 --> 00:09:11,780 cross scripting attacks, Crossette request, forgery attacks and many more. 98 00:09:12,590 --> 00:09:18,800 So there are no toolbelt rejected because this browser hasn't got any more toolbars and there is no 99 00:09:18,800 --> 00:09:19,610 bookmarks out there. 100 00:09:19,670 --> 00:09:26,030 So yes, this is actually a pretty decent tool to carry out attacks. 101 00:09:26,030 --> 00:09:32,510 But again, there is a warning from Instructables that please do not use this tool for illegal purposes 102 00:09:32,870 --> 00:09:39,450 as the instructors and the platform is not responsible if you get compromised into any legal action. 103 00:09:40,430 --> 00:09:48,280 These videos are only for educational purposes to understand to tell you that how hackers can trick 104 00:09:48,290 --> 00:09:49,490 a normal person. 105 00:09:50,210 --> 00:09:56,980 Now, I will try a lingling petty theft when I click execute to the browser who is hooked now and then 106 00:09:57,240 --> 00:09:59,740 you get the notification. 107 00:09:59,840 --> 00:10:06,560 Now, here I am getting the notification because in the full OLAP case, I am the one who is acting 108 00:10:06,560 --> 00:10:08,900 like a victim and attacker itself. 109 00:10:09,020 --> 00:10:17,450 But in real life attackers then that hook you all via different sources and they hook different people 110 00:10:17,690 --> 00:10:21,440 to the B framework and that is how they execute. 111 00:10:21,440 --> 00:10:29,810 The main job is the delivery of that you warrant, which is really very difficult and common people 112 00:10:30,020 --> 00:10:32,330 get easily tricked into that. 113 00:10:32,900 --> 00:10:40,490 So as a security expert, you should not click any random email that random websites and even your browser 114 00:10:40,670 --> 00:10:43,200 may get hooked to the B framework. 115 00:10:44,510 --> 00:10:47,270 So this was all our B framework for social engineering. 116 00:10:47,270 --> 00:10:51,680 If you want to learn the framework, you can try and see how it works. 117 00:10:51,680 --> 00:10:54,320 There are really a lot of plugins available there. 118 00:10:54,740 --> 00:10:58,940 So but make sure that you do not use be for malicious purposes.