beef_integration
Differences
This shows you the differences between two versions of the page.
Next revisionBoth sides next revision | |||
beef_integration [2015/08/19 14:15] – created lucy | beef_integration [2015/11/25 18:29] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ==== Background | + | ==== Background |
- | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and measure, | + | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user' |
+ | |||
+ | BeEF is short for The Browser Exploitation Framework. By using techniques similar to common drive-by | ||
+ | Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. |
beef_integration.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1