beef_integration
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revisionNext revisionBoth sides next revision | ||
beef_integration [2015/08/19 14:15] – created lucy | beef_integration [2016/09/06 09:39] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ==== Background | + | ==== Background |
+ | |||
+ | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user's browser is configured using safe settings? If the user accesses the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate email from his private workstation or mobile device? One answer is the Browser Exploitation Framework (BeEF), a security testing framework that helps companies deliver effective user awareness training surrounding these issues. | ||
+ | |||
+ | BeEF is short for The Browser Exploitation Framework. By using techniques similar to common drive-by Malware, testers can assess the security of a target’s internal environment, | ||
+ | Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. | ||
+ | |||
+ | |||
+ | ===== BeEF setup in LUCY ===== | ||
- | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and measure, if users click on a potential phishing link. But how can an organization determine whether the users browser is configured with safe settings? If the user access the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate mail from his private workstation or mobile device? One answer is the Browser Exploitation Framework (BeEF), a security testing framework that helps companies deliver effective user awareness training surrounding these issues. BeEF is short for The Browser Exploitation Framework. By using techniques similar to common drive-by malware, testers can assess the security of a target’s internal environment, |
beef_integration.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1