beef_integration
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
beef_integration [2016/09/06 09:39] – lucy | beef_integration [2019/04/02 15:11] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
==== Background Info ==== | ==== Background Info ==== | ||
- | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user's browser is configured using safe settings? If the user accesses the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate email from his private workstation or mobile device? One answer is the Browser Exploitation Framework (BeEF), a security testing framework that helps companies deliver effective user awareness training surrounding these issues. | + | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user's browser is configured using safe settings? If the user accesses the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate email from his private workstation or mobile device? One answer is the Advanced Information Gathering, a security testing framework that helps companies deliver effective user awareness training surrounding these issues. |
- | BeEF is short for The Browser Exploitation Framework. | + | By using techniques similar to common drive-by Malware, testers can assess the security of a target’s internal environment, |
- | Unlike other security frameworks, | + | Unlike other security frameworks, |
- | ===== BeEF setup in LUCY ===== | + | ===== Advanced Information Gathering |
+ | |||
+ | As Advanced Information Gathering is running in the background of a phishing landing page it only will work in scenario' | ||
+ | |||
+ | To enable Advanced Information Gathering go into the Base Settings of the campaign, select the scenario in which you want to activate BeEF and then go to scenario settings. At the bottom, you will find a checkbox " | ||
+ | |||
+ | {{ beefmodulesii.png? | ||
beef_integration.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1