beef_integration
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
beef_integration [2019/03/06 13:04] – lucy | beef_integration [2019/07/25 12:49] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
==== Background Info ==== | ==== Background Info ==== | ||
- | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user's browser is configured using safe settings? If the user accesses the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate email from his private workstation or mobile device? One answer is the Browser Exploitation Framework (BeEF), a security testing framework that helps companies deliver effective user awareness training surrounding these issues. | + | It is increasingly important for enterprises to thoroughly educate employees on the dangers of using Web browsers. Employees should be aware of acceptable use policies and Internet access security processes. With LUCY you are already able to perform phishing attack simulations and tell if users click on a potential phishing link. But how can an organization determine whether the user's browser is configured using safe settings? If the user accesses the link from a corporate PC, you might be able to answer this question. But what if the user accesses the corporate email from his private workstation or mobile device? One answer is the Advanced Information Gathering, a security testing framework that helps companies deliver effective user awareness training surrounding these issues. |
- | BeEF is short for The Browser Exploitation Framework. | + | By using techniques similar to common drive-by Malware, testers can assess the security of a target’s internal environment, |
- | Unlike other security frameworks, | + | Unlike other security frameworks, |
- | ===== BeEF setup in LUCY ===== | + | ===== Advanced Information Gathering |
- | As BeEF is running in the background of a phishing landing page it only will work in scenario' | + | As Advanced Information Gathering |
- | To enable | + | To enable |
- | {{ beefmodulesii.png? | ||
- | After LUCY 3.1 you will have the possibility to activate each single BeEF information Gathering module on its own. | + | {{:aig.png?600|}} |
- | {{ beefmodules.png? | ||
beef_integration.1551873848.txt.gz · Last modified: 2019/07/25 12:51 (external edit)