Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #40482
    Peter Queen
    Participant

    Hello,

    I am getting confused with the sequence of commands and the code injector to BeEF with my virtual window machine as target.

    What I do is:

    Start BeEF ( do I have to “service apache2 start” too?)
    Set iptables to FORWARD
    Set Echo 1
    Start ARPspoofing ( target ip is my window virtual machine and gateway is set correctly having checked with route -n)
    Start code injector
    Open target machine browser to vulnweb.com (Bing and WinRAr are both https)
    BeEF shown no online browser.

    Is this sequence correct?

    Also in the code injector code i set the target IP to the ip of the remote window machine, is this correct?

    As you can see I am confused!

    Thanks

    #40509
    Diego PérezDiego Pérez
    Participant

    Hi!

    No, the ip usen in the code injection shuold be kali’s ip, this way when your victim’s machine visited vulnweb.com it will be hooked by beef.

    Let me know how it goes!
    Diego

    #40533
    Peter Queen
    Participant

    Thanks Diego it works!

    #40580
    Diego PérezDiego Pérez
    Participant

    Hi Peter!

    Cool you got it!
    Diego

Viewing 4 posts - 1 through 4 (of 4 total)
  • You must be logged in to reply to this topic.
Privacy Overview
ZSecurity logo featuring a stylized red letter Z

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping these cookies enabled helps us to improve our website.