- This topic has 3 replies, 2 voices, and was last updated 2 years, 7 months ago by .
- You must be logged in to reply to this topic.
I am getting confused with the sequence of commands and the code injector to BeEF with my virtual window machine as target.
What I do is:
Start BeEF ( do I have to “service apache2 start” too?)
Set iptables to FORWARD
Set Echo 1
Start ARPspoofing ( target ip is my window virtual machine and gateway is set correctly having checked with route -n)
Start code injector
Open target machine browser to vulnweb.com (Bing and WinRAr are both https)
BeEF shown no online browser.
Is this sequence correct?
Also in the code injector code i set the target IP to the ip of the remote window machine, is this correct?
As you can see I am confused!
No, the ip usen in the code injection shuold be kali’s ip, this way when your victim’s machine visited vulnweb.com it will be hooked by beef.
Let me know how it goes!
Thanks Diego it works!
Cool you got it!
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!