Skip to content

BeEF modules

jcrew99 edited this page Jan 8, 2020 · 22 revisions

Module Format

The Module Documentation is set out in the following ways:

Summary

Describe the following things: * Objective: -What is the intent of the module, what is the module doing and what is the intended outcome. * Date: -When was this written? * Author/s: * Browsers: IE, Safari, Firefox * Code

Browser

  1. Browser Fingerprinting
  2. Detect Firebug
  3. Detect Popup block
  4. Detect Unsafe ActiveX
  5. Get Visited Domains
  6. Detect Visited URL
  7. Play Sound
  8. Unhook
  9. Webcam
  10. Get Firefox/Chrome Extensions
  11. Detect MS Office Version

Hooked Domain

  1. AJAX Fingerprint
  2. Alert Dialog
  3. Deface Web Page
  4. Get Cookie
  5. Get Local Storage
  6. Get Page HTML
  7. Get Page Links
  8. Get Session Storage
  9. Get Stored Credentials
  10. Replace HREFs
  11. Replace HREFs (HTTPS)
  12. Replace HREFs (TEL)
  13. Create Alert Dialog
  14. Create Prompt Dialog
  15. Redirect Browser
  16. Redirect Browser (Rickroll)
  17. Redirect Browser (iFrame)
  18. Replace Component (Deface)
  19. Replace Videos
  20. iOS Address Bar Spoofing

Chrome Extensions

  1. Execute On Tab
  2. Get All Cookies
  3. Grab Google Contacts
  4. Inject BeEF
  5. Screenshot
  6. Send Gvoice SMS

Debug

  1. Return Ascii Chars
  2. Test Network Request
  3. Test Returning Results

Exploits

  1. ColdFusion Directory Traversal Exploit
  2. GlassFish WAR Upload XSRF
  3. Jboss 6.0.0M1 JMX Deploy Exploit
  4. Spring Framework Malicious Jar Exploit
  5. VTiger CRM Upload Exploit
  6. Zenoss 3.2.1 Add User CSRF
  7. Zenoss 3.2.1 Daemon CSRF
  8. boastMachine 3.1 Add User CSRF

Camera

  1. Dlink DCS series CSRF
  2. Linksys WVC series CSRF

Local Host

  1. Windows Mail Client DoS
  2. ActiveX Command Execution
  3. Java Payload
  4. Safari Launch App

Router

  1. 3COM OfficeConnect Command Execution
  2. Asmax AR-804gu Command Execution
  3. BT Home Hub CSRF
  4. Cisco E2400 CSRF
  5. Comtrend CT-5367 CSRF
  6. Comtrend CT 5624 CSRF
  7. D-Link DIR-615 Password Wipe
  8. D-Link DSL500T CSRF
  9. Huawei SmartAX MT880 CSRF
  10. Linksys BEFSR41 CSRF
  11. Linksys WRT54G CSRF
  12. Linksys WRT54G2 CSRF
  13. Virgin Superhub CSRF

Switch

  1. Netgear GS108T CSRF

XSS

  1. AlienVault OSSIM 3.1 XSS
  2. Cisco Collaboration Server 5 XSS
  3. Serendipity <= 1.1.1 Add User CSRF

Host

  1. Detect Google Desktop
  2. Detect Softwares
  3. Get Clipboard
  4. Get Internal IP Java
  5. Get Internal IP WebRTC
  6. Get Physical Location
  7. Get Protocol Handlers
  8. Get System Info Java
  9. Hook Default Browser
  10. Get Geolocation
  11. Get Registry Keys
  12. Get Wireless Keys
  13. Detect CUPS
  14. Make Telephone Call
  15. Detect Bit Defender 2012

IPEC

  1. Bindshell (POSIX)
  2. Bindshell (Windows)
  3. Cross Site Printing (XSP)
  4. DNS Tunnel
  5. IMAP
  6. IRC

Miscellaneous

  1. Create Invisible Iframe
  2. Google Search
  3. iFrame Event Logger
  4. iFrame Sniffer
  5. Local File Theft
  6. Raw Javascript

Network

  1. Detect Social Networks
  2. Detect TOR
  3. Ping Sweep
  4. IRC NAT Pinning
  5. Fingerprint Network
  6. DNS Enumeration
  7. Ping Sweep (Java)
  8. Port Scanner

Persistence

  1. Man-In-The-Browser
  2. Confirm Close Tab
  3. Create Foreground iFrame
  4. Create Pop Under

Phonegap

  1. Beep
  2. Check connection
  3. Detect PhoneGap
  4. Geolocation
  5. List Files
  6. Persist resume
  7. Persistence
  8. Start Recording Audio
  9. Stop Recording Audio
  10. Upload File

Social Engineering

  1. Autocomplete Theft
  2. Clickjacking
  3. Clippy
  4. Fake Evernote Web Clipper Login
  5. Fake Flash Update
  6. Fake LastPass
  7. Google Phishing
  8. Lcamtuf Download
  9. Fake Notification Bar
  10. Fake Notification Bar (Chrome)
  11. Fake Notification Bar (FF)
  12. Fake Notification Bar (IE)
  13. Pretty Theft
  14. Simple Hijacker
  15. TabNabbing
Clone this wiki locally