Wednesday, June 8, 2016

Mapping your LAN from a web browser: Introducing the Network extension for BeEF

Today's blog post brought to you by Brendan Coles:

How many tabs do you have open in your browser right now? For how long have they been open - more than 10 minutes? Any one of them could have mapped your local networks and launched exploits against your outdated or misconfigured software.

From the BeEF laboratory comes a new extension for BeEF - the Network extension. Tying together many of the existing network discovery modules[1] to assist with mapping and exploiting hosts on a hooked browser's local area networks, this extension adds a RESTful interface and adds a pretty interface to the web UI for interacting with a zombie's local networks.

Network Map of BeEF attack. BeEF outside the firewall, hooked browser behind the firewall among multiple other hosts.
Network Map of BeEF attack

Friday, January 22, 2016

Hooked Browser Network with BeEF and Google Drive

Today's guest post is brought to you by:

Denis Kolegov (@dnkolegov)
Oleg Broslavsky(@ovbroslavsky)
Nikita Oleksov (@neoleksov)

Hello All. In this post, we present implementation of a hooked browser network based on BeEF and the Google Drive service.

First, we would like to introduce ourselves. We are researchers in the Information Security and Cryptography Department of Tomsk State University located in Tomsk, Russia.

Our team takes part in the BeEF project by sometimes developing experimental features. We implemented DNS and ETag covert timing channels modules and extensions, modules for attacking BIG-IP devices. Our ETag covert timing channels research took 10th place in the WhiteHat Security Top 10 Web Hacking techniques of 2014.

Now, let's talk about why we really need to communicate with hooked browsers via Google Drive and how we can implement it.