-
Notifications
You must be signed in to change notification settings - Fork 2.3k
Open
Labels
Description
First Steps
BeEF Version: 0.5.4.0
Ruby Version: ruby 3.1.2p20 (2022-04-12 revision 4491bb740a) [x86_64-linux-gnu]
Browser Details (e.g. Chrome v81.0): Causing problems with all I've tried (FF - 115.8.0esr, O - 108.0.5067.29, C - 123.0.6312.86, 123.0.6312.58, 121.0.6167.178)
Operating System: Linux, Windows and Android
Configuration
- Have you made any changes to your BeEF configuration? Yes.
- Have you enabled or disabled any BeEF extensions? Yes, Metasploit one but I do not remember if anyone else, I've been using BeEF for a while.
Steps to Reproduce
I did the installation guided by this page: https://null-byte.wonderhowto.com/how-to/hack-web-browsers-with-beef-control-webcams-phish-for-credentials-more-0159961/
- I always start with this commands secuence:
msfconsole
load msgrpc ServerHost=127.0.0.1 User=msf Pass=kali SSL=y
sudo netstat -tuln | grep LISTEN
sudo ./beef
and all it's looking great, with metasploit exploits correctly loaded.
- Then I do the one for the ngrok tunnel and no problems here.
- It is now, when accessing an infected domain, where the mentioned in the title issue appears. I get this type of messages:
[removed]
Something strange I can see is that the plugins one appears only when accessing via Android.