Description
Course info
Level
Beginner
Updated
Nov 6, 2019
Duration
1h 46m
Description

Cross-site scripting (XSS) vulnerabilities can be seen as a small issue that allows an attacker to display dialog boxes and at worst steal cookies. BeEF allows us to demonstrate its importance by using XSS to demonstrate a wide variety of attacks, making it clear just how important it is to fix. In this course, Getting Started with BeEF, you will gain the ability to use BeEF to highlight how XSS can be used to highlight some of the possible effects of the vulnerability. First, you will learn about the types of XSS and how to use BeEF with the vulnerability. Next, you will discover how to maintain persistence on a machine that has been connected to our BeEF server. Finally, you will explore how to automate BeEF to allow vulnerabilities to be exploited without manual intervention. When you are finished with this course, you will have the skills and knowledge to use BeEF in a penetration test to highlight the extent to which XSS can be used against anyone who visits the affected website.

About the author
About the author

Gavin is passionate about security and has an extensive background in software development in regulated environments. He currently works in a Red Team at a FTSE 100 company.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] everyone. My name is Gavin Johnson Lynn on Welcome to my Course. Getting Started with beef Previously work in software development for a number of years. I'm currently an offensive security specialist. Beef is a ___________ testing to root that contains over 200 ready made commands that could be run against bruises connected to a vulnerable website. Available commands range from simple social engineering attacks, the scanning client networks and even executing court on a client machine. In this course, we're going to look at when aunt how to use beef against the website, which contains a cross site scripting vulnerability. Some of the major topics that we'll cover include getting familiar with the beef service and into fees, sending commands to a remote friends it understanding, have beef, communicates and runs commands, extending client persistence and finally, all the meeting the beef service. By the end of this calls, you know how to use beef to prove the existence of cross site scripting in a vulnerable website and sure how that vulnerability could be leveraged. To further endanger the website uses before beginning the course, you should have a basic knowledge of each tml and JavaScript and understand how they come together to make a Web page work. I hope you'll join me on this journey to learn prize or exploitation with the getting started with beef course at clear old site.