| Cross-site Scripting with BeEF Framework |
|
Overview Cross-site scripting and HTML injection may occcur when user or attacker controlled input is later incorporated without being encoded into the web server response. In other words, the attacker can send input which later is incorporated into the web page the user receives. Development teams or management might not understand why XSS is such a big deal. Trivial demonstrations such as popping up an alert box do not help in these cases. The Browser Exploitation Framework (BeEF) allows remote control of injected browser making demonstration easy, effective and convincing. Starting BeEF
Using BeEF
Controlling Hooked Browsers
Videos Warning: Undefined property: YouTubeVideoHandler::$IntroductiontotheBrowserExploitationFramework in /var/www/mutillidae/includes/hints/beef-framework-hint.inc on line 76 Fatal error: Uncaught Exception: /var/www/mutillidae/classes/MySQLHandler.php on line 229: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '' at line 1 Query: SELECT identificationToken, title FROM youTubeVideos WHERE recordIndetifier = ; (1064) [mysqli_sql_exception] <br /> in /var/www/mutillidae/classes/MySQLHandler.php:237 Stack trace: #0 /var/www/mutillidae/classes/MySQLHandler.php(327): MySQLHandler->doExecuteQuery('SELECT identifi...') #1 /var/www/mutillidae/classes/SQLQueryHandler.php(309): MySQLHandler->executeQuery('SELECT identifi...') #2 /var/www/mutillidae/classes/YouTubeVideoHandler.php(23): SQLQueryHandler->getYouTubeVideo(NULL) #3 /var/www/mutillidae/classes/YouTubeVideoHandler.php(340): YouTubeVideos->getYouTubeVideo(NULL) #4 /var/www/mutillidae/includes/hints/beef-framework-hint.inc(76): YouTubeVideoHandler->getYouTubeVideo(NULL) #5 /var/www/mutillidae/hints-page-wrapper.php(75): include_once('/var/www/mutill...') #6 {main} thrown in /var/www/mutillidae/classes/MySQLHandler.php on line 237 |