beefproject / beef

The Browser Exploitation Framework Project
https://beefproject.com
9.89k stars 2.19k forks source link

can hook my own browser, but no one elses. #1749

Closed sin3141 closed 5 years ago

sin3141 commented 5 years ago

Good news and bad news. Good news being with the default settings I could almost perfectly run. I had to disable the proxy settings, but after that I was up and running. Bad news, I still can't use my hook link. I can hook myself on the hook example in the web UI, but the link wont hook anyone. I had my friend sitting next to me click both hooks I sent him, and then I clicked them myself. I forgot to take down the error for the first time we tried just before I sent the other issue in. but heres the error code for this one. I think it is anyway.

[ 3:05:05][!] [Browser Details] Invalid browser plugins returned from the hook browser's initial connection. [ 3:05:08][*] New Hooked Browser [id:1, ip:127.0.0.1, browser:FF-60, os:Linux-], hooked domain [127.0.0.1:3000] I apologize for having so many issues. Thank you for helping.

bcoles commented 5 years ago

[ 3:05:05][!] [Browser Details] Invalid browser plugins returned from the hook browser's initial connection. [ 3:05:08][*] New Hooked Browser [id:1, ip:127.0.0.1, browser:FF-60, os:Linux-], hooked domain [127.0.0.1:3000]

That error is fairly common and is nothing to be worried about. It is also incredibly unlikely to be related to whatever issue you're having.

Please enable beef.debug: true and beef.http.debug: true in the config file and paste the console output.

Also, are you using any non-default settings?

sin3141 commented 5 years ago

The output when I restarted beef is kind of long, so I'll post it in a separate comment. The only non-default setting I'm using is disabling proxy in the main config.yaml file. But I changed that due to an error I was getting with it on.

sin3141 commented 5 years ago

[ 3:24:55][*] Project Creator: Wade Alcorn (@WadeAlcorn) [ 3:24:55][>] Loaded extension: 'events' [ 3:24:55][>] Loaded extension: 'network' [ 3:24:55][>] Loaded extension: 'xssrays' [ 3:24:55][>] Loaded extension: 'admin_ui' [ 3:24:55][>] Loaded extension: 'demos' [ 3:24:55][>] Loaded extension: 'requester' [ 3:24:55][>] Loaded extension: 'social_engineering' [ 3:24:55][>] Soft Load module: 'test_cors_request' [ 3:24:55][>] Soft Load module: 'test_http_redirect' [ 3:24:55][>] Soft Load module: 'test_dns_tunnel_client' [ 3:24:55][>] Soft Load module: 'test_beef_debug' [ 3:24:55][>] Soft Load module: 'test_return_ascii_chars' [ 3:24:55][>] Soft Load module: 'test_network_request' [ 3:24:55][>] Soft Load module: 'test_return_long_string' [ 3:24:55][>] Soft Load module: 'test_return_image' [ 3:24:55][>] Soft Load module: 'popunder_window_ie' [ 3:24:55][>] Soft Load module: 'popunder_window' [ 3:24:55][>] Soft Load module: 'iframe_above' [ 3:24:55][>] Soft Load module: 'jsonp_service_worker' [ 3:24:55][>] Soft Load module: 'confirm_close_tab' [ 3:24:55][>] Soft Load module: 'hijack_opener' [ 3:24:55][>] Soft Load module: 'man_in_the_browser' [ 3:24:55][>] Soft Load module: 'invisible_htmlfile_activex' [ 3:24:55][>] Soft Load module: 'phonegap_start_record_audio' [ 3:24:55][>] Soft Load module: 'phonegap_persistence' [ 3:24:55][>] Soft Load module: 'phonegap_globalization_status' [ 3:24:55][>] Soft Load module: 'phonegap_stop_record_audio' [ 3:24:55][>] Soft Load module: 'phonegap_check_connection' [ 3:24:55][>] Soft Load module: 'phonegap_file_upload' [ 3:24:55][>] Soft Load module: 'phonegap_keychain' [ 3:24:55][>] Soft Load module: 'phonegap_plugin_detection' [ 3:24:55][>] Soft Load module: 'phonegap_list_contacts' [ 3:24:55][>] Soft Load module: 'phonegap_detect' [ 3:24:55][>] Soft Load module: 'phonegap_geo_locate' [ 3:24:55][>] Soft Load module: 'phonegap_prompt_user' [ 3:24:55][>] Soft Load module: 'phonegap_persist_resume' [ 3:24:55][>] Soft Load module: 'phonegap_alert_user' [ 3:24:55][>] Soft Load module: 'phonegap_list_files' [ 3:24:55][>] Soft Load module: 'phonegap_beep' [ 3:24:55][>] Soft Load module: 'hp_ucmdb_add_user_csrf' [ 3:24:55][>] Soft Load module: 'safari_launch_app' [ 3:24:55][>] Soft Load module: 'ie_ms13_069_caret' [ 3:24:55][>] Soft Load module: 'java_payload' [ 3:24:55][>] Soft Load module: 'windows_mail_client_dos' [ 3:24:55][>] Soft Load module: 'signed_applet_dropper' [ 3:24:55][>] Soft Load module: 'ie_ms12_004_midi' [ 3:24:55][>] Soft Load module: 'activex_command_execution' [ 3:24:55][>] Soft Load module: 'Dlink_dcs_series_csrf' [ 3:24:55][>] Soft Load module: 'airlive_add_user_csrf' [ 3:24:55][>] Soft Load module: 'linksys_wvc_wireless_camera_csrf' [ 3:24:55][>] Soft Load module: 'shell_shock_scanner' [ 3:24:55][>] Soft Load module: 'skype_xss' [ 3:24:55][>] Soft Load module: 'jenkins_groovy_code_exec' [ 3:24:55][>] Soft Load module: 'qnx_qconn_command_execution' [ 3:24:55][>] Soft Load module: 'boastmachine_add_user_csrf' [ 3:24:55][>] Soft Load module: 'opencart_reset_password' [ 3:24:55][>] Soft Load module: 'ruby_nntpd_cmd_exec' [ 3:24:55][>] Soft Load module: 'kemp_command_execution' [ 3:24:55][>] Soft Load module: 'firephp_code_exec' [ 3:24:55][>] Soft Load module: 'groovyshell_server_command_execution' [ 3:24:55][>] Soft Load module: 'resource_exhaustion_dos' [ 3:24:55][>] Soft Load module: 'Shell_shocked' [ 3:24:55][>] Soft Load module: 'apache_felix_remote_shell' [ 3:24:55][>] Soft Load module: 'farsite_X25_remote_shell' [ 3:24:55][>] Soft Load module: 'php_dos' [ 3:24:55][>] Soft Load module: 'linksys_wrt54g_csrf' [ 3:24:55][>] Soft Load module: 'utstarcom_wa3002g4_dns_hijack' [ 3:24:55][>] Soft Load module: 'Netgear_dgn_2000_wan_mgmt_csrf' [ 3:24:55][>] Soft Load module: 'iball_baton_ib_wra150n_dns_hijack' [ 3:24:55][>] Soft Load module: 'telstra_zte_mf91_change_pw' [ 3:24:55][>] Soft Load module: 'pikatel_96338_dns_hijack' [ 3:24:55][>] Soft Load module: 'exper_ewm01_adsl_dns_hijack' [ 3:24:55][>] Soft Load module: 'tenda_adsl_dns_hijack' [ 3:24:55][>] Soft Load module: 'dlink_dsl2640u_dns_hijack' [ 3:24:55][>] Soft Load module: 'beetel_bcm96338_router_dns_hijack' [ 3:24:55][>] Soft Load module: 'philips_dns_hijack' [ 3:24:55][>] Soft Load module: 'telstra_zte_mf91_disable_ap_isolation' [ 3:24:55][>] Soft Load module: 'linksys_e2500_dns_hijack' [ 3:24:55][>] Soft Load module: 'linksys_wrt54g2_csrf' [ 3:24:55][>] Soft Load module: 'ddwrt_v24_sp1_csrf' [ 3:24:55][>] Soft Load module: 'actiontec_q1000_csrf' [ 3:24:55][>] Soft Load module: 'asus_rt_n66u_cmd_exec' [ 3:24:55][>] Soft Load module: 'wipg1000_cmd_injection' [ 3:24:55][>] Soft Load module: 'dlink_dir_615_csrf' [ 3:24:55][>] Soft Load module: 'cisco_e2400_csrf' [ 3:24:55][>] Soft Load module: 'asus_dslx11_dns_hijack' [ 3:24:55][>] Soft Load module: 'linksys_e2500_csrf' [ 3:24:55][>] Soft Load module: 'linksys_befsr41_csrf' [ 3:24:55][>] Soft Load module: 'comtrend_ct_series_dns_hijack' [ 3:24:55][>] Soft Load module: 'planet_vdr300nu_adsl_dns_hijack' [ 3:24:55][>] Soft Load module: 'dlink_dsl526b_dns_hijack' [ 3:24:55][>] Soft Load module: 'dlink_dsl2740r_dns_hijack' [ 3:24:55][>] Soft Load module: 'dlink_dsl2780b_dns_hijack' [ 3:24:55][>] Soft Load module: 'linksys_e2500_shell' [ 3:24:55][>] Soft Load module: 'asmax_ar804gu_cmd_exec' [ 3:24:55][>] Soft Load module: 'comtrend_ct5367_csrf' [ 3:24:55][>] Soft Load module: 'telstra_zte_mf91_change_ssid' [ 3:24:55][>] Soft Load module: 'argw4_adsl_dns_hijack' [ 3:24:55][>] Soft Load module: 'belkin_dns_csrf' [ 3:24:55][>] Soft Load module: 'comtrend_ct5624_csrf' [ 3:24:55][>] Soft Load module: 'netgear_dgn2200_cmd_exec' [ 3:24:55][>] Soft Load module: 'inteno_eg101r1_voip_dns_hijack' [ 3:24:55][>] Soft Load module: 'virgin_superhub_csrf' [ 3:24:55][>] Soft Load module: 'Huawei_smartax_mt880_csrf' [ 3:24:55][>] Soft Load module: 'shuttle_tech_915wm_dns_hijack' [ 3:24:55][>] Soft Load module: 'dlink_2640b_dns_hijack' [ 3:24:55][>] Soft Load module: 'com_officeconnect_cmd_exec' [ 3:24:55][>] Soft Load module: 'ddwrt_v24_sp1_cmd_exec' [ 3:24:55][>] Soft Load module: 'dlink_dsl500t_csrf' [ 3:24:55][>] Soft Load module: 'bt_home_hub_csrf' [ 3:24:55][>] Soft Load module: 'tplink_dns_csrf' [ 3:24:55][>] Soft Load module: 'asus_rt_n12e_get_info' [ 3:24:55][>] Soft Load module: 'zenoss_add_user_csrf' [ 3:24:55][>] Soft Load module: 'sqlitemanager_xss' [ 3:24:55][>] Soft Load module: 'cisco_collaboration_server_5_xss' [ 3:24:55][>] Soft Load module: 'alienvault_ossim_3_1_xss' [ 3:24:55][>] Soft Load module: 'serendipity_1_6_xss' [ 3:24:55][>] Soft Load module: 'jboss_jmx_upload_exploit' [ 3:24:55][>] Soft Load module: 'monowall_reverse_root_shell_csrf' [ 3:24:55][>] Soft Load module: 'glassfish_war_upload_xsrf' [ 3:24:55][>] Soft Load module: 'wanem_command_execution' [ 3:24:55][>] Soft Load module: 'vtiger_crm_upload_exploit' [ 3:24:55][>] Soft Load module: 'Dlink_dgs_1100_device_reset_csrf' [ 3:24:55][>] Soft Load module: 'Netgear_gs108t_csrf' [ 3:24:55][>] Soft Load module: 'Dlink_dgs_1100_fdb_whitelist_csrf' [ 3:24:55][>] Soft Load module: 'Dlink_dgs_1100_port_mirroring_csrf' [ 3:24:55][>] Soft Load module: 'spring_framework_malicious_jar' [ 3:24:55][>] Soft Load module: 'extract_cmd_exec' [ 3:24:55][>] Soft Load module: 'coldfusion_dir_traversal_exploit' [ 3:24:55][>] Soft Load module: 'pfsense_2_3_2_reverse_root_shell_csrf' [ 3:24:55][>] Soft Load module: 'pfsense_reverse_root_shell_csrf' [ 3:24:55][>] Soft Load module: 'Active_fax_beef_bind' [ 3:24:55][>] Soft Load module: 'Eudora_mail_beef_bind' [ 3:24:55][>] Soft Load module: 'BeEF_bind_shell' [ 3:24:55][>] Soft Load module: 'Wordpress_add_admin' [ 3:24:55][>] Soft Load module: 'ntfscommoncreate_dos' [ 3:24:55][>] Soft Load module: 'freenas_reverse_root_shell_csrf' [ 3:24:55][>] Soft Load module: 'dlink_sharecenter_cmd_exec' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_migrate_hook' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_admin_static_token' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_scanner' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_admin_password' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_reverse_shell_csrf_sop_bypass' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_file_disclosure' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_admin_dynamic_token' [ 3:24:55][>] Soft Load module: 'zeroshell_2_0rc2_reverse_shell_csrf_sop' [ 3:24:55][>] Soft Load module: 'rfi_scanner' [ 3:24:55][>] Soft Load module: 'apache_cookies' [ 3:24:55][>] Soft Load module: 'zenoss_command_execution' [ 3:24:55][>] Soft Load module: 'get_ntop_network_hosts' [ 3:24:55][>] Soft Load module: 'cross_origin_scanner_cors' [ 3:24:55][>] Soft Load module: 'get_proxy_servers_wpad' [ 3:24:55][>] Soft Load module: 'detect_burp' [ 3:24:55][>] Soft Load module: 'identify_lan_subnets' [ 3:24:55][>] Soft Load module: 'port_scanner' [ 3:24:55][>] Soft Load module: 'f5_bigip_cookie_stealing' [ 3:24:55][>] Soft Load module: 'f5_bigip_cookie_disclosure' [ 3:24:55][>] Soft Load module: 'fingerprint_routers' [ 3:24:55][>] Soft Load module: 'ping_sweep_java' [ 3:24:55][>] Soft Load module: 'detect_tor' [ 3:24:55][>] Soft Load module: 'dns_enumeration' [ 3:24:55][>] Soft Load module: 'ping_sweep_ff' [ 3:24:55][>] Soft Load module: 'internal_network_fingerprinting' [ 3:24:55][>] Soft Load module: 'detect_soc_nets' [ 3:24:55][>] Soft Load module: 'get_http_servers' [ 3:24:55][>] Soft Load module: 'doser' [ 3:24:55][>] Soft Load module: 'dns_rebinding' [ 3:24:55][>] Soft Load module: 'ping_sweep' [ 3:24:55][>] Soft Load module: 'irc_nat_pinning' [ 3:24:55][>] Soft Load module: 'cross_origin_scanner_flash' [ 3:24:55][>] Soft Load module: 'execute_tabs' [ 3:24:55][>] Soft Load module: 'get_all_cookies' [ 3:24:55][>] Soft Load module: 'grab_google_contacts' [ 3:24:55][>] Soft Load module: 'inject_beef' [ 3:24:55][>] Soft Load module: 'screenshot' [ 3:24:55][>] Soft Load module: 'send_gvoice_sms' [ 3:24:55][>] Soft Load module: 'inter_protocol_imap' [ 3:24:55][>] Soft Load module: 'inter_protocol_win_bindshell' [ 3:24:55][>] Soft Load module: 'cross_site_faxing' [ 3:24:55][>] Soft Load module: 'cross_site_printing' [ 3:24:55][>] Soft Load module: 's2c_dns_tunnel' [ 3:24:55][>] Soft Load module: 'inter_protocol_irc' [ 3:24:55][>] Soft Load module: 'inter_protocol_posix_bindshell' [ 3:24:55][>] Soft Load module: 'inter_protocol_redis' [ 3:24:55][>] Soft Load module: 'etag_client' [ 3:24:55][>] Soft Load module: 'get_internal_ip_webrtc' [ 3:24:55][>] Soft Load module: 'get_connection_type' [ 3:24:55][>] Soft Load module: 'detect_local_drives' [ 3:24:55][>] Soft Load module: 'detect_google_desktop' [ 3:24:55][>] Soft Load module: 'detect_users' [ 3:24:55][>] Soft Load module: 'physical_location' [ 3:24:55][>] Soft Load module: 'get_registry_keys' [ 3:24:55][>] Soft Load module: 'get_battery_status' [ 3:24:55][>] Soft Load module: 'detect_airdroid' [ 3:24:55][>] Soft Load module: 'get_internal_ip_java' [ 3:24:55][>] Soft Load module: 'detect_cups' [ 3:24:55][>] Soft Load module: 'detect_software' [ 3:24:55][>] Soft Load module: 'detect_coupon_printer' [ 3:24:55][>] Soft Load module: 'detect_default_browser' [ 3:24:55][>] Soft Load module: 'detect_antivirus' [ 3:24:55][>] Soft Load module: 'clipboard_theft' [ 3:24:55][>] Soft Load module: 'hook_default_browser' [ 3:24:55][>] Soft Load module: 'physical_location_thirdparty' [ 3:24:55][>] Soft Load module: 'detect_protocol_handlers' [ 3:24:55][>] Soft Load module: 'get_wireless_keys' [ 3:24:55][>] Soft Load module: 'hook_microsoft_edge' [ 3:24:55][>] Soft Load module: 'iphone_tel' [ 3:24:55][>] Soft Load module: 'detect_hp' [ 3:24:55][>] Soft Load module: 'get_system_info_java' [ 3:24:55][>] Soft Load module: 'Detect_toolbars' [ 3:24:55][>] Soft Load module: 'webcam_permission_check' [ 3:24:55][>] Soft Load module: 'detect_foxit' [ 3:24:55][>] Soft Load module: 'detect_unsafe_activex' [ 3:24:55][>] Soft Load module: 'detect_office' [ 3:24:55][>] Soft Load module: 'get_visited_domains' [ 3:24:55][>] Soft Load module: 'unhook' [ 3:24:55][>] Soft Load module: 'link_rewrite' [ 3:24:55][>] Soft Load module: 'get_session_storage' [ 3:24:55][>] Soft Load module: 'alert_dialog' [ 3:24:55][>] Soft Load module: 'link_rewrite_click_events' [ 3:24:55][>] Soft Load module: 'rickroll' [ 3:24:55][>] Soft Load module: 'remove_stuck_iframes' [ 3:24:55][>] Soft Load module: 'site_redirect' [ 3:24:55][>] Soft Load module: 'disable_developer_tools' [ 3:24:55][>] Soft Load module: 'get_page_html_iframe' [ 3:24:55][>] Soft Load module: 'overflow_cookiejar' [ 3:24:55][>] Soft Load module: 'get_page_html' [ 3:24:55][>] Soft Load module: 'replace_video' [ 3:24:55][>] Soft Load module: 'link_rewrite_sslstrip' [ 3:24:55][>] Soft Load module: 'site_redirect_iframe' [ 3:24:55][>] Soft Load module: 'get_form_values' [ 3:24:55][>] Soft Load module: 'prompt_dialog' [ 3:24:55][>] Soft Load module: 'get_cookie' [ 3:24:55][>] Soft Load module: 'deface_web_page' [ 3:24:56][>] Soft Load module: 'clear_console' [ 3:24:56][>] Soft Load module: 'ajax_fingerprint' [ 3:24:56][>] Soft Load module: 'get_stored_credentials' [ 3:24:56][>] Soft Load module: 'link_rewrite_tel' [ 3:24:56][>] Soft Load module: 'mobilesafari_address_spoofing' [ 3:24:56][>] Soft Load module: 'get_local_storage' [ 3:24:56][>] Soft Load module: 'deface_web_page_component' [ 3:24:56][>] Soft Load module: 'get_page_links' [ 3:24:56][>] Soft Load module: 'avant_steal_history' [ 3:24:56][>] Soft Load module: 'webcam_html5' [ 3:24:56][>] Soft Load module: 'detect_vlc' [ 3:24:56][>] Soft Load module: 'detect_evernote_clipper' [ 3:24:56][>] Soft Load module: 'detect_extensions' [ 3:24:56][>] Soft Load module: 'get_visited_urls' [ 3:24:56][>] Soft Load module: 'detect_firebug' [ 3:24:56][>] Soft Load module: 'detect_realplayer' [ 3:24:56][>] Soft Load module: 'detect_popup_blocker' [ 3:24:56][>] Soft Load module: 'Play_sound' [ 3:24:56][>] Soft Load module: 'browser_fingerprinting' [ 3:24:56][>] Soft Load module: 'spyder_eye' [ 3:24:56][>] Soft Load module: 'detect_silverlight' [ 3:24:56][>] Soft Load module: 'detect_mime_types' [ 3:24:56][>] Soft Load module: 'detect_wmp' [ 3:24:56][>] Soft Load module: 'webcam' [ 3:24:56][>] Soft Load module: 'fingerprint_browser' [ 3:24:56][>] Soft Load module: 'Detect_unity' [ 3:24:56][>] Soft Load module: 'remove_hook_element' [ 3:24:56][>] Soft Load module: 'detect_simple_adblock' [ 3:24:56][>] Soft Load module: 'detect_quicktime' [ 3:24:56][>] Soft Load module: 'detect_activex' [ 3:24:56][>] Soft Load module: 'detect_lastpass' [ 3:24:56][>] Soft Load module: 'read_gmail' [ 3:24:56][>] Soft Load module: 'iframe_sniffer' [ 3:24:56][>] Soft Load module: 'wordpress_post_auth_rce' [ 3:24:56][>] Soft Load module: 'no_sleep' [ 3:24:56][>] Soft Load module: 'blockui' [ 3:24:56][>] Soft Load module: 'cryptoloot_miner' [ 3:24:56][>] Soft Load module: 'unblockui' [ 3:24:56][>] Soft Load module: 'raw_javascript' [ 3:24:56][>] Soft Load module: 'send_inotes_with_attachment' [ 3:24:56][>] Soft Load module: 'inotes_flooder' [ 3:24:56][>] Soft Load module: 'extract_inotes_list' [ 3:24:56][>] Soft Load module: 'send_inotes' [ 3:24:56][>] Soft Load module: 'read_inotes' [ 3:24:56][>] Soft Load module: 'track_physical_movement' [ 3:24:56][>] Soft Load module: 'iframe_keylogger' [ 3:24:56][>] Soft Load module: 'local_file_theft' [ 3:24:56][>] Soft Load module: 'invisible_iframe' [ 3:24:56][>] Soft Load module: 'hta_powershell' [ 3:24:56][>] Soft Load module: 'pretty_theft' [ 3:24:56][>] Soft Load module: 'edge_wscript_wsh_injection' [ 3:24:56][>] Soft Load module: 'fake_notification_ff' [ 3:24:56][>] Soft Load module: 'firefox_extension_bindshell' [ 3:24:56][>] Soft Load module: 'gmail_phishing' [ 3:24:56][>] Soft Load module: 'fake_evernote_clipper' [ 3:24:56][>] Soft Load module: 'sitekiosk_breakout' [ 3:24:56][>] Soft Load module: 'fake_lastpass' [ 3:24:56][>] Soft Load module: 'clippy' [ 3:24:56][>] Soft Load module: 'ui_abuse_ie' [ 3:24:56][>] Soft Load module: 'tabnabbing' [ 3:24:56][>] Soft Load module: 'fake_flash_update' [ 3:24:56][>] Soft Load module: 'fake_notification_c' [ 3:24:56][>] Soft Load module: 'firefox_extension_dropper' [ 3:24:56][>] Soft Load module: 'fake_notification' [ 3:24:56][>] Soft Load module: 'firefox_extension_reverse_shell' [ 3:24:56][>] Soft Load module: 'simple_hijacker' [ 3:24:56][>] Soft Load module: 'lcamtuf_download' [ 3:24:56][>] Soft Load module: 'text_to_voice' [ 3:24:56][>] Soft Load module: 'replace_video_fake_plugin' [ 3:24:56][>] Soft Load module: 'spoof_addressbar_data' [ 3:24:56][>] Soft Load module: 'fake_notification_ie' [ 3:24:56][>] Soft Load module: 'steal_autocomplete' [ 3:24:56][>] Soft Load module: 'clickjacking' [ 3:24:56][] BeEF is loading. Wait a few seconds... [ 3:24:56][>] Server: mounted handler '/hook.js' [ 3:24:56][>] Server: mounted handler '/init' [ 3:24:56][>] Server: mounted handler '/' [ 3:24:56][>] Server: mounted handler '/dh' [ 3:24:56][>] Server: mounted handler '/api/hooks' [ 3:24:56][>] Server: mounted handler '/api/browserdetails' [ 3:24:56][>] Server: mounted handler '/api/modules' [ 3:24:56][>] Server: mounted handler '/api/categories' [ 3:24:56][>] Server: mounted handler '/api/logs' [ 3:24:56][>] Server: mounted handler '/api/admin' [ 3:24:56][>] Server: mounted handler '/api/server' [ 3:24:56][>] Server: mounted handler '/api/autorun' [ 3:24:56][>] Server: mounted handler '/event' [ 3:24:56][>] Server: mounted handler '/api/network' [ 3:24:56][>] Server: mounted handler '/xssrays' [ 3:24:56][>] Server: mounted handler '/api/xssrays' [ 3:24:56][>] Server: mounted handler '/ui/panel' [ 3:24:56][>] Server: mounted handler '/ui/authentication' [ 3:24:56][>] Server: mounted handler '/ui/modules' [ 3:24:56][>] Server: mounted handler '/ui/media' [ 3:24:56][>] [AdminUI] Initializing admin panel ... [ 3:24:56][>] [AdminUI] Minifying web_ui_all (384630 bytes) [ 3:25:06][>] [AdminUI] Minified web_ui_all (215405 bytes) [ 3:25:06][>] [AdminUI] Minifying web_ui_auth (1787 bytes) [ 3:25:08][>] [AdminUI] Minified web_ui_auth (1122 bytes) [ 3:25:08][>] Server: mounted handler '/ui/web_ui_all.js' [ 3:25:08][>] Server: mounted handler '/ui/web_ui_auth.js' [ 3:25:08][>] Server: mounted handler '/demos' [ 3:25:08][>] Server: mounted handler '/demos/clickjacking/clickjack_victim.html' [ 3:25:08][>] Server: mounted handler '/demos/clickjacking/clickjack_attack.html' [ 3:25:08][>] Server: mounted handler '/demos/butcher/index.html' [ 3:25:08][>] Server: mounted handler '/demos/plain.html' [ 3:25:08][>] Server: mounted handler '/demos/basic.html' [ 3:25:08][>] Server: mounted handler '/demos/report.html' [ 3:25:08][>] Server: mounted handler '/demos/secret_page.html' [ 3:25:08][>] Server: mounted handler '/requester' [ 3:25:08][>] Server: mounted handler '/api/requester' [ 3:25:08][>] Server: mounted handler '/api/seng' [ 3:25:08][>] Server: mounted handler '/ps' [ 3:25:08][] 7 extensions enabled: [ 3:25:08] | Events [ 3:25:08] | Network [ 3:25:08] | XSSRays [ 3:25:08] | Admin UI [ 3:25:08] | Demos [ 3:25:08] | Requester [ 3:25:08] |_ Social Engineering [ 3:25:08][] 300 modules enabled. [ 3:25:08][] 2 network interfaces were detected.

bcoles commented 5 years ago

There seems to be some output missing from your logs. Regardless, perhaps test your network configuration?

Is your friend able to see the hook page? Or does the connection to port 3000 fail?

sin3141 commented 5 years ago

Might have something to do with my system proxy. I've got it turned on in my settings and on a browser extension. The browser switches but in my system is manual.

I don't know if this matters, but he's on an iPhone X R or something along those lines. It does take him to a page that had some sort of connection failure message. We're about to give it a shot one more time before he goes home for the night.

sin3141 commented 5 years ago

Or maybe something to do with sending it through Facebook? It wasn't the best idea, but since he's only got that and his cell number it was all I could use.

bcoles commented 5 years ago

How hard is it to type an IP address?

You're not making this easy on yourself.

Eliminate complexity and apply the scientific method. Repeat as necessary.

sin3141 commented 5 years ago

It should be typed? That could explain a lot really. I always assumed it was supposed to be copied them pasted. So would the correct syntax to type it be the script like it was in the older version?

bcoles commented 5 years ago

It should be typed? That could explain a lot really. I always assumed it was supposed to be copied them pasted. So would the correct syntax to type it be the script like it was in the older version?

wut

bcoles commented 5 years ago

You know how you hooked your browser on your machine? You did so by visiting a URL in your web browser. The URL probably looked something like this:

http://1.2.3.4:3000/demos/basic.html

Your friend will need to visit that URL on their phone.

sin3141 commented 5 years ago

In my browser it was just the example on the homepage of the web UI. The link that shows what page they're redirected to when they click on it. But that's exactly how the hook url looks from my view before I send it to him. I'm guessing that changes though. I apologise for the lack of knowledge. I'm kinda just teaching myself everything about computers.

On Sat, Jul 27, 2019, 4:04 AM bcoles notifications@github.com wrote:

You know how you hooked your browser on your machine? You did so by visiting a URL in your web browser. The URL probably looked something like this:

http://1.2.3.4:3000/demos/basic.html

Your friend will need to visit that URL on their phone.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/beefproject/beef/issues/1749?email_source=notifications&email_token=ALK5MEFBBZN2YPILCYYAQUTQBQFSRA5CNFSM4IHIXKTKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD26HWHQ#issuecomment-515668766, or mute the thread https://github.com/notifications/unsubscribe-auth/ALK5MEGHEBH7TT3ZIJJRXDDQBQFSRANCNFSM4IHIXKTA .

bcoles commented 5 years ago

I'm kinda just teaching myself everything about computers.

Here's some steps which may help with debugging.

Is port 3000 accessible remotely? You can verify with netcat or a web browser.

If port 3000 is accessible remotely, and the BeEF hook is not working, then there may be an issue with your BeEF configuration, or you may have identified a bug.

If port 3000 is not accessible remotely, confirm that your host is routable from the remote host. You can verify network route with ping or traceroute.

If there is no route, then you'll need to fix your network routes. BeEF cannot configure your network routes for you. If you're using a virtual machine, you'll need to bridge the virtual machine network adapter for other hosts on the LAN to access it. If you're connecting between networks (ie, WAN <-> LAN), then you'll need to port forward port 3000 at the permieter router.

If the host is routable, yet port 3000 is not accessible, it is possible that a firewall is blocking the connection.

You can verify whether port 3000 is blocked by starting a netcat listener with nc -lvp 3000 and attempting to connect to that port from the remote host. If the connection fails, then you'll need to review the inbound firewall configuration on your host, and the outbound firewall configurtion on the remote host.

You could also verify by attempting to connect from the remote host to a different port on your host. For example, you could start Apache on port 80 (service apache2 start) and try to connect to port 80 from the remote host. If the connection succeeds, then you know port 80 is not filtered by a firewall.

sin3141 commented 5 years ago

I'll give it a shot.

JessWill commented 5 years ago

Hi @sin3141, Do you still need assistance with this? I'll be closing this ticket in a weeks time, if not.

sin3141 commented 5 years ago

I'm not entirely sure. I haven't tried in a long while. You can go ahead and close the ticket. When I get the time to try it out I'll bring it up if theres still issues

JessWill commented 5 years ago

Thanks @sin3141 :)