Open jme418 opened 5 months ago
Thank you for bringing this to our attention.
The image has been removed because it contained a routable IP address, but the discussion can continue with the image omitted. Could you clarify if the issue pertains to the console message "browser: UNKNOWN -121.0.0.0"?
You can also join our Discord for assistance with this issue. Here's the link: https://discord.gg/ugmKmHarKc
Thank you for bringing this to our attention.
The image has been removed because it contained a routable IP address, but the discussion can continue with the image omitted. Could you clarify if the issue pertains to the console message "browser: UNKNOWN -121.0.0.0"?
Well, the messages I want to get rid off are the ones with the following structure:
[!] Browser Details Invalid browser name/versions/plugins from the hook browser's initial connection.
And also, as a consecuence of them, the one you mentioned:
browser: UNKNOWN -121.0.0.0
Thank you for pointing this out. We'll look into that bug.
Hi @jme418 , I'm investigating this and will try to reproduce it. Are you still experiencing the issue?
I have reproduced the issue on Ubuntu 24.04.1 LTS (64-bit) with Firefox 130.0 (64-bit) as the victim browser. This was with metasploit plugin enabled.
When starting beef without metasploit integration, the message about invalid browser doesn't come up, only the 'Hooked browser' one once a module is executed. Example in the screenshot below is with 'Fake Notification Bar' module.
First Steps
BeEF Version: 0.5.4.0 Ruby Version: ruby 3.1.2p20 (2022-04-12 revision 4491bb740a) [x86_64-linux-gnu] Browser Details (e.g. Chrome v81.0): Causing problems with all I've tried (FF - 115.8.0esr, O - 108.0.5067.29, C - 123.0.6312.86, 123.0.6312.58, 121.0.6167.178) Operating System: Linux, Windows and Android
Configuration
Steps to Reproduce
I did the installation guided by this page: https://null-byte.wonderhowto.com/how-to/hack-web-browsers-with-beef-control-webcams-phish-for-credentials-more-0159961/
and all it's looking great, with metasploit exploits correctly loaded.
[removed]
Something strange I can see is that the plugins one appears only when accessing via Android.