beefproject / beef

The Browser Exploitation Framework Project
https://beefproject.com
9.67k stars 2.13k forks source link

Add Malicious Java Applet Command and Control Extension #633

Closed bcoles closed 10 years ago

bcoles commented 12 years ago

Add an extension to act as command and control for remote zombie systems hooked by the malicious Java applet.

The extension should be able to:

The applet itself will use a slightly modified version of the current BeEF network poll requests with an additional :is_applet=>true property.

milo2012 commented 12 years ago

Thanks . I will work on it.

Sent from my iPhone

On 7 Mar, 2012, at 1:33 PM, Brendan Colesreply@reply.github.com wrote:

Add an extension to act as command and control for remote zombie systems hooked by the malicious Java applet.

The extension should be able to:

  • send commands to the hooked system and receive the results.
  • contain modules with preconfigured commands (for different operating systems), for example: Have the applet spoof DNS

The applet itself will use a slightly modified version of the current BeEF network poll requests with an additional :is_applet=>true property.


Reply to this email directly or view it on GitHub: https://github.com/beefproject/beef/issues/633

bcoles commented 12 years ago

Thanks mate. It might be a better idea to work on the following issues first though:

Issue# 634 - Augment the malicious java applet module Issue# 635 - Augment BeEF core to pass requests/responses for the malicious Java applet

We need to modify the core to correctly pass the requests/responses to the extension and construct a function in Java for the applet to mimick the current network requests used in BeEF. Admittedly these are both fairly large tasks.

infodox commented 12 years ago

Perhaps also have the java applet used as a vector for code execution on the host ala Meterpreter payload? As in, have it act as a dropper? Or have I simply lost my fricken mind :P Or have it load a browser plugin for persistence?