n00py / WPForce

Wordpress Attack Suite
https://www.n00py.io/2017/03/squeezing-the-juice-out-of-a-compromised-wordpress-server/
BSD 2-Clause "Simplified" License
924 stars 220 forks source link

Using Yertle - Help #23

Open Pen-Ace opened 1 year ago

Pen-Ace commented 1 year ago

Hi,

I got Yertle to load properly, but when I try to use the beef exploit, I get no hook back into beef. Yertle requested an IP address; which IP address am I supposed to provide so that beef can pick up the hook?

Thanks

n00py commented 1 year ago

Any IP address the target can hit. If the target is on the internet, it needs to call back to an internet accessible IP address.

Also keep in mind most browsers will not load an HTTP beef hook into and HTTPS site.

Pen-Ace commented 1 year ago

Hi @n00py

I have this set up as so:

On my local machine, I have xampp running apache, which hosts my WordPress site. I go to Kali and open that site inside my VM with the IP:port/site, and everything works fine. I can access the os-shell site and launch beef. When I enter a target IP address, it says Beef hooked added, but when I search the site again and load beef, there are no hooks? Any suggestions? I am so close to making this work!