{"id":1295,"date":"2022-02-28T05:42:27","date_gmt":"2022-02-28T05:42:27","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1295"},"modified":"2023-04-24T07:42:39","modified_gmt":"2023-04-24T07:42:39","slug":"how-to-use-beef-over-wan","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-use-beef-over-wan\/","title":{"rendered":"How to use Beef Over WAN? | Ethical Hacking 2023"},"content":{"rendered":"\n<p>In this article, you will read about how to use beef over wan &#8211; <strong>( Wide-area Network ) <\/strong>in Linux. We will also show you the configuration and installation process rather than just showing you how to use it. For using Beef over wan we are using a tool called <a href=\"https:\/\/github.com\/AzizKpln\/Beef-Over-AWS\" target=\"_blank\" rel=\"noreferrer noopener\">Beef-xss over AWS<\/a>.<\/p>\n\n\n\n<p><strong>Disclaimer \u2013 <\/strong>This blog is for educational purposes only, If you do anything illegal then we are not responsible for it\u2026<\/p>\n\n\n\n<h2 id=\"what-is-beef-tool\" class=\"wp-block-heading\">What is Beef Tool?<\/h2>\n\n\n\n<p>Beef, which means &#8220;Browser Exploitation Framework&#8221; is a tool used by Penetration Testers and <a href=\"https:\/\/reconcybersecurity.com\/blogs\/category\/hacking\/\" data-type=\"URL\" data-id=\"https:\/\/reconcybersecurity.com\/blogs\/category\/hacking\/\">Ethical Hackers<\/a> to get access into victim&#8217;s browsers by sending a malicious link made by Beef. The link just shows a beef purchasing website on it after opening but in the backend, we get access to their browser&#8230;<\/p>\n\n\n\n<p>This tool has a lot of features in it which are also fun to use for example -how to  playing a sound in a victim&#8217;s system, how to sending them fake notifications, and much more. <\/p>\n\n\n\n<p>Also, there are most of the features that are very scary and dangerous which you should not use to harm anyone for your advantage.<\/p>\n\n\n\n<h2 id=\"how-to-set-up-beef-over-wan-for-linux\" class=\"wp-block-heading\">How to Set up Beef over WAN for Linux?<\/h2>\n\n\n\n<p>So first, in your browser search for the &#8220;Beef over aws&#8221; Github tool then click on the first website coming from Github. The website link is &#8211; <a href=\"https:\/\/github.com\/AzizKpln\/Beef-Over-AWS\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/AzizKpln\/Beef-Over-AWS<\/a>.<\/p>\n\n\n\n<p>Now copy the link from there and open your terminal then go to the destination where you have to save the tool. After coming to the location type ( <strong>git clone &lt;your code&gt;<\/strong> )&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220226_210042.png\" alt=\"\" class=\"wp-image-1301\"\/><\/figure>\n\n\n\n<p>After installing the tool you have to come inside the directory of beef by typing ( <strong>cd Beef-Over-AWS<\/strong> ). Then install the requirements of it by this command ( <strong>.\/install.sh<\/strong> )&#8230;<\/p>\n\n\n\n<p>Now it will take time to install the dependencies, So be patient and do not press the &#8220;ENTER&#8221; key in that terminal or it will be interrupted&#8230; <\/p>\n\n\n\n<p>If your requirements installation is over so you can start the tool by typing ( <strong>.\/beef_over_aws.sh<\/strong> ). There you can see two languages, the First is Turkish and the second is English. So for Turkish press number 1 and English press 2&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_122018-1.png\" alt=\"\" class=\"wp-image-1303\"\/><\/figure>\n\n\n\n<p>After selecting the language, it will ask you for writing the username and password which will be used for login into the Beef panel&#8230;<\/p>\n\n\n\n<p>Now, wait until it asks you for giving port no, and when it asks you then type port ( <strong>3000<\/strong> ). On this port we will use are Beef Framework server&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_123245.png\" alt=\"\" class=\"wp-image-1305\"\/><\/figure>\n\n\n\n<p>So it starts the Beef server on port 3000, you can visit the panel by clicking the link which is shown in the image&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_182906-1024x520.png\" alt=\"\" class=\"wp-image-1309\"\/><\/figure>\n\n\n\n<p>On the login page type the username and password which you had written previously to access the panel. Now our beef is ready to use&#8230;<\/p>\n\n\n\n<h2 id=\"how-to-hack-browser-with-beef-over-wan\" class=\"wp-block-heading\">How to Hack Browser with Beef over wan?<\/h2>\n\n\n\n<p>You can see there are two &#8220;Here&#8221; buttons on the home page of Beef over wan, Just click the second one and copy the URL from there and send it to the victim&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_185711-1024x333.png\" alt=\"\" class=\"wp-image-1313\"\/><\/figure>\n\n\n\n<p>The website on that URL is the website that will be shown to the victim as a beef over wan purchasing website. Now you can see in the image that we get the connection as an IP in the &#8220;Online Browsers&#8221; folder&#8230;<\/p>\n\n\n\n<p>Click on the IP and come in ( <strong>Commands<\/strong> ) tab, here you can do whatever you want with the target&#8217;s browser&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_202530.png\" alt=\"\" class=\"wp-image-1324\"\/><\/figure>\n\n\n\n<p>So what can you do with the victim&#8217;s browser, there are lots of folders in it as you can see in the image above&#8230;<\/p>\n\n\n\n<p>Every folder has some unique features in it for example &#8211; Google phishing page, playing sounds, sending fake notifications in the victim&#8217;s browser&#8230;<\/p>\n\n\n\n<p>This is an image of sending a fake notification on the browser &#8211; <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220227_204203-1024x327.png\" alt=\"\" class=\"wp-image-1326\"\/><\/figure>\n\n\n\n<p>We told you how to set up and configure Beef over wan and also showed you an example of what can you do with target&#8217;s browser. Now you have to try other options yourself so you can learn to find things on your own&#8230;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Recon Cyber Security<\/p>\n","protected":false},"excerpt":{"rendered":"In this article, you will read about how to use beef over wan &#8211; ( Wide-area Network )&hellip;\n","protected":false},"author":1,"featured_media":10840,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10],"tags":[198,199,200,201],"class_list":{"0":"post-1295","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"tag-browser-hacking","9":"tag-hack-browser-with-beef","10":"tag-how-to-hack-browser","11":"tag-how-to-use-beef"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=1295"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1295\/revisions"}],"predecessor-version":[{"id":11002,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1295\/revisions\/11002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10840"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=1295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=1295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=1295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}