Welcome to eLearnSecurity Community

Once logged in as a eLearnSecurity student, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll be able to customize your profile, receive reputation points as a reward for submitting content, while also communicating with other members via your own private inbox, plus much more! This message will be removed once you have signed in.
 
If you are not an eLearnSecurity student yet, give a look at our awesome IT Security courses.

  • Announcements

    • Vincent

      Posting copyrighted material   08/27/2016

      Posting copyrighted material is a huge violation and WILL lead to you being banned from eLearnSecurity.
Sign in to follow this  
Followers 0
azagorath

BeEF 4.3 and Metasploit 4 integration on BT5R2

This how to integrate BeEF with metasploit configuration setup on BT5 R2.

Step 1: install BeEF bundles ( from BT start menu) this will install all gem requirements as well

Step 2: Edit /pentest/web/beef/config.yaml to enable metasploit , make sure it looks the same as shown .

1fd2j6.jpg

Step 3: Edit /pentest/web/beef/extensions/metasploit/config.yaml Note: IP addess has to match in all configuration files regardlessif you going to use eth0 IP OR 127.0.0.1

2sam96r.png

Step 4: Edit the msgrpc plugin in the msf3 folder to reflect your IP address instead of 127.0.0.1 (if you are NOT going to use 127.0.0.1)

voy9n8.png

Step 5: create a file in the msf folder called BeEF.rc and add this line to it : load msgrpc ServerHost=your IP Pass=abc123 ServerType=Web , save the file.

Step 6: now start msfconsole with BeEF.rc ---> msfconsole -r BeEF.rc

Step 7: start beef from the start menu , if all configuration ok , you should see beef successfully connected to metasploit and loaded exploits.

315zq09.png

if you see APi fire not authenticated , check and make sure you used the same IP address in all configuration files .

Share this post


Link to post

Great :) Thank you!

Share this post


Link to post

Great :) Thank you!

anytime :)

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  
Followers 0