Upload

Loading icon Loading...

This video is unavailable.

BeEF tunneling proxy (for fun and profit)

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add BeEF Project's video to your playlist.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like BeEF Project's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike BeEF Project's video.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Uploaded on Jul 12, 2011

Using the victim browser hooked in BeEF as a tunneling proxy, we will see the following scenarios:
- browsing the authenticated surface of the hooked domain through the security context of the victim browser;
- spidering the hooked domain through the security context of the victim browser;
- finding and exploiting SQLi with Burp Pro Scanner + sqlmap (through the victim browser too :-) )

See: http://beefproject.com - @antisnatchor and @beefproject for more!

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to