I'm the butcher would you like some BeEF

Preview:

DESCRIPTION

Recently a lot of focus in BeEF has been towards developing cool new features that help the day to day job of a social engineer, hereafter known as “The Butcher”. We have been working very hard and secretively in the last months to widen our range of meaty goods within the Browser Exploitation Framework. During this talk we will release new modules and extensions specifically aimed toward automating the technical parts of a social engineer attack. Employing techniques that are currently used is great, however “The Butcher” wishes to impart knowledge upon the attendees regarding new techniques that employ successful vectors targeting different browser within different security contexts. After introducing people to the project who may have never heard of it before, we will be sharing information about real social engineering / penetration testing work that we have done recently and how we have advanced BeEF to achieve maximum coverage. This includes: Website Cloning: but you haven’t seen it like this before! Email Spoofing: mass email, easy. Browser Control / Pwnage Automation: control BeEF programmatically using the RESTful API.

Citation preview

I’m the Butcherwould you like some BeEF?

Michele ‘antisnatchor’ OrruThomas MacKenzie

7th Sept 2012 - London

1

Who are we

Michele OrruThe Butcher

Thomas MacKenzieThe Meat

2

Outline

• A Social Engineering real story

• BeEF intro

• The new BeEF Social Engineering extension

• Having fun with the RESTful API

3

Social Engineering

• “Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information.” - Grandfather of all knowledge (Wikipedia).

4

Our Mission...• Tasked with gathering as many

usernames and passwords as possible in a small amount of time

• Tried calling and pretending to be person of authority but awareness seemed to be higher

5

So...

• We heard great things about S.E.T.

• Decided to use that to clone the website (but found some bugs and limitations that almost made it unusable)

6

Mass-Mailer

• With the help of a colleague we then created a basic mass-mailer that used personalization, HTML, pictures and had the ability to spoof the domain name (thanks to their SMTP server settings :-)

7

We Won

8

But The IT Admin was like...

• DO NOT CLICK ON THAT LINK

9

We then said (sending another email)...

• DO CLICK ON THAT LINK

10

AND... WE WON AGAIN!

11

But...• We thought we could do it better and

integrate some awesome client-side exploitation whilst we were at it...

12

Meet BeEF

• Browser Exploitation Framework

• Pioneered by Wade Alcorn in 2005

• Powerful platform for Client-side pwnage, XSS post-exploitation and generally victim browser security-context abuse.

• The framework allows the penetration tester to select specific modules (in real-time) to target each browser, and therefore each context.

13

14

15

Meet BeEF

• Demo

16

Social Eng. extension• The idea was to have some BeEF

functionality that can be called via the RESTful API, in order to automate:

• sending phishing emails using templates,

• cloning webpages, harvesting credentials

• client-side pwnage

17

AND... WE DID IT!

18

Social Eng. extension

19

BeEF web_cloner• Clone a webpage and serve it on BeEF,

then automatically:

• modify the page to intercept POST requests

• add the BeEF hook to it

• if the page can be framed, after POST interception load the original page on an overlay iFrame, otherwise redirect to original page

20

• Demo

BeEF web_cloner

22

BeEF mass_mailer• Do your phishing email campaigns

• get a sample email from your target (with company footer...)

• copy the HTML content in a new BeEF email template

• download images so they will be added inline!

• add your malicious links/attachments

• send the mail to X targets and have fun 23

BeEF mass_mailer• email templates structure

24

BeEF mass_mailer• ‘default’ template HTML mail

25

• how the ‘default’ template email will look

BeEF mass_mailer

26

• curl -H "Content-Type: application/json; charset=UTF-8" -d 'body' -X POST http://<BeEF>/api/seng/send_mails?token=0fda00ea62a1102f

{ "template": "default", "subject": "Hi from BeEF", "fromname": "BeEF", "link": "http://www.microsoft.com/", "linktext": "http://beefproject.com", "recipients": [{ "user1@gmail.com": "Michele", "user2@antisnatchor.com": "Antisnatchor"}]}

BeEF mass_mailer

27

• Demo

BeEF mass_mailer

28

Combine everything FTW• Register your phishing domain

• Point the A/MX records to a VPS where you have an SMTP server and BeEF

• Create a BeEF RESTful API script that:

• Clone a webpage link with web_cloner

• Send X emails with that link with mass_mailer

• Script intelligent attacks thanks to BeEF browser detection

29

• Last demo

Combine everything FTW

30

BeEF web_cloner + mass_mailer + RESTful API

=

31

Thanks

• Wade to be always awesome

• The other BeEF guys: Brendan, Christian, Ben, Saafan, Ryan, Heather

• A few new project joiners: Bart Leppens, gallypette, Quentin Swain

• Tom Neaves for the butcher/hook images :D

32

Questions?

33