Ethical Hacking free courses: Episode 0 5; Browser Hack (Practical 01)
Ethical Hacking free courses: Episode 0 5; Browser Hack (Practical 01)
It is important to use a browser to browse the web , because the browser is the tool that connects you to the web. You can think of a browser as a portal that connects your computer to any website in the world, requests a server, and loads data from the server. Keeping the browser safe is very important, so of course keep the browser updated regularly, and refrain from using erroneous extensions. But even then, the browser can be easily hacked, and to be honest, you do not need to take any action here, which means that it is possible to attack your browser by just clicking the site link without going to any site. And unfortunately many antiviruses can't detect it.
In this part of Ethical Hacking Free course I will discuss about browser hacking. Today we will discuss how to hack a browser, what information can a hacker steal through this hack? How can you stay free from this hack. So let's not talk too much.
What is a browser hack and how?
The only thing that works here is that there is a tool in Kali Linux called Beef and it is named after Beef Attack. With that tool, the hacker payload created JavaScript, along with a panel for it. So that the hacker can monitor everything from that panel. That panel is graphical, so the hacker creates an Html file on the web server and attaches the payload JavaScript to it. This time he sent the link to the victim and the victim went to that link but did not get anything. This time he turned around but he didn't understand anything, in fact he had no idea that he had been hacked. As soon as the information goes to the hacker, then the hacker gets control of your browser. And this is how the browser is hacked. This article is very important to avoid this: How to know if it is safe without clicking the malicious link?
Is it possible to get information by hacking the browser?
- Hook sites or sites saved in the browser. Hackers will get a list of the sites you have browsed.
- Cookies may be stolen. This means that if you are logged in to a site in the browser, all sessions will be stolen. Hackers do not have to login to the site with a new password. Suppose you are logged in to Facebook, your Facebook ID will be auto-logged on the computer of the hacker.
- You will get a list of common software installed on your computer. For example, if you use Microsoft Office, you will be hacked, the hacker will understand that you are using Microsoft Office, maybe there is an error in your version, and will attack in the same way.
- There is an extension called LastPass from which data can be stolen. It is better to say that the most popular password manager now is LastPass, so everyone understands how risky it is. Although it contains encrypted data, it is also possible to decrypt it.
- All information can be stolen from your browser's toolbar and bookmarks.
- You can turn your webcam on or off.
- Moreover, the biggest thing is that it can take you to phishing sites or other sites by forwarding the site, again it can force you to download payload on your computer again and again. This means that with the browser you will want to type the address to Google, but go to the hacker's fake site, and your browser will invite new malware to the computer.
- This may force you to login fakely, as if you are running Facebook, this time popup login option is up, saying re-login at the end of your session. You will login to the pop-up login option without understanding anything. And diameter, the password is gone, so of course it is very important to turn on two-factor verification. The hacker will not be able to login your ID even after stealing your password.
There are many things that can be done that cannot be done through my writing. It is not possible to show its busy use in practice, then it will be a complete black hat hacking. Below I will teach you how to do this attack. But you must use it ethically, you must not attack anyone, you must take permission. Now here is another question, what is the use of an ethical hacker knowing about such a hack attack? Look, you're a security specialist, which means you have to be the father of Blackhat too. You may have to carry out such an attack to check the security of the computer browser or to see if the internet security software is working properly. But of course it cannot be run against anyone.
How to Beef Attack?
Start beef
- Of course a computer or raspberry pie
- Ink Linux operating system
- All ports on your internet connection and network must be open (scanning ports that have been opened will be discussed in detail in the next section).
- Keep a cool head, and focus on the task at hand.
Now it's your turn to run the Beef tool on your computer and configure it. There are two ways you can run a beef tool. Since this is an application, so “Applications” -> “Kali Linux” -> “System Services” -> “BeEF” -> “beef start.” - Once here, the beef tool will run. If you want, you can open the Linux terminal and enter the command "cd / usr / share / beef-xss
./beef" to run the beef tool.
By running Beef Tool, all the necessary services will be run on your computer and your control panel will also be created. You will need to access your Control Panel using any browser on your local host (127.0.01). The Beef Control Panel opens at 3000 ports. So type the following address in the browser to enter the panel.
http: // localhost: 3000 / ui / authentication
Then a login page will open and you need to login to the panel. By default the username and password is "beef" - as soon as you enter the diameter credentials you will be able to access this power tool and hack any web browser. The interface shown in the screenshot below is an image of my local host, and here is a list of your hacked browsers.
Browser hooking
The main purpose of this tool is that you must hook the victim's browser. This means that a code has to be loaded into the browser so that the browser can send all the information to you. Usually you have to install the hook code on a web server, maybe on your own website or any website that you have to control. Now you have to enter your victim on that site, you have to enter him in your link using social engineering, now just open the affected site and the hook code will be injected in the browser.
Beef Hook is basically a JavaScript file, usually called "hook.js". Future tutorials will show you how to create a hook file, and how to inject a hook file into Victim's browser in different ways. Then I will explain in detail, how you can add this Java file to the webpage. In the screenshot below I hooked up a computer browser on my local network, you can see it is Internet Explorer 7 running on the old Windows XP OS.
So once you are able to successfully hook someone's browser, you will have to run many types of malicious activity. There are many types of commands to run and a lot of information to grab. If you look at the screenshot below, you will understand how much can be done with a hooked browser. However, all these detailed tutorials will come in the next episodes, because there are still many things to be clarified. You have to give a good idea about the port. You need to learn how to inject files on a web server, starting with installing Linux and discussing the basic interface. You can call this post just a demo post, from which you will get an idea, in fact, you will learn from this course what kind of advanced subject to learn later and practical. However, this subject must be taught 100%, but a little patience.
How to keep your browser free from hackers?
First of all, you must always keep your internet browser and any internet tool updated to the latest version. You need to keep your operating system up-to-date at all times, to show that you can't turn off Windows Update because you are reluctant to spend data, otherwise you are trying to figure out what the consequences might be.
Of course, don't install unfamiliar and unfamiliar browser extensions, just download the extension from the official website. You need to use ad blocker, it will not run malicious scripts. And the most important step here is, of course, do not save your passwords in the browser. Because it will be easier to get them, it would be better to use LastPass Password Manager , because it has all the data encrypted — and lastly you must use VPN , it will never get the real IP address of your computer hacker, it will have temp IP, from which He will be disconnected next time.
Hopefully, you have got the complete idea of hacking web browsers from this complete article and some of the issues are shown here in practice. Browser hooking will be taught in the next episode, but there is much more to learn before that, which will be discussed in more detail in the next episode. Since this is an ethical hacking course, the issues must be used for ethical purposes, the system must be given security, it is not our job to hack anyone. In the next episode, I will come up with something more extraordinary, until then everyone will be fine. So many thanks so far today for bothering to read this post to the end.
Hope everybody on this site also had a great day. Stay well, stay healthy, stay safe with Sobuz Bangla TV . Thanks. God bless you.
















No comments