Follow this project for FREE with Linode -- Sign up for Linode here: ntck.co/linode and you get a $100 Credit good for 60 days as a new user! You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit. How to install BeEF on Ubuntu and port forward: ntck.co/34DOea6 🔥🔥Join the NetworkChuck membership: ntck.co/Premium **Sponsored by Linode 0:00 ⏩ Intro 2:43 ⏩ STEP ONE: set up your Linux server 2:58 ⏩ Installing BeEF 5:55 ⏩ STEP TWO: Hack someone (ethically of course) 6:58 ⏩ What can you do with it? 7:44 ⏩ Social engineering 9:05 ⏩ Hacking their LastPass! 9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network 11:13 ⏩ Redirect their Browser to Rickroll 12:10 ⏩ you can even use BeEF to hack a Phone! 13:00 ⏩ Outro
dude linode is trash they banned my email on first time ever to signup for fraud ?? for real i even tried another gmail and i even created a new email all banned like wtf even their support does not want to reply for my email explaining my case and asking for answers
Haha nice try, but i will not click on your links. ;) It would be also nice, if you can tell us how to defend against this hack. Are browser extensions like "NoScript" a good idea?
GET linode HE gets some you pay a month! NICE socail engineering hack but at least we learned how dangerous those text messages we get on our phone or email are.
@@5dollasubwayfootlong this isn't really phising sense it allows you to take control of someone device (hacking) it isn't just scaming them or giving them a virus
Hello network Chuck , I wanted to thank you for the information that you are teaching, I'm 62 yrs. old and I have to replay your videos a few times but I love that your Straight to the point. Anyway once again thank you and be safe Robert
This is the most comprehensive, understandable, well-presented historical spy site overview I have heard from any online agency. I have subscribed to and shared your channel with friends around the world. Whoever created *Pentagon Codes* that particular spy site deserves the highest of journalistic accolades. Bravo!
The truly terrifying thing is how easy this is. If you are even remotely competent with a computer you could pull this off and potentially devastate someone’s browser security.
Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .
@Max Trenton I call nonsense on your comment. People deserve to know that people are wasting their time and plotting against them. I am an ethical hacker and I saved people lives against domestic violence abusers because of this. And those very same people were husbands/wives/children that plotted to kill their spouses/significant other for financial gain, real estate or just pure evilness. Guess what I stopped people from getting killed and alerted the authorities and the clients involved.
Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!
I'm new to trading and I find it difficult using these strategies well. Where can I find a legit broker? that will manage my account and also teach me how to trade
That's Scary, by the way I am taking lot of Cybersecurity classes at my school. I think the only way to protect yourself is checking your logs every time and don't click links if you are not sure who sent you.
@Snakebitesspider there are a bunch of comments like this on this video. They are bought comments by the channel to boost their algorithm. That's why they sound so "off"
There is no doubt that you will rise fast at the apex of your career *Pentagon Codes* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!
This is really good for showing your family and friends how vulnerable they are if they make bad digital security choices. Have you done a video on how to mitigate these sort of attacks or what to do if you have been targeted?
Literally the perfect CZcamsr. Great content, presentation, explanation, everything - all great. But good god man everytime you slurp the coffee I feel the rage of one billion hornets piercing my ear drums and I want to die. I really want to watch all your videos but I can't do it
You actually always make great videos chuck, Learnt quite a lot and I have come to realise how technology really is an advantage and vulnerability . Keep doing the good work , I found your video trying to learn something on seeing what my girl be doing , guess this is a great start haha ..
it totally reminds me of those ashley madison redirects when you click on a link of a person who on tinder, or some other marriage or dating site works. You sign up, bam they pwn your info. My eyes have been opened to new attacks on a security level that most people would not be attentive too even if they did do a dns look up of the specified link sent to them. This may seem simple, but this is like pishing 303 or higher advanced classes on detecting a scam site or otherwise. I dispise how you force coffee down our throats, but you bring up very valuable points on cyber security. We may disagree on some things, but you are providing knowledge to the people. cheers sir!
I didn't think much of it (could have built it myself) until the part where you could scan someone's private network through an apparently otherwise uncompromised browser. I mean, how on earth does a well built browsers sandbox even permit acces to the rest of a person's private network without anyone realizing?
This is insanely easy, wow I've learned so much watching your channel.. I still haven't bit the bullet and got fully into cyber security, just messing around about a year now but. I think I speak for quite alot of us when I say we really appreciate you sharing your knowledge with us!!
Very educational, however, I think its prudent to explain some more of the behind the scene stuff. Such as hows and whys of beef. For instance I would be interested in learning WHY beef even exists, or how is it actually controlling everything. I think it would also be quite helpful to show different methods for figuring out if you have been hacked.
For anyone that has background noise issues. RTX Voice is your friend. I use that with VoiceMeeter and my 30 dollar mic sounds crispy clean with no background noise.
@@_.KLYDE._ in my 1050 ti rtx doenst work well but the Asus two way noise cancelation works like a charm I'd say it works even better from the videos I saw, the only thing is you need a specific motherboard.
@@CrampavanAdventures Are you sure you're not using Nvidia's other program? RTX Voice is only using 1.5% cpu, 2.7% GPU, and 35MB memory with a 1070TI. I have zero issues with my PC.
The thing which could be the most interesting one for this software was not shown in the video. As I see, all modern (for the moment video was filmed) browsers allow to intergrate agent software which interacts with Beef complex. And transfers all information from 'client side' to 'server side'. If it is so, the most interesting point is how it is possible (is it a bug or a feature). I suppose that authors should have more information about how it works. I see some parallels with SQL injection attack (I mean in terms how browser become compromised) but I would be glad to hear how it really works (or worked if this vulnerability is already fixed).
The biggest risk for "hacks" like this are the social engineering ones where you might think that you are on a legit page, but you're not. JavaScript can't control your computer, force you to download and install files you don't want or do a lot of the scarier things that executable programs can do because it runs in a sandbox where it has a very limited scope of what it can do by design. Even the "online/offline" portion of this is misleading because it really just means "connected/not connected" which is as simple as closing that browser tab. The biggest thing is to make sure you're on a page owned by the company or person you're visiting, which is the same thing you should have already been doing.
@@kjantzer Good advice. One thing to note though - if BEEF is used with a XSS vulnerability in the website then the domain part of the URL will be correct so we can't rely on that. BEEF was originally designed for exploiting XSS not phishing (which is essentially shown in this video).
I was looking at the comments and I was interested in what the online/offline mean. Does it mean closing the browser is good enough in disconnecting the hook? Or if I was hooked once, I will be hooked forever like I will go online again after opening browser again?
The data your LAN subnet scan returned are the top and bottom addresses of the subnets and your gateway. Every subnet has an address at the top and the bottom that can’t be used as hosts
Thank you for all your work Chuck. Thanks to you I was inspired to learn networking and mess with all the amazing technologies around it an year and a half ago. Now I'm working as an System Administrator and can't thank you enough for what you've done!
@networkChuck you forgot to mention, of how is a phishing session closed, once it is initiated? The assumption is that closing the tab will be enough? And one additional question would be, does beef also have a reach on this informations as well?
1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of Targettrappers . Be there for yourself
My mom, grandma, sister, girlfriend would all fall for that. There’s one connective thread that ties them all together, and I just cannot think of what it is….
Hey man loving your content as I’m just getting into cyber security! Love this video so was wondering if you could do a video the same but how to do it with Linux in virtual machine? I’ve tried it for ages but can’t seem to get the link to load on another device. Help would be appreciated 😂
Such a crazy thought. I also saw this article on PC mag about the Coinbase Superbowl commercial with the QR code and it being a security nightmare. Some cities put QR code stickers on their parking meters for you to scan to go to their website and pay. Talk about a security nightmare. Someone slap their own QR code on there and use this Beef program to hook your browser. Crazy to think about. Thank you for putting up these great videos. To protect yourself from hackers you have to think like a hacker and study hackers.
1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of EagleSpy . Be there for yourself
Great video. I agree with some comments it would be nice to see a series of how you protect yourself from these types of hacks. Keep up the awesome videos
Find a Cyber Expert , and stop complaining about not been able to carry it out , cyber expert spend almost their whole life’s learning new codes and you think you will carry out the same as them with a 10 minute tutorial video ? .
No, I would never presume such a thing, it's kind of unrealistic. That is exactly why I'm watching it at 2x speed, because I can learn it in 5 minutes!
The video is very intuitive but scary. So one quick question, how do you know if your browser is hooked? What are the signs? Any tools to detect it? Thanks man, you are always the best
@@imanidiotanyway6393 The real use of this is in XSS vulnerable websites. You’d inject the code into an actual website, and visitors wouldn’t know any better. The bad actor could then make a fake login pop up for the website to harvest credentials.
Yeah, it's not even a vulnerability it's just a casual website that have live control on js code. Simple, but might work for people that will not check the url before inserting their critical data.
Yeah, probably best thing it offers is login pages for different authenticators, though they could probably be updated. That said, it isn't all that hard to copy some HTML and CSS to do that yourself.
this video is overrated, it's more like phishing not hacking. when you open the website, it only gets harmless info just like any other website you visit. and if the website asks you for Google Password, maybe don't give your password to an unknown website?!
@fatopossum you realize, that Edge & Chrome will throw a hissy fit about the google passwords right? They really attempt no populate them on 3rd party sites.
thx for dis not long ago i was hacked but it seems to me they have stopped and im pretty sure its cuz of the one where it redirects u to google accounts
Awesome Video Chuck! One thing that scares the shit out of me is that every third party js provider (google analytics etc.) basically have the same opportunities. Every time someone copies a tag inside their website this could happen. I think this is also worth discussing
never knew you were colourblind. I am too, deuteranomaly. This is why I want to get into cyber security, colourblindness won't affect me much at getting the job, unlike other jobs.
Hi Chuck! Thanks a lot for sharing this. I really appreciate all your work. After watching this video have to confess got scared of being already hacked and I thought that maybe you can create the II part teaching us how we can check, avoid or repair our machines after been hacked. Also I wonder a lot (and search) about the consequences of this are huge. For example what happen if I set and use the sincronize tool on firefox. Can then this JS script be traspased to other machine's browsers? Well THANKS A LOT MASTER!
Video with very useful information. Awesome! 👍 However it would be great if there was also a video on what to do if you realize your own browser has been "hooked". How does one "unhook" a browser?? That would have been very useful to know ☺️
I feel "hook" is a misleading and scare mongering term for what is happening. You are fingerprinting the browser, gather data on the IP connection, and doing things you can just do with Javascript and nmap. Beef is just a very convenient interface to do that. You do not in any way retain control over the target's browser outside of their time on the page. You cannot, like, read out their stored passwords unless you enter them, you cannot read the pages they visit or anything. Essentially, it's one single phishing site with content you can quickly adjust.
Follow this project for FREE with Linode -- Sign up for Linode here: ntck.co/linode and you get a $100 Credit good for 60 days as a new user!
You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit.
How to install BeEF on Ubuntu and port forward: ntck.co/34DOea6
🔥🔥Join the NetworkChuck membership: ntck.co/Premium
**Sponsored by Linode
0:00 ⏩ Intro
2:43 ⏩ STEP ONE: set up your Linux server
2:58 ⏩ Installing BeEF
5:55 ⏩ STEP TWO: Hack someone (ethically of course)
6:58 ⏩ What can you do with it?
7:44 ⏩ Social engineering
9:05 ⏩ Hacking their LastPass!
9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network
11:13 ⏩ Redirect their Browser to Rickroll
12:10 ⏩ you can even use BeEF to hack a Phone!
13:00 ⏩ Outro
dude linode is trash they banned my email on first time ever to signup for fraud ?? for real i even tried another gmail and i even created a new email all banned like wtf even their support does not want to reply for my email explaining my case and asking for answers
Make a video or short on how to recognize and identify bad links. Or how to identify if its safe
What happens if someone use a vmware to run the linux server then do this ? Can we still catch them ?
@@Mr.Pandey28 just finished trying that and i am still trying to reach it with other devices so far only vmware can reach the hook
Haha nice try, but i will not click on your links. ;) It would be also nice, if you can tell us how to defend against this hack. Are browser extensions like "NoScript" a good idea?
This could potentially explain a lot...My life has been flipped upside down, being just hacked myself my subscribers directed me to this video
Hi jeracraft
Sup
Lol
Yea my main account was hacked and some one posted a mobox video what ever it was
Lmao
HIM: "remember, this for educational purposes only"
Amateur Hackers watching: "oh yeah this is very educational"
GET linode HE gets some you pay a month! NICE socail engineering hack but at least we learned how dangerous those text messages we get on our phone or email are.
Is phishing really considered hacking now...? Tech illiteracy is scary nowadays.
@@5dollasubwayfootlong this isn't really phising sense it allows you to take control of someone device (hacking) it isn't just scaming them or giving them a virus
This is solely for educational purpose😈😈
The video: teaches how to hack the government of any country and destroy it*
Also the video: this is only for educational purposes
Hello network Chuck , I wanted to thank you for the information that you are teaching, I'm 62 yrs. old and I have to replay your videos a few times but I love that your Straight to the point. Anyway once again thank you and be safe Robert
This is the most comprehensive, understandable, well-presented historical spy site overview I have heard from any online agency. I have subscribed to and shared your channel with friends around the world. Whoever created *Pentagon Codes* that particular spy site deserves the highest of journalistic accolades. Bravo!
The truly terrifying thing is how easy this is. If you are even remotely competent with a computer you could pull this off and potentially devastate someone’s browser security.
how do you do it? if i try to hook a browser then nothing happens. wether its my own hosted website or the demo
@@Jduekengn are you on the panel
@@Borisaurus8826 in the website which opens when i activate beef?
Anyone can get this thing right if you diligently go and find the right source , I have been able to carry out projects like this with some agency , And i have learnt that not everything is shown in these tutorials lately , still need some deep digging .
Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy
@Max Trenton I call nonsense on your comment. People deserve to know that people are wasting their time and plotting against them. I am an ethical hacker and I saved people lives against domestic violence abusers because of this. And those very same people were husbands/wives/children that plotted to kill their spouses/significant other for financial gain, real estate or just pure evilness. Guess what I stopped people from getting killed and alerted the authorities and the clients involved.
@@kestonsmith1354 u responded to a bot
@@kestonsmith1354 hacker gets fooled by youtube bot.
thats alot of likes
This is awesome. My wife is a bit careless with her information and thinks it's just a joke. This will be good to show her how scary it could be.
NIce, I'll teach my kids a lesson now. Switching careers and getting into IT/Security. It's a must have these days. Great work man!
This guy is the hacker version of Jerry rig everything, his voice, mannerisms, wow! Love you channel man!
Oh my hacker friends would love this, I’ll make sure to share + subscribe
Quite interesting the system in which a lot of things are carried out in todays modern world , I enjoy technology so much but i still think it makes us more vulnerable , still has taken the world to greater heights though . Interesting Video by the way!
Thats why i am stucked with using procyberspy.com for all my hacking related services , they are fast and trust worthy
You got alot of likes
You got a new subscriber...what an engaging way of teaching... fabulous
Continue making videos with subtitles, I'm Brazilian and I love your videos
Great work Chuck. I always leave with value , watching you flow with speedy execution.
Would love to see a video on detection, defending, blocking (aside from disabling JavaScript which is the best way, but might be too late)
Clear cache and web hooks
I'm new to trading and I find it difficult using these strategies well. Where can I find a legit broker? that will manage my account and also teach me how to trade
@@mohamadgaruab4389 Check up Helen Howard Pratea She's really one of the best and legit advisor out there right now
@@adamweah8037 i got into the market last year , but i havent been profitable in my trades , How do i get in touch with her
@@ashwinaditi1039 just put her name on google and you will be directed to her website
That's Scary, by the way I am taking lot of Cybersecurity classes at my school. I think the only way to protect yourself is checking your logs every time and don't click links if you are not sure who sent you.
The best programming CZcamsr with only Legit content🔥. Thank you for all you do, I really enjoyed all your videos
*Great Video , Will love you to post more contents and recommend reliable sources for this sort of informations.*
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
Yo uhh do you know you got a lot of likes?
@Snakebitesspider there are a bunch of comments like this on this video. They are bought comments by the channel to boost their algorithm. That's why they sound so "off"
Always pumped to see a new upload! You’ve your channel brother
#ProCyberspy has the knowledge and know how to find the right tools to for both private & public accounts using skill, empathy and wisdom.
Why so many bot comments on here
He will put cource on that soon.
There is no doubt that you will rise fast at the apex of your career *Pentagon Codes* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!
Yea please don't mind me
I am 100% going to use this for educational purposes ONLY
there is so much emotion emitted with such little reason. content creators are mini politicians
God forbid the man wants to build a brand and is passionate about what he does.
This is perfect. Me and my friend have an intense game where we do anything to rickroll eachother. Very helpful...
This is really good for showing your family and friends how vulnerable they are if they make bad digital security choices.
Have you done a video on how to mitigate these sort of attacks or what to do if you have been targeted?
Literally the perfect CZcamsr. Great content, presentation, explanation, everything - all great. But good god man everytime you slurp the coffee I feel the rage of one billion hornets piercing my ear drums and I want to die. I really want to watch all your videos but I can't do it
There isn't a thing such as the best CZcamsr ha ha, he's good in what he's doing but also he does some mistakes
You actually always make great videos chuck, Learnt quite a lot and I have come to realise how technology really is an advantage and vulnerability . Keep doing the good work , I found your video trying to learn something on seeing what my girl be doing , guess this is a great start haha ..
Him: "I'm going to show you how to do it, it's easy"
Also Him: "DO NOT DO THIS!"
Him: I’m going to show you how to make your family learn, it’s easy
also him: do not do this to everybody it will take you into Prison
LMAO
@@DataVerxx 🤖 🤫
it totally reminds me of those ashley madison redirects when you click on a link of a person who on tinder, or some other marriage or dating site works. You sign up, bam they pwn your info. My eyes have been opened to new attacks on a security level that most people would not be attentive too even if they did do a dns look up of the specified link sent to them. This may seem simple, but this is like pishing 303 or higher advanced classes on detecting a scam site or otherwise. I dispise how you force coffee down our throats, but you bring up very valuable points on cyber security. We may disagree on some things, but you are providing knowledge to the people. cheers sir!
I didn't think much of it (could have built it myself) until the part where you could scan someone's private network through an apparently otherwise uncompromised browser. I mean, how on earth does a well built browsers sandbox even permit acces to the rest of a person's private network without anyone realizing?
#ProCyberSpy. You really solved this problems about this topic in just 3 hours.... come on ...This showcases you are a role model and leader
Man you the best, you just make a hard thing so eazy just like that, big Respect for you Gee you the best, I'm spammimg thumbs up here🤝🏻🐐
@NetworkChuch Could you show us how to protect against certain Attacks? Are you safe when having JavaScript disabled on default against a Beef attack?
This is insanely easy, wow I've learned so much watching your channel.. I still haven't bit the bullet and got fully into cyber security, just messing around about a year now but. I think I speak for quite alot of us when I say we really appreciate you sharing your knowledge with us!!
Very educational, however, I think its prudent to explain some more of the behind the scene stuff. Such as hows and whys of beef. For instance I would be interested in learning WHY beef even exists, or how is it actually controlling everything. I think it would also be quite helpful to show different methods for figuring out if you have been hacked.
Well if you want to learn, why not find that out yourself?
Makes you wonder what links to click in the description xD. Nice video
Your tutorials are just fun... you're good at what you do. thanks
#procyberspy is good
This is terrifying !
You shouldn't get hacked just by opening a link ...
How can we protect ourselves from this?
Analyze the link before clicking it...
Use links analysers...
By not clicking on links that you know where it comes from..
is there any way to check to see if I have been compromised in this fashion ?
You can't be hacked if you open A link
@@Ahmed-fq3kz Oh, yes you can, big time. Cookie hijacking is the worst and all it takes is one click on a malicious link.
I have done a course about this but this is just the basics for a normal user but when it gets mixed up with Linux OS it's gonna be hella scary.
as a beginner audio / video editor, i can really hear the pain the editor must've felt cutting out the audio... poor dood
For anyone that has background noise issues. RTX Voice is your friend. I use that with VoiceMeeter and my 30 dollar mic sounds crispy clean with no background noise.
@@_.KLYDE._ ok
@@_.KLYDE._ in my 1050 ti rtx doenst work well but the Asus two way noise cancelation works like a charm I'd say it works even better from the videos I saw, the only thing is you need a specific motherboard.
@@_.KLYDE._ RTX voice used to much utilisation of my 3070 to warrant using it.
@@CrampavanAdventures Are you sure you're not using Nvidia's other program? RTX Voice is only using 1.5% cpu, 2.7% GPU, and 35MB memory with a 1070TI. I have zero issues with my PC.
When you don't have friends so you hack yourself:
The thing which could be the most interesting one for this software was not shown in the video. As I see, all modern (for the moment video was filmed) browsers allow to intergrate agent software which interacts with Beef complex. And transfers all information from 'client side' to 'server side'. If it is so, the most interesting point is how it is possible (is it a bug or a feature).
I suppose that authors should have more information about how it works. I see some parallels with SQL injection attack (I mean in terms how browser become compromised) but I would be glad to hear how it really works (or worked if this vulnerability is already fixed).
What sort of defense would work best against this type of attack on a home network?
Noscript
wonderful channel. I have to improve my English soon to watch without pauses 😂, a hail from Brazil
He is def a good teacher I learn fast from him and easy to understand. ! Keep them coming😂
Its my first video i watched on this channel and its awesome .
Thanks
Awesome! Keep it up! Can you please make a video about creating your own website that you can send out to friends and family to prank?
Why DM?
"don't click any links you don't know about for sure"
"just click the link in my description" LMFAO
🏳️🌈😰👇👉👈
I confidently refer you all to him his been a grate talented man.....$
You always have amazing content with terrific editing! Love the way you explain difficult subjects (you make them fun!).
This was one of best , you help me man i apreciate
The biggest risk for "hacks" like this are the social engineering ones where you might think that you are on a legit page, but you're not. JavaScript can't control your computer, force you to download and install files you don't want or do a lot of the scarier things that executable programs can do because it runs in a sandbox where it has a very limited scope of what it can do by design. Even the "online/offline" portion of this is misleading because it really just means "connected/not connected" which is as simple as closing that browser tab. The biggest thing is to make sure you're on a page owned by the company or person you're visiting, which is the same thing you should have already been doing.
^ This - always verify the url is correct, particularly when opening from a remote source like email. This video is more about "phishing"
yes
I confidently refer you all to him his been a grate talented man.....$
@@kjantzer Good advice. One thing to note though - if BEEF is used with a XSS vulnerability in the website then the domain part of the URL will be correct so we can't rely on that. BEEF was originally designed for exploiting XSS not phishing (which is essentially shown in this video).
I was looking at the comments and I was interested in what the online/offline mean. Does it mean closing the browser is good enough in disconnecting the hook? Or if I was hooked once, I will be hooked forever like I will go online again after opening browser again?
I tried and it’s amazingly good. Thanks for the great content…
The data your LAN subnet scan returned are the top and bottom addresses of the subnets and your gateway. Every subnet has an address at the top and the bottom that can’t be used as hosts
Top vid! Make a vid on protection from this Chuck!
Thank you for all your work Chuck. Thanks to you I was inspired to learn networking and mess with all the amazing technologies around it an year and a half ago. Now I'm working as an System Administrator and can't thank you enough for what you've done!
Did you have prior IT experience prior? I'm genuinely curious about your journey
Him: *"Don't do it! It is illegal and you will get caught."*
Also Him: "I am gonna walk you through every single step."
@networkChuck you forgot to mention, of how is a phishing session closed, once it is initiated? The assumption is that closing the tab will be enough?
And one additional question would be, does beef also have a reach on this informations as well?
Super duper scary. But good that you show this so people get more cautious
Look up *VIRTUAL CODE CRACK* on google to request for help and remember to thank me later
1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of Targettrappers . Be there for yourself
This is scary how you don’t use the return button.
I didn’t got the time to understand this but wow my eyes blown up before i can try translate it 😂
Man this video just took my paranoia to a whole new level. Cant wait to try it out as well.
That target need to be online it won’t work if it offline
My mom, grandma, sister, girlfriend would all fall for that. There’s one connective thread that ties them all together, and I just cannot think of what it is….
Hey man loving your content as I’m just getting into cyber security! Love this video so was wondering if you could do a video the same but how to do it with Linux in virtual machine? I’ve tried it for ages but can’t seem to get the link to load on another device. Help would be appreciated 😂
Such a crazy thought. I also saw this article on PC mag about the Coinbase Superbowl commercial with the QR code and it being a security nightmare. Some cities put QR code stickers on their parking meters for you to scan to go to their website and pay. Talk about a security nightmare. Someone slap their own QR code on there and use this Beef program to hook your browser. Crazy to think about.
Thank you for putting up these great videos. To protect yourself from hackers you have to think like a hacker and study hackers.
smartphones are mostly immune from link click exploitation unless you fall victim to a social engineering website
1. Abuse - Leave immediately 2. Failed discussions - Converse then seek therapy 3. Repeated neglect - take care of you 4. Repeated lies - protect yourself 5. No appreciation - Seek gratitude from service 6. Suspect cheating - Seek assistance of EagleSpy . Be there for yourself
How do you do the screendrawing/writing thingy? It's so cool! Way better than a mouse highlight
Hey chuck, wanted to know if I can use proxychain with the mysterioum mining
Absolutely excellent video!
There is one thing you didn't explain, though - The "Dummy browser".. How do you use a 'dummy browser'?
Thanks in advance
every time I watch your CZcams videos I learned a lot Chuck, the only request or dream is to take a picture with you in Person Mr. Chuck. Thank you
Great video. I agree with some comments it would be nice to see a series of how you protect yourself from these types of hacks. Keep up the awesome videos
Disable JavaScript and use a vpn to stop access to your lan
@@C0bik0 disabling javascript will prevent you doing basic stuff online.
Don’t click on links you don’t recognize
@@rudyc79 "the best antivirus is yourself" Someone probably
No I DONT AGREE OF SERIES OF HOW HE PROTECT HIMSELF BECAUSE IT WILL LEAK IT WHEN THE HACKERS WATCHED IT HES DEAD
Great information. Is there a way to see if you have been hooked? Is there no other security than “don’t just click on a link you don’t know?”
Dam you nailed it bro 👍 awesome work 🤝 can I ask you I am a beginner and honestly. How much time it will take a to be a successful Ethical Hacker.🤔
Love the part where he pranks his wife
So glad you demonstrated this. Thanks
Find a Cyber Expert , and stop complaining about not been able to carry it out , cyber expert spend almost their whole life’s learning new codes and you think you will carry out the same as them with a 10 minute tutorial video ? .
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
Exactly , I use procyberspy.com for all the cyber related services i carry out , they are awesome and easy to use
As a batty man
Wot?
No, I would never presume such a thing, it's kind of unrealistic. That is exactly why I'm watching it at 2x speed, because I can learn it in 5 minutes!
You are very colorblind 😂😂 ❤ loved the video
What a legend person ! Love from india and meet you soon sir 🙏
The video is very intuitive but scary. So one quick question, how do you know if your browser is hooked? What are the signs? Any tools to detect it? Thanks man, you are always the best
You have to stay on the beef website
@@apexgamingshorts4805 so if I close the tab i am okay?
@@imanidiotanyway6393 yes
@@imanidiotanyway6393 The real use of this is in XSS vulnerable websites. You’d inject the code into an actual website, and visitors wouldn’t know any better. The bad actor could then make a fake login pop up for the website to harvest credentials.
It would be cool if you make a video about http proxy’s!
I having problem installing metasploit pro due to https proxy on port 3790, it says connection refused by remote host , anyone help🙏🏻
@@kratos-sf1os you have kill existing metasploit service first that’s running on port 3790, just google it it’s the first result
I confidently refer you all to him his been a grate talented man.....$
I can't believe this class is just to prank my family 🙄
You're like Stan Prokopenko for Cyber 😁👏👏👏
from the intro, I thought it was going to be some next level vulnerability that would bypass the sandbox 😂this is basic
nice video though
Yeah, it's not even a vulnerability it's just a casual website that have live control on js code. Simple, but might work for people that will not check the url before inserting their critical data.
Yeah, probably best thing it offers is login pages for different authenticators, though they could probably be updated. That said, it isn't all that hard to copy some HTML and CSS to do that yourself.
This video also teaches you to always check the website URL to make sure no one is trying to hack you
this video is overrated, it's more like phishing not hacking. when you open the website, it only gets harmless info just like any other website you visit. and if the website asks you for Google Password, maybe don't give your password to an unknown website?!
@fatopossum you mean autofilled password? Explain?
@fatopossum which is why you should not use your browser to store all your passwords. Use a good password manager + 2fa.
URL's can be masked or hidden in images. Not clicking a legit URL / not clicking at all is not sufficient to protect you.
@fatopossum you realize, that Edge & Chrome will throw a hissy fit about the google passwords right? They really attempt no populate them on 3rd party sites.
Thanks Chuck, I'm studying Cybersecurity and this wil help me.
Very good editing which software you use for editing and video cuts
You can also inject the beef hook url into a website as part of a man in the middle attack, hook browsers without sending people to a phishy website
How would you put yourself between the URL clicked and the destination?
colorblind he said, and then messed up all the colors :) :)! great video, wouldn't the browser notify you that the website will run dangerous js code.
thx for dis not long ago i was hacked but it seems to me they have stopped and im pretty sure its cuz of the one where it redirects u to google accounts
Great content! There is a way to know if my browser was compromised by beef?
That is crazy, will be using it to prank friends 😂😂
Awesome Video Chuck! One thing that scares the shit out of me is that every third party js provider (google analytics etc.) basically have the same opportunities. Every time someone copies a tag inside their website this could happen. I think this is also worth discussing
Respect Chuck. Up for a virtual beer sometime?
but most important thing is if you close the tab, hacker lose the control.
never knew you were colourblind. I am too, deuteranomaly. This is why I want to get into cyber security, colourblindness won't affect me much at getting the job, unlike other jobs.
i got into Linux when I was very young too, on a kali Linux live usb. played around with BeEF, the Google phishing site hasn't changed since. xD
Backend development of apps and web-apps is also an option as there you wont be dealing with colors.
Hi Chuck! Thanks a lot for sharing this. I really appreciate all your work.
After watching this video have to confess got scared of being already hacked and I thought that maybe you can create the II part teaching us how we can check, avoid or repair our machines after been hacked.
Also I wonder a lot (and search) about the consequences of this are huge. For example what happen if I set and use the sincronize tool on firefox. Can then this JS script be traspased to other machine's browsers?
Well
THANKS A LOT MASTER!
liked and subscribed, oh more on windows cmd cheats heats for cmd line, I know linux, however knowing windows a crappy os is still good to learn
Video with very useful information. Awesome! 👍
However it would be great if there was also a video on what to do if you realize your own browser has been "hooked". How does one "unhook" a browser??
That would have been very useful to know ☺️
I feel "hook" is a misleading and scare mongering term for what is happening. You are fingerprinting the browser, gather data on the IP connection, and doing things you can just do with Javascript and nmap. Beef is just a very convenient interface to do that. You do not in any way retain control over the target's browser outside of their time on the page. You cannot, like, read out their stored passwords unless you enter them, you cannot read the pages they visit or anything. Essentially, it's one single phishing site with content you can quickly adjust.
Thank u chuck for keeping us safe ✅✅