Web Browser Attack Using Beef Framework: Harshil Sawant, Samuel Agaga
Web Browser Attack Using Beef Framework: Harshil Sawant, Samuel Agaga
Web Browser Attack Using Beef Framework: Harshil Sawant, Samuel Agaga
Abstract— Web Browser is a tool, which connects us to the III. SIMILARITY AMONG WEB BROWSERS
Internet. In this time of age, Internet has become a dependent
Today, a user can choose from many types of browsers.
factor for most of us. Therefore, it is very important for us to
understand what is web browser, the architecture, and threats Each has few elements that are distinct from one another.
that come when using it. This paper illustrates the theoretical side There is, however, one commonality among browser that is
of what is web browser, what are its components, how a browser their User Interface (UI) Elements. UI elements include
can be a risk, and how to protect the user. Furthermore, the address bar for inserting a URL, back/forward buttons,
paper illustrates a lab that demonstrates how to exploit a web bookmarking options, refresh and stop buttons for refreshing
browser attack using BeEF.
or stopping the web page, and home button that takes the user
to the home page. The HTML5 specification used today does
I. INTRODUCTION not define UI elements, but include common elements, such as
address bar, status bar, and tool bar. [2]
W EB browser can be define in many ways. One common
definition of web browser is that it is a software
application that allows users to view and interact with the
IV. WEB BROWSER COMPONENTS
content available in many forms on a web page, such as text,
image, music, video, games, etc. It is the most popular method There are seven main components of web browser. The
for users to access the Internet. There are many examples of components include user interface, browser engine, rendering
web browsers. The five most popular web browsers are engine, networking, UI backend, JavaScript interpreter, and
Mozilla Firefox, Google Chrome, Internet Explorer, Safari, data storage. [2]
and Opera. Furthermore, add-ons are available as applications 1. User Interface: includes every part of the browser
to extend the functionality of such browsers. Few examples of display, such as the address bar, back/forward button,
add-ons include Flash Player, Java, Adobe Reader, QuickTime bookmarking menu, etc., except the window where
Player, etc. Depending on how the developers designed the the user see the requested page.
web page, specific add-ons are need to view specific content. 2. Browser Engine: organizes actions between the UI and
[1] the rendering engine.
3. Rendering Engine: accountable for displaying
requested content. When a user request HTML
II. WEB BROWSER IN-DEPTH content, the rendering engine analyses HTML and
CSS files, and displays the analyzed content on the
The main function of a web browser is to present the web screen.
resources a user requests. The browser requests the resources 4. Networking: includes network calls such as HTTP
from the server and displays it within the browser window. requests.
The requested resource is usually an HTML document, but 5. UI Backend: it is used for drawing basic widgets like
could be an image, PDF, or any other form of content. The combo boxes and windows. The backend exposes a
user uses URL (Uniform Resource Identifier) to specify the generic interface that is not platform specific.
location of the resource. Additionally, HTML and CSS Underneath it all uses operating system user interface
specification defines the way a browser will interpret and approaches.
display the HTML files. Such specification are maintained by 6. JavaScript Interpreter: it is used to analyze and execute
the W3C (World Wide Web Consortium) organization. W3C JavaScript code.
is a standard organization for the web. In the past, many 7. Data Storage: It is a persistence layer. The browser
browsers followed a part of the specifications and developed needs this component to save data locally, such as
their own extensions specific to the browser. This caused cookies. Additionally, browser supports storage
compatibility issues for web authors. Now most of the existing mechanisms such as localStorage, IndexedDB,
browsers follow the common specifications. [2] WebSQL, and FileSystem.
The following image illustrates how each of the component
interact within the system.
2
ATTACK Above is the login page of Kali Linux. Note that we had
Set up victim VM and attacker VM. Make sure the network created the login details during installation of the operating
adapter for both VMs is set to Bridged Adapter. system.