Using the victim browser hooked in BeEF as a tunneling proxy, we will see the following scenarios:
– browsing the authenticated surface of the hooked domain through the security context of the victim browser;
– spidering the hooked domain through the security context of the victim browser;
– finding and exploiting SQLi with Burp Pro Scanner + sqlmap (through the victim browser too 🙂 )

See: – @antisnatchor and @beefproject for more!

لینک دانلود