In this chapter, we studied a tool called BeEF and hooked it using MITMf. Then, by redirecting the user, we captured their credentials by saying they had been logged out and asked them to re-enter their username and password. Finally, we gained access to the Meterpreter session and also learned how we can detect Trojans both manually and by using a sandbox.
In the next chapter, we are going to look at performing attacks on an external network.