diff --git a/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js b/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js index aeed3986f..9d5f670ed 100644 --- a/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js +++ b/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js @@ -33,18 +33,18 @@ WelcomeTab = function() { Hooked Browser. Command modules are able to perform any actions that can be achieved\ through Javascript: for example they may gather information about the Hooked Browser, manipulate the DOM or perform other activities such as exploiting vulnerabilities within the local network of the Hooked Browser.

\ Each command module has a traffic light icon, which is used to indicate the following:
\ -
  • XssRays: The XssRays tab allows you to check if links, forms and URI path of the page where the browser is hooked are vulnerable to XSS.
  • \ +
  • The command module works against the target and should be invisible to the user
  • \ +
  • The command module works against the target, but may be visible to the user
  • \ +
  • The command module is yet to be verified against this target
  • \ +
  • The command module does not work against this target

  • \ +
  • XssRays: The XssRays tab allows the user to check if links, forms and URI path of the page (where the browser is hooked) is vulnerable to XSS.
  • \
  • Requester: The Requester tab allows you to submit arbitrary HTTP requests on behalf of the hooked browser. \ Each request sent by the Requester is recorded in the History panel. Click a history item to view the HTTP headers and HTML source of the HTTP response.

  • \

    You can also right-click a hooked browser to open a context-menu with additional functionality:


    \
    \ +
  • XssRays: XssRays allows the user to check if links, forms and URI path of the page (where the browser is hooked) is vulnerable to XSS. To customize default settings of an XssRays scan, please use the XssRays tab.

  • \

    Learn More


    \

    To learn more about how BeEF works please review the wiki:


    \