//
// Copyright 2011 Wade Alcorn wade@bindshell.net
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
WelcomeTab = function() {
welcome = " \
\

\
Official website: http://beefproject.com/
\
Getting Started
\
Welcome to BeEF!
\
Before being able to fully explore the framework you will have to 'hook' a browser. To begin with you can point a browser towards the basic demo page here, or the advanced version here.
\
After a browser is hooked into the framework they will appear in the 'Hooked Browsers' panel on the left. Hooked browsers will appear in either an online or offline state, depending on how recently they have polled the framework. To interact with a hooked browser simply left-click it, a new tab will appear. You can also right-click it to open a context-menu with additional functionality, like Proxy and XssRays.
\
Hooked Browsers
\
Each hooked browser tab has a number of sub-tabs, described below:
\
- Main: Display information about the hooked browser after you've run some command modules.
\
- Logs: Displays recent log entries related to this particular hooked browser.
\
- Commands: This tab is where modules can be executed against the hooked browser. This is where most of the BeEF functionality resides. \
Most command modules consist of Javascript code that is executed against the selected\
Hooked Browser. Command modules are able to perform any actions that can be achieved\
through Javascript: for example they may gather information about the Hooked Browser, manipulate the DOM or perform other activities such as exploiting vulnerabilities within the local network of the Hooked Browser.
\
Each command module has a traffic light icon, which is used to indicate the following:\
- The command works against the target and should be invisible to the user \
- The command works against the target, but may be visible to the user \
- It is unknown if this command works against this target \
- Command does not work against this target
\
- XssRays: The XssRays tab allows you to check if links, forms and URI path of the page where the browser is hooked are vulnerable to XSS.
\
- Requester: The Requester tab allows you to submit arbitrary HTTP requests on behalf of the hooked browser.\
The proxy allows you to use a browser as a proxy. Simply right-click a browser from the Hooked Browsers tree to the left and select \"Use as Proxy\".
\
Each request sent by the Requester or Proxy is recorded in the History panel. Click a history item for the HTTP headers and HTML source of the request.
\
Learn More
\
To learn more about how BeEF works please review the wiki:
\
\
\
";
WelcomeTab.superclass.constructor.call(this, {
region:'center',
padding:'10 10 10 10',
html: welcome,
autoScroll: true,
border: false
});
};
Ext.extend(WelcomeTab,Ext.Panel, {});