Hacking Articles Part 22

27 3 0
                                        

Kali Linux – Social Engineering

[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]

Hey guys, Rvc Blngbng here and I would like to present to you the part 22 of this Hacking Articles and I will discuss to you how to use Social Engineering Toolkit (SET) this part contains only one Toolkit but it has many steps and so many process to follow and some of it was hard to understand but you can do it guys, Fighting!!!

Social Engineering Toolkit (SET) Usage

-It is an open-source penetration testing framework designed for social engineering. It has several custom attack vectors that will allow you to make a believable attack in a fraction of time. These kinds of tools use human behaviors to trick them to the attack vectors.

Step 1: To open Social Engineering Toolkit, go to Applications -> Social Engineering Tools -> Click social engineering tool.

Step 2: It will ask you if you will agree with the terms of usage. Just type "y" and press Enter.

Step 3: Most of the menus are self-explained and among them the most important is the number 1) Social-Engineering Attacks

Step 4: Type "1" and press Enter. A submenu will open. If you press the Enter button again, you will see the explanations for each submenu.

Note: "The Spear-phishing module allows you to specially craft email messages and send them to your targeted victims with attached FileFormatmalicious payloads. If you want to spoof your email address, install "Sendmail" by typing "apt-get install sendmail" and change the config/set_config SENDMAIL=OFF flag to SENDMAIL=ON."

There are 2 options for the spear phishing attack:

*Perform a Mass Email Attack

*Create a FileFormat Payload and a Social-Engineering Template.

Step 5: Type "99" to go back to the menu and then type "2" to go to the "web attack vectors".

Note: "The web attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim. This module is used by performing phishing attacks against the victim if they click the link. There is a wide variety of attacks that can occur once they click a link."

Step 6: Type "99" again to return to the main menu and then type "3".

Note: "The infectious USB/CD/DVD module will create an autorun.inf file and a Metasploit payload. The payload and autorun file is burned or copied on a USB. When DVD/USB/CD is inserted in the victim's machine, it will trigger an autorun feature (if autorun is enabled) and hopefully compromise the system. You can pick the attack vector you wish to use: fileformat bugs or a straight executable.

Following are the options for Infectious Media Generator.

*File-Format Exploits

*Standard Metasploit Executable"

Step 7: Type "99" again and then type "4".

Note: "The create payload and listener is a simple way to create a Metasploit payload. It will export the exe file for you and generate a listener. You would need to convince the victim to download the exe file and execute it to get the shell."

Step 8: Type "99" again and then type "5"

Note: "The mass mailer attack will allow you to send multiple emails to victims and customize the messages. There are two options on the mass e-mailer; the first is to send an email to a single email address. The second option allows you to import a list that has all recipient emails and it will send your message to as many people as you want within that list.

*E-Mail Attack Single Email Address

*E-Mail Attack Mass Mailer"

Step 9: Type "99" again then type "9" to go to "Powershell Attack Vector".

Note: "The Powershell Attack Vector module allows you to create PowerShell specific attacks. These attacks allow you to use PowerShell, which is available by default in all operating systems Windows Vista and above. PowerShell provides a fruitful landscape for deploying payloads and performing functions that do not get triggered by preventive technologies.

*Powershell Alphanumeric Shellcode Injector

*Powershell Reverse Shell

*Powershell Bind Shell

*Powershell Dump SAM Database"

Olah!! We are now done again and again, this is all just for today, Hacking Articles will now end soon but sharing of my knowledge is not yet done and will start again soon, Thanks for reading our articles and hope you like it and learn something. That's all for today.

Hacking ArticlesWhere stories live. Discover now