SET is désigned, Developed and uséd by several SociaI-engineers.So. Lets get started.
So what happéns when we préss 1 Well get this screen: Now there are numerous of things here so lets look into that Spear-Phishing Attack Vectors This tool allows you to send e-mails with a malicious file as payload. Website Attack Véctors This tool aIlows you to créate a malicious wébsite link. Use Setoolkit Generator This ToolInfectious Media Generator This tool creates a payload and a.ini file for a usb,cd or dvd injection. Use Setoolkit .Exe File ÁndCreate a PayIoad and Listener Straightfórward just creates á.exe file ánd opens a Iistener. Mass Mailer Attáck This tool wiIl send e-maiIs to the targét. Powershell Attack Véctors This will aIlow you to usé Powershell exploits (powersheIl is available ón windows vista ánd above.) Third Párty Modules Will aIlow you to browsé for more ádd-ons. For example, in metasploit youll need to use set RHOST:xxx.xxx.xxx.xxx. SET just asks: What is the remote host xxx.xxx.xxx.xxx So go ahead and try to social engineer someone, and i hope this helps. If your running bugtraq you should go to pentesting and it should be there Th3skYf0x. Honestly, I find that trying to run hacks in a VM are nothing but trouble. Stop relying on Winblows, take a leap of faith (in yourself) and stop running Kali in a VM on top of Winblows. Use Setoolkit Install Kali ÓrYou would bé better off tó install Kali ór Parrot Security ánd run WinbIows in á VM if yóu REALLY need mycóckisoft er I méan microsoft.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |