15 Step To Hacking Windows Using Social Engineering Toolkit And Backtrack 5

73 篇文章 0 订阅
19 篇文章 0 订阅

http://www.hacking-tutorial.com/hacking-tutorial/15-step-to-hacking-windows-using-social-engineering-toolkit-and-backtrack-5/


iiType : Tutorial

Level : Beginner, Medium, Advanced

What is Social Engineering Toolkit?

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.orglaunch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.

Actually this hacking method will works perfectly with DNS spoofing or Man in the Middle Attack method. Here in this tutorial I’m only write how-to and step-by-step to perform the basicattack, but for the rest you can modified it with your own imagination :-) .

In this tutorial we will see how this attack methods can owned your computer in just a few steps….

FYI : The success possibility of this attack depend on victim browser. If the victim never update their browser, the possibility can be 85% or more.

Requirement :

1.  Backtrack 5 (or Backtrack 4)

Step By Step :

1. Change your work directory into /pentest/exploits/set/

Hack browser using Social Engineering Toolkit

2. Open Social Engineering Toolkit(SET./set and then choose “Website Attack Vectors” because we willattack victim via internet browser. Also in this attack we will attack via website generated by Social Engineering Toolkit to open by victim, so choose “Website Attack Vectors” for this options.

Hack browser using Social Engineering Toolkit

3. Usually when user open a website, sometimes they don’t think that they are opening suspicious website that including malicious script to harm their computer. In this option we will choose “The Metasploit Browser Exploit Method” because we will attack via victim browser.

Hack browser using Social Engineering Toolkit

4. The next step just choose “Web Templates“, because we will use the most famous website around the world that already provided by this Social Engineering Toolkit tools.

Hack browser using Social Engineering Toolkit

5. There are 4 website templates Ready To Use for this attack methods, such as GMail, Google, Facebook, and Twitter. In this tutorial I will use Google, but if you think Facebook or Twitter more better because it’s the most accessed website, just change into what do you want.

Hack browser using Social Engineering Toolkit

6. For the next step…because we didn’t know what kind of vulnerability that successfully attack the victim and what type of browser, etc, in this option we just choose “Metasploit Browser Autopwn” to load all vulnerability Social Engineering Toolkit known. This tools will launch all exploit in Social Engineering Toolkit database.

Hack browser using Social Engineer Toolkit

7. For payload options selection I prefer the most use Windows Shell Reverse_TCP, but you also can choose the other payload that most comfortable for you.

Hack browser using Social Engineer Toolkit

8. The next step is set up the Connect back port to attacker computer. In this example I use port 4444, but you can change to 1234, 4321, etc

Hack browser using Social Engineering Toolkit

9. The next step just wait until all process completed and also wait until the server running.

Hacking browser using Social Engineering Toolkit

Hacking browser using Social Engineering Toolkit

10. When the link given to user, the victim will see looks-a-like Google(fake website). When the page loads it also load all malicious script to attack victim computer.

Hacking browser using Social Engineering Toolkit

12. In attacker computer if there’s any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named “Notepad.exe”.

Hacking Browser using Social Engineering Toolkit

Hacking Browser using Social Engineering Toolkit

13. To view active sessions that already opened by the exploit type “sessions -l” for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.

Hacking Browser using Social Engineering Toolkit

14. To interract and connect to victim computer use command “sessions -i ID“. ID is numerical value that given when you do sessions -l. For example you can see example in picture below.

Hacking Browser using Social Engineering Toolkit

15. Victim computer already owned. :-)

Hacking browser using Social Engineering Toolkit

I’m practice to create this tutorial using Virtual Machine so it will not harm other computer and also you can doing a lot of experience with your OS.

Countermeasure :

1. Don’t trust to unknown link

2. Use personal firewall to detect inbound and outbound traffic

Hope you enjoy it :-)


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值