SET
文章平均质量分 89
feier7501
这个作者很懒,什么都没留下…
展开
-
metasploit针对性钓鱼攻击向量(BT5R1失败)
root@root:~# cd /pentest/exploits/set/root@root:/pentest/exploits/set# ./set :::=== :::===== :::==== ::: ::: :::==== ===== ====== ==原创 2013-05-26 22:26:20 · 1946 阅读 · 0 评论 -
Infectious Media Generator失败
操作如下:root@bt:/pentest/exploits/set# ./set 01011001011011110111010100100000011100 10011001010110000101101100011011000111 1001001000000110100001100001011101100原创 2013-06-29 22:40:01 · 1289 阅读 · 0 评论 -
Multi-Attack Web Method
操作如下:root@bt:~# cd /pentest/exploits/set/root@bt:/pentest/exploits/set# ./set 01011001011011110111010100100000011100 10011001010110000101101100011011000111 10原创 2013-06-29 21:43:54 · 2262 阅读 · 0 评论 -
Arduino-Based Attack Vector
先要安装两个软件:1、Download the Arduino Software2、Download Teensyduino另外,还要从http://www.pjrc.com/购买一个Teensy设备,16-24美元。我没有买,就记录一下过程。软件安装过程:arduino的安装很简单,只要一直点下一步就可以了。teensyduino的安装如下:原创 2013-06-30 21:26:31 · 3486 阅读 · 0 评论 -
Man Left in the Middle Attack Method中间人攻击
操作如下:root@bt:/pentest/exploits/set# ./set :::=== :::===== :::==== ::: ::: :::==== ===== ====== ===原创 2013-06-27 22:48:10 · 1164 阅读 · 0 评论 -
Web Jacking Attack Method登录人人网
操作如下:root@bt:/pentest/exploits/set# ./set .--. .--. .-----. : .--': .--'`-. .-' `. `. : `; : :原创 2013-06-28 21:55:30 · 1680 阅读 · 0 评论 -
用Tabnabbing Attack Method登录人人网
用刚才的脚本,然后输出如下: Select from the menu: 1) Spear-Phishing Attack Vectors 2) Website Attack Vectors 3) Infectious Media Generator 4) Create a Payload and Listener 5) Mass Mailer Attack原创 2013-06-22 17:30:34 · 1796 阅读 · 4 评论 -
用Credential Harvester Attack Method登录人人网
修改了一下脚步ModifyForm.py:#!/usr/bin/python# Filename: ModifyForm.pyimport sysimport osfrom pyquery import PyQuery as pqfrom src.core.setcore import *def ModifyForm(htmlPath, url): if not o原创 2013-06-22 16:34:25 · 2114 阅读 · 0 评论 -
Credential Harvester Attack Method获得用户信息
前段时间在学习SET,发现Credential Harvester Attack Method一直无法获得登录的用户名和密码,一开始用wireshark抓包来调试,的确没有相应的数据,后来怀疑是代码的问题,于是查看python代码。本人没学过python,因此还不得不去学习一下python。今天看代码,看到cloner.py的代码有问题。于是修改之,增加了一个新的模块:#!/usr/bin原创 2013-06-20 00:15:06 · 2614 阅读 · 0 评论 -
Credential Harvester的脚本修改
昨天测试出现乱码。今天晚上调试,修改了一下。#!/usr/bin/python# Filename: ModifyFormAction.pyimport sysimport osfrom pyquery import PyQuery as pqdef ModifyFormAction(htmlPath, url): if not os.path.isfile(html原创 2013-06-20 23:59:00 · 1498 阅读 · 0 评论 -
Computer Based Social Engineering Tools: Social Engineer Toolkit (SET)
SET下载地址:https://github.com/trustedsec/social-engineer-toolkit/本文链接:http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29The So转载 2013-06-05 14:07:53 · 6815 阅读 · 0 评论 -
metasploit、SET、Tabnabbing Attack Method(没有得到信息)
环境:BT5,火狐浏览器操作如下:root@bt:/pentest/exploits/set# ./set ________________________ __ ___/__ ____/__ __/ _____ \__ __/ __ /原创 2013-05-30 23:23:48 · 1864 阅读 · 0 评论 -
metasploit的SET的Credential Harvester Attack Method
环境:BT5,XP或者Win7,IE6、IE8、谷歌浏览器操作如下:root@bt:/pentest/exploits/set# ./set 01011001011011110111010100100000011100 10011001010110000101101100011011000111 1001原创 2013-05-29 23:13:22 · 1427 阅读 · 0 评论 -
metasploit的WEB攻击向量
环境:BT5R3,XP SP3,IE6XP要安装java,并且设置java环境变量操作如下:root@bt:/pentest/exploits/set# ./set .--. .--. .-----. : .--': .--'`-. .-'原创 2013-05-28 21:48:41 · 2803 阅读 · 0 评论 -
metasploit的客户端WEB攻击
环境:BT5R3,XP SP3,IE6操作如下:root@bt:/pentest/exploits/set# ./set ..######..########.######## .##....##.##..........##... .##.......##........原创 2013-05-28 22:30:15 · 3184 阅读 · 0 评论 -
metasploit针对性钓鱼攻击向量入侵成功
环境:BT5R3,XP SP3,Adobe Reader 8.1.0漏洞信息:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659DescriptionMultiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earli原创 2013-05-27 22:12:04 · 3690 阅读 · 0 评论 -
metasploit针对性钓鱼攻击向量(BT5R3失败)
root@bt:~# cd /pentest/exploits/set/root@bt:/pentest/exploits/set# ./setCopyright 2012, The Social-Engineer Toolkit (SET) by TrustedSec, LLCAll rights reserved.Redistribution and use in source an原创 2013-05-26 23:09:31 · 2774 阅读 · 0 评论 -
15 Step To Hacking Windows Using Social Engineering Toolkit And Backtrack 5
http://www.hacking-tutorial.com/hacking-tutorial/15-step-to-hacking-windows-using-social-engineering-toolkit-and-backtrack-5/iiType : TutorialLevel : Beginner, Medium, AdvancedWhat is So转载 2013-05-26 23:26:59 · 1510 阅读 · 0 评论 -
Infectious Media Generator成功
刚才失败了,然后我把BT5虚拟机回退到先前的一个snapshot,然后再次操作,就成功了:root@bt:~# cd /pentest/exploits/set/root@bt:/pentest/exploits/set# ./setCopyright 2012, The Social-Engineer Toolkit (SET) by TrustedSec, LLCAll righ原创 2013-06-29 23:04:42 · 1235 阅读 · 0 评论