Social engineering Tool Kit has written by David Kennedy (ReL1K) .
The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the humans.The tool kits and attacks which are given in SET are designed to be focused on single person or on an organization .
Installation :- If you are using backtrack then SET is installed in your system by default and you can find SET application in the following location
/pentest/exploits/set/
OR
If you are using other linux distro's then you can download SET by typing this command in your terminal window
svn co http://svn.secmaniac.com/social_engineering_toolkit set/
After downloading the SET then just follow the following commads
cd set
sudo ./setup.py
This will ask your root password and after that installation will be completed.
Getting Started :-
Before starting an attack or configuring set config please ensure that your SET
application is updated , for this just type in svn update and hit enter . Once you
ready with your updated version SET , now its time config your SET configuration file
because real brain of the SET application is its configuration file , So for opening your
configuration file follow the following procedure.
root@bt:/pentest/exploits/set# nano config/set_config
Now you can see a configuration file which may look like the following file
# DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
METASPLOIT_PATH=/pentest/exploits/framework3
# SPECIFY WHAT INTERFACE YOU WANT ETTERCAP TO LISTEN ON, IF NOTHING WILL DEFAULT
# EXAMPLE: ETTERCAP_INTERFACE=wlan0
ETTERCAP_INTERFACE=eth0
#
# ETTERCAP HOME DIRECTORY (NEEDED FOR DNS_SPOOF)
ETTERCAP_PATH=/usr/share/ettercap
Now lets go through each and every flag of the configuration file .
Metasploit Option:-
You can change specific fields to get a desired result. In the first
option, you can change the path of where the location of Metasploit is installed and
if you are not sure what metaspolit is then you can learn it from out tutorial's
Example :- # DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
METASPLOIT_PATH=/pentest/exploits/framework3
Ettercap Option :-
The Ettercap can be used when you’re on the same network as the
victims and you want to perform DNS poison attacks against a fellow network of
IP addresses. When this flag is set to ON, it will poison the entire
local subnet and redirect a specific site or all sites to your malicious
server running.
Example :-
# ETTERCAP HOME DIRECTORY (NEEDED FOR DNS_SPOOF)
ETTERCAP_PATH=/usr/share/ettercap
Send Email Option :-
If you set SENDMAIL flag to ON will try starting SENDMAIL, which can spoof source
email addresses. This attack only works if the victim’s SMTP server does
not perform reverse lookups on the hostname. SENDMAIL must be
installed. If your using BackTrack 4, it is installed by default.
Example :-
# SET TO ON IF YOU WANT TO USE EMAIL IN CONJUNCTION WITH WEB ATTACK
WEBATTACK_EMAIL=OFF
Web Attack Mail Option :-
If you set WEBATTACK_EMAIL to ON, it will allow you to send mass
emails to the victim while utilizing the Web Attack vector.
Example :-
# SET TO ON IF YOU WANT TO USE EMAIL IN CONJUNCTION WITH WEB ATTACK
WEBATTACK_EMAIL=OFF
Java Applet Attack Vector :-
The java Applet attack vector is the attack with one of the highest rates of success that SET has in its features . To make the attack look more believable , you can turn this flag on which will allow you to sign the java Applet with whatever name you want .
Example :-
# CREATE SELF-SIGNED JAVA APPLETS AND SPOOF PUBLISHER NOTE THIS REQUIRES YOU TO
# INSTALL ---> JAVA 6 JDK, BT4 OR UBUNTU USERS: apt-get install openjdk-6-jdk
# IF THIS IS NOT INSTALLED IT WILL NOT WORK. CAN ALSO DO apt-get install sun-java6-jdk
SELF_SIGNED_APPLET=OFF
EXE Option :-
When using the payload encoding options of SET, the best option for Anti-Virus bypass is the backdoored, or loaded with a malicious payload hidden in the exe, executable option. Specifically an exe is backdoored with a Metasploit based payload and can generally evade most AV’s out there. SET has an executable built into it for the backdooring of the exe however if for some reason you want to use a different executable, you can specify the path to that exe with the CUSTOM_EXE flag.
WebServers configuration option :-
The web server utilized within SET is a custom-coded web server that at times can be somewhat slow based off of the needs. You can specify the apache webserver installation loaction in the configuration file .
SSL option :-
In some cases where you want to perform some advacned attacks you need register your ssl certificates and
If you find that you need a boost and want to utilize Apache, you can flip this switch to ON and it will use Apache to handle the web requests and speed your attack up.
Note that this attack only works with the Java Applet and Metasploit based attacks.
This is only for educational purpose only .
0 comments:
Post a Comment