Thursday, November 3, 2011

SET tutorial (Social Engineering tool) - Part I (Installation and Introduction)

Social engineering Tool Kit has written by David Kennedy (ReL1K) .


The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the humans.The tool kits and attacks which are given in SET are designed to be focused on single person or on an organization .

Installation :- If you are using backtrack then SET is installed in your system by default and you can find SET application in the following location 

/pentest/exploits/set/

OR

If you are using other linux distro's then you can download SET by typing this command in your terminal window 

svn co http://svn.secmaniac.com/social_engineering_toolkit set/
 
After downloading the SET then just follow the following commads

cd set 
sudo ./setup.py 
This will ask your root password and after that installation will be completed.

Getting Started :- 
 
Before starting an attack or configuring set config please ensure that your SET
application is updated , for this just type in svn update and hit enter . Once you 
ready with your updated version SET , now its time config your SET configuration file
because real brain of the SET application is its configuration file , So for opening your
configuration file follow the following procedure.
  
root@bt:/pentest/exploits/set# nano config/set_config  
Now you can see a configuration file which may look like the following file 
 
# DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
METASPLOIT_PATH=/pentest/exploits/framework3 
# SPECIFY WHAT INTERFACE YOU WANT ETTERCAP TO LISTEN ON, IF NOTHING WILL DEFAULT
# EXAMPLE: ETTERCAP_INTERFACE=wlan0
ETTERCAP_INTERFACE=eth0
#
# ETTERCAP HOME DIRECTORY (NEEDED FOR DNS_SPOOF)
ETTERCAP_PATH=/usr/share/ettercap
 
Now lets go through each and every flag of the configuration file .
 
Metasploit Option:- 
You can change specific fields to get a desired result. In the first 
option, you can change the path of where the location of Metasploit is installed and
if you are not sure what metaspolit is then you can learn it from out tutorial's 
 
Example :- # DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
METASPLOIT_PATH=/pentest/exploits/framework3  
 
Ettercap Option :-
 
The Ettercap  can be used when you’re on the same network as the 
victims and you want to perform DNS poison attacks against a fellow network of 
IP addresses. When this flag is set to ON, it will poison the entire 
local subnet and redirect a specific site or all sites to your malicious
 server running.
Example :- 
# ETTERCAP HOME DIRECTORY (NEEDED FOR DNS_SPOOF)
ETTERCAP_PATH=/usr/share/ettercap 
 
Send Email Option :- 
 
 If you set SENDMAIL flag to ON will try starting SENDMAIL, which can spoof source 
email addresses. This attack only works if the victim’s SMTP server does
 not perform reverse lookups on the hostname. SENDMAIL must be 
installed. If your using BackTrack 4, it is installed by default.
 
Example :- 
# SET TO ON IF YOU WANT TO USE EMAIL IN CONJUNCTION WITH WEB ATTACK
WEBATTACK_EMAIL=OFF 
 
Web Attack Mail Option :- 
 
If you set  WEBATTACK_EMAIL to ON, it will allow you to send mass 
emails to the victim while utilizing the Web Attack vector. 
Example :- 
 
# SET TO ON IF YOU WANT TO USE EMAIL IN CONJUNCTION WITH WEB ATTACK
WEBATTACK_EMAIL=OFF 
 
Java Applet Attack Vector :-  

The java Applet attack vector is the attack with one of the highest rates of success that SET has in its features . To make the attack look more believable , you can turn this flag on which will allow you to sign the java Applet with whatever name you want . 

Example :- 

# CREATE SELF-SIGNED JAVA APPLETS AND SPOOF PUBLISHER NOTE THIS REQUIRES YOU TO
# INSTALL --->  JAVA 6 JDK, BT4 OR UBUNTU USERS: apt-get install openjdk-6-jdk
# IF THIS IS NOT INSTALLED IT WILL NOT WORK. CAN ALSO DO apt-get install sun-java6-jdk
SELF_SIGNED_APPLET=OFF

EXE Option :- 

When using the payload encoding options of SET, the best option for Anti-Virus bypass is the backdoored, or loaded with a malicious payload hidden in the exe, executable option. Specifically an exe is backdoored with a Metasploit based payload and can generally evade most AV’s out there. SET has an executable built into it for the backdooring of the exe however if for some reason you want to use a different executable, you can specify the path to that exe with the CUSTOM_EXE flag.

WebServers  configuration option :- 
 
The web server utilized within SET is a custom-coded web server that at times can be somewhat slow based off of the needs. You can specify the apache webserver installation loaction in the configuration file .
 
SSL option :-
 
In some cases where you want to perform some advacned attacks you need register your ssl certificates and  
If you find that you need a boost and want to utilize Apache, you can flip this switch to ON and it will use Apache to handle the web requests and speed your attack up.
 Note that this attack only works with the Java Applet and Metasploit based attacks.
 
This is only for educational purpose only . 

0 comments:

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Vamshi krishnam raju | Bloggerized by Vamshi krishnam raju - Vamshi krishnam raju | Vamshi krishnam raju