Metasploit has the ability to create an executable payload. This can be extremely useful if you can get a target machine to run the executable. Attackers often use social engineering, phishing, and other attacks to get a victim to run a payload. If attackers can get their a victim to run a payload, there is no reason for an attacker to find and exploit vulnerable software.
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering . SET has been given at large-scale conferences together with Blackhat, DerbyCon, Defcon, and ShmooCon. With over 2 million downloads, SET is that the standard for social-engineering penetration tests and supported heavily within the protection community.
It is an application used by pen testers, hackers etc… it can be found in Kali Linux, parrot-sec, backbox and different pentesting OS otherwise you can install by downloading from github or simply type in terminal apt search set toolkit or search in synaptic for synaptic type in terminal synaptic otherwise you have not installed then type apt-get install synaptic then open synaptic look for set toolkit then right click on set and mark for installation then click on apply it will automatically install set for you.
Social Engineering attacks are the various cons used by the hackers to trick people into providing sensitive data to the attackers. There are various type of social engineering attacks, some of the popular attacks are :-
In the last decade, there were major hacks and leaks in social media platforms like Twitter, Facebook , LinkedIn and several others. currently the social media platforms take security very seriously and it has become very tough to hack directly into social media platforms, currently the hackers have moved the focus towards Social Engineering Attacks.
Step 1 : Open Terminal and Type setoolkit
Step 2 :Once SET is loaded it will show few options as shown in the image below. Select "Social-Engineering Attacks" by entering "1" and hit enter.
Step 3 :Now it will show you another set of options, select "Create a Payload and Listener" by entering "4" and hit enter.
Step 4 :Type 1 for Windows shell Reverse_Tcp Payload
Step 5 :The payload.exe has been exported to the SET Directory Under Root Folder.
Step 6 :Open The Directory And Check The Created Payload.
Step 7 :HFS(HTTP file Sever) is default installed in Latest kali linux,if not installed,visit our article
Step 8 :Open the Kali Linux ip on victim PC (Window PC/target PC) in browser ..
Step 9 :Download the file and run it
Step 10 :When you run the file on victim PC ,they will be Hacked by you on Kali Linux(Sessions will come on terminal)
A meterpreter session open!
tutorials
Hi, its good piece of writing concerning media print, we all understand media is a wonderful source of
information.
19-Jun-2019
how to
Its like you read my mind! You seem to know a lot about this, like you
wrote the book in it or something. I think that you
could do with a few pics to drive the message home a little bit, but
other than that, this is magnificent blog. A great read.
I will definitely be back.
28-Jun-2019
how to remove synthetic key in qlikview
I do not even know how I finished up right here, but I assumed this submit used to be great.
I don't recognize who you might be however definitely you are
going to a famous blogger if you happen to aren't already.
Cheers!
01-Jul-2019
Bud
Hey there! Do you use Twitter? I'd like to follow you if that
would be okay. I'm definitely enjoying your blog and look forward to new posts.
16-Jul-2019
Hemorrhoids Management
Hi there! Do you know if they make any plugins to help with
Search Engine Optimization? I'm trying to get my blog to rank for some
targeted keywords but I'm not seeing very good gains.
If you know of any please share. Kudos!
04-Aug-2019