Using the Social Engineering Toolkit (SET) to Create a Backdoor Executable


Metasploit has the ability to create an executable payload. This can be extremely useful if you can get a target machine to run the executable. Attackers often use social engineering, phishing, and other attacks to get a victim to run a payload. If attackers can get their a victim to run a payload, there is no reason for an attacker to find and exploit vulnerable software.



Lets start with the SetoolKit to create a backdoor executable



Step 1 : Open Terminal and Type setoolkit


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 2 :Once SET is loaded it will show few options as shown in the image below. Select "Social-Engineering Attacks" by entering "1" and hit enter.


 Using the Social Engineering Toolkit (SET) to create a backdoor executable

Step 3 :Now it will show you another set of options, select "Create a Payload and Listener" by entering "4" and hit enter.


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 4 :Type 1 for Windows shell Reverse_Tcp Payload


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 5 :The payload.exe has been exported to the SET Directory Under Root Folder.


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 6 :Open The Directory And Check The Created Payload.


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 7 :HFS(HTTP file Sever) is default installed in Latest kali linux,if not installed,visit our article


How to send or receive files in Kali Linux - Using HFS(HTTP File Server)


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 8 :Open the Kali Linux ip on victim PC (Window PC/target PC) in browser ..


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 9 :Download the file and run it


 Using the Social Engineering Toolkit (SET) to create a backdoor executable


Step 10 :When you run the file on victim PC ,they will be Hacked by you on Kali Linux(Sessions will come on terminal)


A meterpreter session open!



 Using the Social Engineering Toolkit (SET) to create a backdoor executable


For References :-




I hope you enjoyed this article.



Sharing is caring

google
linkedin

About Author

Akash is a co-founder and an aspiring entrepreneur who keeps a close eye on open source, tech giants, and security. Get in touch with him by sending an email (akashchugh1994@gmail.com).


You may also like :-




Leave a Comment

Your email address will not be published. Required fields are marked *




Stay Connected

Popular Posts

Get Latest Stuff Through Email


Who Should Read TechTrick?

All the tricks and tips that TechTrick provides only for educational purpose. If you choose to use the information in TechTrick to break into computer systems maliciously and without authorization, you are on your own. Neither I (TechTrick Admin) nor anyone else associated with TechTrick shall be liable. We are not responsibe for any issues that caused due to informations provided here. So, Try yourself and see the results. You are not losing anything by trying... We are humans, Mistakes are quite natural. Here on TechTrick also have many mistakes..