Social engineering attacks with Metasploit payloads
Let’s wrap this chapter up by bringing together two topics – backdoor injection into a legitimate executable and using Metasploit as the payload generator and handler. We’re going to use Shellter and nested Meterpreter payloads to create a malicious AutoRun USB drive. Although AutoRun isn’t often enabled by default, you may find it enabled in certain corporate environments. Even if AutoRun doesn’t execute automatically, we’re going to work with an executable that may encourage the user to execute it by creating the impression that there’s deleted data on the drive that can be recovered.
Creating a Trojan with Shellter
Follow these steps to create a Trojan with Shellter:
- The first and the most tedious step is finding a suitable executable. This is tricky because Shellter has certain limitations – the executables have to be 32-bit, they can’t be packed...