Infectious media generator
The infectious media generator is a relatively simple attack vector. SET will create a Metasploit-based payload, set up a listener for you, and generate a folder that needs to be burned or written to a DVD/USB drive. Once inserted, if autorun is enabled, the code will automatically execute and take control of the machine:
![](https://static.packt-cdn.com/products/9781788623179/graphics/3eccb887-9b82-4bd4-ae3d-3f5ed89eb72e.png)
How to do it...
This attack vector is based on the simple principle of generating a malicious executable and then encoding it with available encoders, so as to bypass antivirus protection. The following are some examples of infectious media generators with their descriptions as well:
![](https://static.packt-cdn.com/products/9781788623179/graphics/49dfea17-c1b1-46c1-a0b2-fcc6fc6bc42a.png)
How it works...
After generating the encoded malicious file, the Metasploit listener starts waiting for back connections. The only limitation to this attack is that the removable media must have autorun enabled; otherwise, manual trigger will be required.
This type of attack vector can be helpful in situations where the target user is behind a firewall. Most antivirus...