Using Social-Engineering Toolkit
Social-Engineering Toolkit (SET), as the implies, focuses on exploiting the human nature of curiosity. SET was written by David Kennedy (ReL1K) and, with a lot of help from the community, it has incorporated attacks. In this recipe, we will look at how a malicious executable is created and how the attacker waits for the victim to execute the file. We will also look at how an attacker tricks a user to attain a reverse shell by luring the victim to visit a malicious website.
Getting ready
For this recipe, we will make use of Windows OS with Internet Explorer 6 and a Kali Linux machine; Setoolkit
is installed by default as a part of Kali.
How to do it...
- Start Social-Engineering using the following command:
Setoolkit
The output will be as shown in the following screenshot:
In this activity, we will look at how to use Social-Engineering Attacks
to host a fake website and exploit the user's IE, if vulnerable, and gain a reverse shell to his account. We will go...