Wednesday, January 23, 2019

Hacking with SET toolkit

Today I am going to show you how to generate a payload using the SET or Social Engineering Toolkit. SET came with Kali and you can open it by going to Application > Exploitation Tools < social engineering toolkit.

social engineering toolkit

2. Type y and press Enter to agree to terms and service.

3. Type 1 and press Enter

social engineering attacks

4. Select option 4 and press Enter

create a payload and listener

5. Select option 2 for Windows Reverse TCP Meterpreter

windows reverse tcp meterpreter

6. Open a different terminal and type in ifconfig and press Enter and look for your IP address.


 7. Now go back to SET tool and type in the IP address 

lhost ip address

8. Type in any port number.

port number

9. Start the listener by typing in yes and press Enter


10. The payload is now generated and is located in the directory /root/.set. Navigate to it and copy it to your desktop like I did below using the cp command.

cd /root/.set

copy payload to desktop

11. Now send this payload to any Windows machine and execute it. Once it is executed you should see a session on your Kali machine like I have below. Now you should be able to control the victim machine. Type in help and press Enter to see a list of command you can use.

start the reverse tcp handler

Note that exploits are detectable by Windows default Anti-virus so you will have to use social engineering to convince the victim to disable his Anti-virus for this to work. Kali has an encoder that can help to evade Anti-virus like I used below but this method will not evade every Anti-virus so you will have to do your own research to find out what brand of Anti-virus the victim is using in order to know if this is the right method of attack to launch against him or her.

encoding to evade antivirus

To display a list of encoder execute this command

msfvenom --list encoders


Post a Comment