Difference between revisions of "Social Engineering Toolkit"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 9: Line 9:
== Example ==
== Example ==


=== Start: Run Social Engineering Toolkit ===
Below we have an example of how to start the BeEF service, and execute a "'''Google Phishing'''" client-side attack. With this example we'll see how to gather credential information of victim.


After launching the Social Engineering Toolkit we see the above mentioned menu.
Here we can choose between following submenus:


* Social-Engineering Attacks
[[File:lddogin.jpg|150px|thumb|Example|left|Login to BeEF service]]
* Penetration Testing
* Third Party Modules
* Update the Social-Engineer Toolkit
* Update SET configuration
* Help, Credits, and About


echo foo
=== Start: Open the BeEF service and authenticate ===
echo bar


=== Step 2 ===
After the beef service has started, you have to log into the service.
Default credentials are ''''beef'''' for '''username''' and ''''beef'''' for the '''password'''.


Make sure to read


* War and Peace
 
* Lord of the Rings
 
* The Baroque Cycle
 
 
 
[[File:localhddost.jpg|150px|thumb|Example|left|localhost]]
 
<br>
 
=== Hook Target Browser ===
 
For practicing purposes BeEF provides a localhost webpage.
 
 
 
 
 
 
 
 
 
[[File:chromedd_hook.jpg|150px|thumb|Example|left|details of hooked browser (chrome)]]
 
=== To see the details of hooked Browser ===
 
If you click on the hooked browser, under "Details" you can see information about the browser.
 
 
 
 
 
 
 
 
[[File:modulddes.jpg|150px|thumb|Example|left|modules]]
 
=== Command execution in the Browser ===
 
There are hundreds of modules under "'''Commands'''", which include from social engineering to browser hacks.
The desired module can be selected by clicking and executed with the "'''Execute'''" button at the bottom right. I choosed the "'''Google Phishing'''" module under the "'''Social Engineering'''" Folder and clicked to "'''Execute'''".
 
 
[[File:googlephiddshing_password.png|150px|thumb|Example|left|result]]
 
<br>
 
=== Result ===
 
After executing the "'''Google Phishing'''" module, the victim is asked to "'''Sign in'''". Victims entered credentials are visible under "'''Logs'''".
 
 
<br>
<br>
<br>
<br>
<br>
<br>
<br>


== Courses ==
== Courses ==

Revision as of 20:12, 10 July 2021

Summary

Social Engineering Toolkit (SET) is a menu driven system that allows you to control your attacks tailored to the desired target.

Requirements

As part of this guide, I used Kali (Kali GNU/Linux Rolling 5.10.0-kali3-amd64) as the OS, so it was already preinstalled. I installed Kali on a Virtual machine (VMware® Workstation 15 Pro 15.5.5 build-16285975).

Example

Below we have an example of how to start the BeEF service, and execute a "Google Phishing" client-side attack. With this example we'll see how to gather credential information of victim.


File:Lddogin.jpg
Login to BeEF service

Start: Open the BeEF service and authenticate

After the beef service has started, you have to log into the service. Default credentials are 'beef' for username and 'beef' for the password.





Hook Target Browser

For practicing purposes BeEF provides a localhost webpage.





File:Chromedd hook.jpg
details of hooked browser (chrome)

To see the details of hooked Browser

If you click on the hooked browser, under "Details" you can see information about the browser.





Command execution in the Browser

There are hundreds of modules under "Commands", which include from social engineering to browser hacks. The desired module can be selected by clicking and executed with the "Execute" button at the bottom right. I choosed the "Google Phishing" module under the "Social Engineering" Folder and clicked to "Execute".



Result

After executing the "Google Phishing" module, the victim is asked to "Sign in". Victims entered credentials are visible under "Logs".









Courses

  • WFP-1

References