Smiley face
Smiley face

Wednesday, April 2, 2014

Social Engineer toolkit, Credential Harvester Tut

Credential Harvester Tutorial


What is the social engineer toolkit?
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community.

The Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best seller in security books for 9 months since its release,“Metasploit: The Penetrations Testers Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni.

SET is included in the latest version of the most popular Linux distribution focused on security, Back|Track. It can also be downloaded through github using the following command:
git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
https://www.trustedsec.com/downloads/social-engineer-toolkit/

Alright so getting started! first navigate to S.E.T. : Applications>Kali Linux>Exploitation tools>Social Engineer Toolkit

Now we should be at the main S.E.T screen as shown

Image has been scaled down 16% (870x490). Click this bar to view original image (1024x576). Click image to open in new window.
[Image: Screenshotfrom2014-03-10161025_zpsadeef65c.png]


Now if you noticed there all numbered so i am just going to direct you which numbers to choose from here on out as to avoid tons of pics!

First choose 1: Social Engineering attacks
Second choose 2: Website attack vectors
Third choose 3: (Ironically Tongue lol) Credential Harvester Attack Method
Fourth choose 2: Site cloner

Now if your on linux (which you should be Cool thumbsup) lol Do a "ifconfig" really quick in terminal and get your IP
If your on windows CMD "ipconfig"


Now type in your IP where it asks for it!
Then it will prompt you for a Website to clone really quick for example i used gmail! http://www.gmail.com


Now you should have a Blue text saying Credential Harvester with the port number as shown below

Image has been scaled down 16% (870x490). Click this bar to view original image (1024x576). Click image to open in new window.
[Image: Screenshotfrom2014-03-10161229_zpsea1e1d68.png]


If your shit looks like the pic above your good to go Thumbsup haha
Now everything is quite simple ( as if it wasnt already Tongue) all we are going to do is send our IP to our victim! i suggest shortening the link so he dosnt see a random sketch IP Lol

As soon as our victim clicks the link he will be directed to a IDENTICAL gmail login page and hopefully dumb enough to log in You mad?


Image has been scaled down 16% (870x490). Click this bar to view original image (1024x576). Click image to open in new window.
[Image: Screenshotfrom2014-03-10161457_zpsdef1ffd4.png]


As soon as he fills this out and clicks login The username and password will be captured and sent to your S.E.T session as shown below 

Image has been scaled down 16% (870x490). Click this bar to view original image (1024x576). Click image to open in new window.
[Image: Screenshotfrom2014-03-10161603_zps8db9a190.png]


Well thats it for today folks hope youve enjoyed the Tut and find it useful Glad lol

0 Comments:

Post a Comment

Smiley face
Smiley face