SlideShare a Scribd company logo
Project Report<br />-459105253365on<br />-22459952540<br />Project  by - Nutan Kumar Panda<br />Technology Evangelist ISEH<br />R&D - ATL Guwahati<br />Social Engineering Tooolkit<br />People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove it.<br />Doing either of these could place the control of your machine into a hacker’s hand. But I have Windows 7 with the latest security updates and my anti-virus is up to date. This may not make any difference at all if you allow the program to run. But it is really complicated and I need to make several bad choices in a row right? No, one wrong mouse click could be all that is needed. You don’t believe me? I was once told by a security instructor that instead of trying to convince people that their systems could be at risk, you need to show them.<br />Backtrack 4 has included a program that you do not hear much about in the main stream security media. But, it is a penetration testers dream. Under the penetration menu is a program called the Social Engineering Toolkit (SET). All right, follow along, this is really technical and there are a lot of steps. <br />One last note, turn off Apache or the SET won’t run.<br />First click on the menu button, Start the networking service. Then click on Backtrack, and then the Penetration Menu and finally Social Engineering Toolkit.<br />This will bring up a program menu; you need to update both the Social Engineering Toolkit and the Metasploit Framework.<br />Next, I had to reboot my machine to get it to work right after the updates.<br />Now, click on main option 2 – Website Attack Vectors (Notice step 3 – Infections USB/CD/DVD Generator…)<br />Next, chose Option 1, Web Templates, Let SET create a website for you. (Notice options to clone websites to match the company that you are doing the penetration test for…)<br />Next is your choice for attack methods, the Java attack works well, chose 1 – Java Applet Attack Method<br />Next select 1- Java Required (Notice other options…)<br />Next select the type of payload for the attack, I like option 2 – Windows Reverse_TCP Meterpreter.<br />Next chose the encoder to bypass anti-virus. I have never had anything detect number 2 – Shikata_Ga_Nai with 3 encryption passes (encryption passes is next option).<br />Next chose port for the Metasploit Listener, 80 is default, I just hit enter<br />Next option is “Do you want to create a Linux/OSX payload too?” I hit no, my target is a Windows PC.<br />And that is it. <br />The SET webserver will launch, and it will start up Metasploit to listen for incoming connections. On the Victim’s PC, just surf to the attacker PC’s IP Address through a browser and you will see a generic , kinda plain test website that SET creates. It says something like the CEO is giving a presentation and you need Java installed and need to run the Java applet that pops up to view the broadcast. <br />Then a Java certificate warning pops up, and like any user, they trustingly follow the directions. Once they click “yes” or “accept” you now have a meterpreter shell to their PC.<br />Back on the attacking PC, it will list the session that the user opened to you.<br />Type Sessions –L, Once and you get a screen that looks like this:<br />You now have access to the victims PC. Use “Sessions -i” and the Session number to connect to the session. Once connected, you can use linux commands to browse the remote pc, or running “Execute –f cmd.exe –c –H –i” will give you a remote windows command shell.<br />That’s it, one bad choice on the victim’s side and security updates and Anti-virus means nothing. They can even surf away or close the webpage, because once the shell has connected the web browser is no longer needed. Most attackers will then solidify their hold on the PC and merge the session into another process effectively making the shell disappear.<br />This is why informing your users about the dangers of clicking on unknown links in e-mails, suspicious web links, online anti-virus messages and video codec updates is critical. It can be very hazardous to your network. Also, this type of attack, like advance persistent threat attacks most likely will not be detected with IDS systems. This makes capturing and monitoring your network traffic critical. <br />Replicate a Website<br />Now We are going to replicate a website, in this case I am going to use Twitter as an example, we then will use some social engineering techniques (not demonstrated) to encourage our target to visit a site / ip we have setup, and then we are done. There is spear phishing capabilities in the SET which will obviously provide a more automated attack vector, but for the project we will assume its done manually, or verbally influenced / encouraged.<br />So I assign an IP via DHCP.<br />Then we navigate to our folder that SET is installed to. In my case its /pentest/exploit/SET/<br />Next its always good practice to make sure everything is up to date.  Type ./update_set .You can also update within the SET tool, and as metasploit is also used here, its worth making sure you are all up to date there also.<br />Now its time to get down to business and kick of SET. We simply type ./set and away she goes.<br />As we can see SET has a few options at its disposal. We are going to take a look at the Website Attack Vectors, so we want option 2.<br />Again more options are available. Because we are lazy we will let SET do the hard work and clone and setup a fake website. So again option 2.<br />We now need to select our attack vector. I know my lab machines are fully patched, so a browser exploit will most likely not be successful. So we go with option 1 and a Java Applet Attack method. <br />Now we shall clone Twitter, so we input www.twitter.com also.<br />Its now time to get our payload selected. I am a fan of reverse TCP meterpreter, so time for option 2 again.<br />Now we have the fun of encoding our payload to bypass AV. Shikata ga nai is an excellent encoder, but now with have the multi encoding option, I have found in my tests it can be more successful at bypassing the AV. We will also need to define our listener port, so we will go within something creative. 4321<br />The encoding mojo does its thing.<br />We are asked if we want to create a Linux / OSX payload, but we dont need this here.The tool then goes ahead and sets up our fake site, and gets our listener up and running. <br />So now we have cloned a site, defined a payload, encoded it for AV bypassing and setup a web server for our cloned site.So now we are ready and waiting. So now we just need someone to go to our cloned site.It would be a good idea to go to Twitter on a strange IP.So we enter the IP of our SET hosting machine, accessing Twitter. We need to install some Java stuff (I believe this can be customised for a better convincer, remember we are doing basics here .It involves some more work and configuration.) <br />
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part9

More Related Content

PDF
Spyware triggering system by particular string value
IJERD Editor
 
PDF
How to-remove- virus
securesolutionusa
 
PPT
How to remove 7 ev3n ransomware
haroNaroum
 
DOCX
Step by Step on How to Setup DarkComet
Pich Pra Tna
 
PDF
Project: Intrusion Detection
Jay Schulman
 
PPT
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Ted Whittemore
 
PPT
How to Remove Codec v hijacker
adelardbrown2
 
PDF
Information gathering
MoTechInc
 
Spyware triggering system by particular string value
IJERD Editor
 
How to-remove- virus
securesolutionusa
 
How to remove 7 ev3n ransomware
haroNaroum
 
Step by Step on How to Setup DarkComet
Pich Pra Tna
 
Project: Intrusion Detection
Jay Schulman
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Ted Whittemore
 
How to Remove Codec v hijacker
adelardbrown2
 
Information gathering
MoTechInc
 

What's hot (10)

PPT
How to uninstall mpc cleaner rogue program
haroNaroum
 
TXT
Install
steven brian
 
PDF
Oh no, was that CSRF #Ouch
Abhinav Sejpal
 
PDF
sts-scanner_tutorial
tutorialsruby
 
PPT
Web Application Hacking
SensePost
 
DOC
Dosearches virus removal
sakthiprime2
 
PDF
JAVA INTRODUCTION
Prof Ansari
 
PDF
The practice of web application penetration testing
_U2_
 
PDF
How to Delete plus network.com
mariagoel7
 
How to uninstall mpc cleaner rogue program
haroNaroum
 
Install
steven brian
 
Oh no, was that CSRF #Ouch
Abhinav Sejpal
 
sts-scanner_tutorial
tutorialsruby
 
Web Application Hacking
SensePost
 
Dosearches virus removal
sakthiprime2
 
JAVA INTRODUCTION
Prof Ansari
 
The practice of web application penetration testing
_U2_
 
How to Delete plus network.com
mariagoel7
 
Ad

Viewers also liked (8)

PPTX
BackTrack 4 R2 - SFISSA Presentation
Jorge Orchilles
 
PDF
Computer security
Mohamed Abdo
 
PDF
How To Build The Perfect Backtrack 4 Usb Drive
kriggins
 
DOCX
Backtrack manual Part1
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part10
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part2
Nutan Kumar Panda
 
PPT
Backtrack os 5
Ayush Goyal
 
BackTrack 4 R2 - SFISSA Presentation
Jorge Orchilles
 
Computer security
Mohamed Abdo
 
How To Build The Perfect Backtrack 4 Usb Drive
kriggins
 
Backtrack manual Part1
Nutan Kumar Panda
 
Backtrack Manual Part10
Nutan Kumar Panda
 
Backtrack Manual Part2
Nutan Kumar Panda
 
Backtrack os 5
Ayush Goyal
 
Ad

Similar to Backtrack Manual Part9 (20)

PPTX
Teensy Programming for Everyone
Nikhil Mittal
 
PPTX
Kautilya: Teensy beyond shell
Nikhil Mittal
 
PDF
Android mobile app security offensive security workshop
Abhinav Sejpal
 
PDF
pentest mobile app issue
shekar M
 
PDF
Ultimate Guide to Setup DarkComet with NoIP
Pich Pra Tna
 
PDF
Web server security techniques by Khawar Nehal
Khawar Nehal [email protected]
 
PDF
SELJE - VFP and IT Security.pdf
Eric Selje
 
PDF
Web application penetration testing lab setup guide
Sudhanshu Chauhan
 
PPT
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
PPTX
Squashing bugs: Introduction to Bug Bounties ISSA Dehradun Chapter
Avi Sharma
 
ODP
2600 av evasion_deuce
Db Cooper
 
PDF
Girl Gets Ring
isabellaroseyrr
 
PDF
Troubleshooting guide
jameszzzz
 
PDF
Troubleshooting guide
jameszzzzz
 
PPT
Security & ethical hacking p2
ratnalajaggu
 
DOCX
Google Hacking Lab ClassNameDate This is an introducti.docx
whittemorelucilla
 
PDF
The Media Access Control Address
Angie Lee
 
DOCX
E farming
shashank reddy
 
DOCX
Network and Internet Security.docx
stirlingvwriters
 
DOC
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Teensy Programming for Everyone
Nikhil Mittal
 
Kautilya: Teensy beyond shell
Nikhil Mittal
 
Android mobile app security offensive security workshop
Abhinav Sejpal
 
pentest mobile app issue
shekar M
 
Ultimate Guide to Setup DarkComet with NoIP
Pich Pra Tna
 
Web server security techniques by Khawar Nehal
Khawar Nehal [email protected]
 
SELJE - VFP and IT Security.pdf
Eric Selje
 
Web application penetration testing lab setup guide
Sudhanshu Chauhan
 
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
Squashing bugs: Introduction to Bug Bounties ISSA Dehradun Chapter
Avi Sharma
 
2600 av evasion_deuce
Db Cooper
 
Girl Gets Ring
isabellaroseyrr
 
Troubleshooting guide
jameszzzz
 
Troubleshooting guide
jameszzzzz
 
Security & ethical hacking p2
ratnalajaggu
 
Google Hacking Lab ClassNameDate This is an introducti.docx
whittemorelucilla
 
The Media Access Control Address
Angie Lee
 
E farming
shashank reddy
 
Network and Internet Security.docx
stirlingvwriters
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 

More from Nutan Kumar Panda (12)

PPTX
Pentesting ReST API
Nutan Kumar Panda
 
PPTX
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
PPTX
OSINT Black Magic: Listen who whispers your name in the dark!!!
Nutan Kumar Panda
 
PPTX
Rapid Android Application Security Testing
Nutan Kumar Panda
 
PDF
Win 8 password cracking
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part8
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part7
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part6
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part5
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part4
Nutan Kumar Panda
 
DOCX
Backtrack Manual Part3
Nutan Kumar Panda
 
DOCX
Google Hack
Nutan Kumar Panda
 
Pentesting ReST API
Nutan Kumar Panda
 
Dark Arts Of Social Engineering
Nutan Kumar Panda
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
Nutan Kumar Panda
 
Rapid Android Application Security Testing
Nutan Kumar Panda
 
Win 8 password cracking
Nutan Kumar Panda
 
Backtrack Manual Part8
Nutan Kumar Panda
 
Backtrack Manual Part7
Nutan Kumar Panda
 
Backtrack Manual Part6
Nutan Kumar Panda
 
Backtrack Manual Part5
Nutan Kumar Panda
 
Backtrack Manual Part4
Nutan Kumar Panda
 
Backtrack Manual Part3
Nutan Kumar Panda
 
Google Hack
Nutan Kumar Panda
 

Recently uploaded (20)

DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 

Backtrack Manual Part9

  • 1. Project Report<br />-459105253365on<br />-22459952540<br />Project by - Nutan Kumar Panda<br />Technology Evangelist ISEH<br />R&D - ATL Guwahati<br />Social Engineering Tooolkit<br />People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove it.<br />Doing either of these could place the control of your machine into a hacker’s hand. But I have Windows 7 with the latest security updates and my anti-virus is up to date. This may not make any difference at all if you allow the program to run. But it is really complicated and I need to make several bad choices in a row right? No, one wrong mouse click could be all that is needed. You don’t believe me? I was once told by a security instructor that instead of trying to convince people that their systems could be at risk, you need to show them.<br />Backtrack 4 has included a program that you do not hear much about in the main stream security media. But, it is a penetration testers dream. Under the penetration menu is a program called the Social Engineering Toolkit (SET). All right, follow along, this is really technical and there are a lot of steps. <br />One last note, turn off Apache or the SET won’t run.<br />First click on the menu button, Start the networking service. Then click on Backtrack, and then the Penetration Menu and finally Social Engineering Toolkit.<br />This will bring up a program menu; you need to update both the Social Engineering Toolkit and the Metasploit Framework.<br />Next, I had to reboot my machine to get it to work right after the updates.<br />Now, click on main option 2 – Website Attack Vectors (Notice step 3 – Infections USB/CD/DVD Generator…)<br />Next, chose Option 1, Web Templates, Let SET create a website for you. (Notice options to clone websites to match the company that you are doing the penetration test for…)<br />Next is your choice for attack methods, the Java attack works well, chose 1 – Java Applet Attack Method<br />Next select 1- Java Required (Notice other options…)<br />Next select the type of payload for the attack, I like option 2 – Windows Reverse_TCP Meterpreter.<br />Next chose the encoder to bypass anti-virus. I have never had anything detect number 2 – Shikata_Ga_Nai with 3 encryption passes (encryption passes is next option).<br />Next chose port for the Metasploit Listener, 80 is default, I just hit enter<br />Next option is “Do you want to create a Linux/OSX payload too?” I hit no, my target is a Windows PC.<br />And that is it. <br />The SET webserver will launch, and it will start up Metasploit to listen for incoming connections. On the Victim’s PC, just surf to the attacker PC’s IP Address through a browser and you will see a generic , kinda plain test website that SET creates. It says something like the CEO is giving a presentation and you need Java installed and need to run the Java applet that pops up to view the broadcast. <br />Then a Java certificate warning pops up, and like any user, they trustingly follow the directions. Once they click “yes” or “accept” you now have a meterpreter shell to their PC.<br />Back on the attacking PC, it will list the session that the user opened to you.<br />Type Sessions –L, Once and you get a screen that looks like this:<br />You now have access to the victims PC. Use “Sessions -i” and the Session number to connect to the session. Once connected, you can use linux commands to browse the remote pc, or running “Execute –f cmd.exe –c –H –i” will give you a remote windows command shell.<br />That’s it, one bad choice on the victim’s side and security updates and Anti-virus means nothing. They can even surf away or close the webpage, because once the shell has connected the web browser is no longer needed. Most attackers will then solidify their hold on the PC and merge the session into another process effectively making the shell disappear.<br />This is why informing your users about the dangers of clicking on unknown links in e-mails, suspicious web links, online anti-virus messages and video codec updates is critical. It can be very hazardous to your network. Also, this type of attack, like advance persistent threat attacks most likely will not be detected with IDS systems. This makes capturing and monitoring your network traffic critical. <br />Replicate a Website<br />Now We are going to replicate a website, in this case I am going to use Twitter as an example, we then will use some social engineering techniques (not demonstrated) to encourage our target to visit a site / ip we have setup, and then we are done. There is spear phishing capabilities in the SET which will obviously provide a more automated attack vector, but for the project we will assume its done manually, or verbally influenced / encouraged.<br />So I assign an IP via DHCP.<br />Then we navigate to our folder that SET is installed to. In my case its /pentest/exploit/SET/<br />Next its always good practice to make sure everything is up to date. Type ./update_set .You can also update within the SET tool, and as metasploit is also used here, its worth making sure you are all up to date there also.<br />Now its time to get down to business and kick of SET. We simply type ./set and away she goes.<br />As we can see SET has a few options at its disposal. We are going to take a look at the Website Attack Vectors, so we want option 2.<br />Again more options are available. Because we are lazy we will let SET do the hard work and clone and setup a fake website. So again option 2.<br />We now need to select our attack vector. I know my lab machines are fully patched, so a browser exploit will most likely not be successful. So we go with option 1 and a Java Applet Attack method. <br />Now we shall clone Twitter, so we input www.twitter.com also.<br />Its now time to get our payload selected. I am a fan of reverse TCP meterpreter, so time for option 2 again.<br />Now we have the fun of encoding our payload to bypass AV. Shikata ga nai is an excellent encoder, but now with have the multi encoding option, I have found in my tests it can be more successful at bypassing the AV. We will also need to define our listener port, so we will go within something creative. 4321<br />The encoding mojo does its thing.<br />We are asked if we want to create a Linux / OSX payload, but we dont need this here.The tool then goes ahead and sets up our fake site, and gets our listener up and running. <br />So now we have cloned a site, defined a payload, encoded it for AV bypassing and setup a web server for our cloned site.So now we are ready and waiting. So now we just need someone to go to our cloned site.It would be a good idea to go to Twitter on a strange IP.So we enter the IP of our SET hosting machine, accessing Twitter. We need to install some Java stuff (I believe this can be customised for a better convincer, remember we are doing basics here .It involves some more work and configuration.) <br />