![]() ![]() Type “99” to go back to the main menu and then type “5” to go to “The web attack vectors”. You would need to convince the victim to download the exe file and execute it to get the shell. It will export the exe file for you and generate a listener. The create payload and listener is a simple way to create a Metasploit payload. Then, type “4” to go to “The web attack vectors”. You can pick the attack vector you wish to use: fileformat bugs or a straight executable.įollowing are the options for Infectious Media Generator. When DVD/USB/CD is inserted in the victim’s machine, it will trigger an autorun feature (if autorun is enabled) and hopefully compromise the system. The payload and autorun file is burned or copied on a USB. The infectious USB/CD/DVD module will create an autorun.inf file and a Metasploit payload. Type “99” to return to the main menu and then type “3”. There is a wide variety of attacks that can occur once they click a link. This module is used by performing phishing attacks against the victim if they click the link. The web attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim. Type “99” to go back to the main menu and then type “2” to go to “The web attack vectors”. The first one is letting SET do everything for you (option 1), the second one is to create your own FileFormat payload and use it in your own attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |