Download presentation
Presentation is loading. Please wait.
Published byPatrick Brown Modified over 9 years ago
1
For Client Side Exploitation and Credential Harvesting Attacks
2
Why? It’s simple – point, click, fire What does it get you? Usernames, passwords, software types, printers, etc. Demo time….
3
Automated attacks ‘Relative point n click’ Focus on client side Exploitation Information leakage Demo time… Exploit and Info Gathering
4
No form for gathering credentials? Little effort and we can fix that, while keeping the site real Clone the site with WebHTTrack Clone the site with SET After inserting the form fields Edit the SET attack template /pentest/exploits/set/src/program_junk/web_clone
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.