Download presentation
Presentation is loading. Please wait.
Published byFrederica Arnold Modified over 9 years ago
1
Social Engineering Toolkit Computer Science Innovations, LLC
2
Crack Systems SET toolkit from Backtrack. First attach is a Social Engineering Attack. Copy a web-site (mine). Get someone to go to the site. Get on their machine. Go to your backtrack machine. Control Alt T (for a terminal). Command cd /pentest/exploits/
3
Steps Video – Backtrack 5 Applet Attack method Terminal – cd /pentest/exploits/set;./set Update your metasploit and backtrack Trial and Error is involved. It is not shrink wrapped. Setup your server --- which is the backtrack payload. Get someone to your machine... send an email - Chris for a hot time select girls Girls Girls http://10.10.1.x
4
Getting Someone to Your Backtrack Phishing email. Overwrite the DNS Server – so it thinks Facebook is you. Overwrite the DHCP Server and make you …. the DNS.
5
Watch Video Again This time pausing it. Step one... Forget the nmap stuff. Step two... Go to set Step three... Java Applet Attack Vector Step four.... Facebook template Step five... www.scottstreit.com copy the site.www.scottstreit.com
6
What We Do Java Applet Attack Site Cloning www.scottstreit.comwww.scottstreit.com – Use www.facebook.comwww.facebook.c – Use ????? Next step.... get credentials. Practice for test …. you guys running it..
7
Credential Harvesting – Do It Credential Harvesting Attach, on your teammate. Do this via set in two ways. 1) Template 2) Site Clone. Use and email to launch
8
Mail Mail: Google has a sender and receiver. Convention: There is nothing in SMTP (Simple Mail Transport Protocol) that says the from has to be real. Mail in Unix you could specify the from. So you send an email and make the from --- the President. Write an application program.
9
ISPs have Turned of 25 That means you cannot send mail from your computer as a server. Why do you think they did this. Stop Spammers.
10
ARP Poisoning Application Presentation Session Transport Network Datalink --- worked at -------- Physical
11
Solution All routers --- all... now prevent MAC Flooding and any type of poisoning. The tools, ettercap, wireshark... they will attempt To impact the Datalink Layer, but to no avail. They will report --- no success.
12
History We used to have Bridges... one piece of hardware and Routers … another piece of hardware... and Interconnection (FIOS, cable modem) that was yet a third piece of hardware. There were distinct attacks on all three. What has happened since. Now, everything is integrated, you essentially get countermeasures and update automatically.
13
Lab – We Don't Believe Scott Ettercap wireshark Start with ettercap.. you run it … startx Command: ettercap -G you have to run this as root. So if you go to plugins and check poison, you will see it did not work.
14
More Ettercap Additionally, the sniffing on a switched network shows nothing. So you need a broadcast network. So where do we have a broadcast network.
15
Lab Problem Problem: 1) You have a virus on a Windows box in the boot sector, you cannot get to the network and you want to get your data files off. How? 2) You forgot the root password on your Unix box, you want to use rainbow tables to find it. Same answer for both, how do you do this?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.