Jump to content
Nytro

Using Social Engineering Toolkit - Credential Harvester Attack

Recommended Posts

Posted

Using Social Engineering Toolkit - Credential Harvester Attack

Description: This is Video Four on using The Social Engineering Toolkit on Backtrack Linux & Kali Linux.

In this video i will show you how to use a credential harvester Attack using a Cloned Website and ettercap with dns_spoof.

We will be attacking victims over a LAN (Local Area Network)

However this is possible to do outside a network if you wanted to however i won't be explaining that in this video.

Programs Used:

Kali Linux

SET - Social Engineering Tool Kit

ettercap

dns_spoof

Browsers used: Google Chrome

Commands used:

nano /usr/share/ettercap/etter.dns

Command allows us to edit the etter.dns that we will be redirecting cloned website to our lan ip on the network.

ettercap -i wlan0 -T -q -P dns_spoof -M ARP:remote // //

Change the wlan0 to whatever you're wireless interface name using iwconfig or ifconfig

Take in mind this is being done over a wireless network.

This can be used to get logins for facebook if your at a public wireless place.

My websites:

PhiberOptics - YouTube

Matthew H Knight | Computer and Network Security Enthusiast

http://twitter.com/ZaraByte

http://facebook.com/ZaraByte

Sursa: Using Social Engineering Toolkit - Credential Harvester Attack

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...