social engineer tools payload

Iniciado por dreadsx, 21 Enero 2011, 21:13 PM

0 Miembros y 1 Visitante están viendo este tema.

dreadsx

Hola que tal antes que nada les envio un coordial saludo ,  quieoro hacer un Email Attack se trata del envio a el correo de la victima un archivo malicioso en formato .pdf la victima lo que tiene que hacer es descarga el archivo y abrirlo al abrirlo le dira que guarde otro archivo a la capeta My Documents este ultimo archivo es el ejecutable y el que da la entrada remotamente ala maquina victima, los pasos que realizo son os siguientes:

       /   _____/\_   _____/\__    ___/
      \_____  \  |    __)_   |    |   
      /        \ |        \  |    |   
      /_______  //_______  /  |____|   
              \/         \/         
                                                 

  [---]       The Social-Engineer Toolkit (SET)          [---]
  [---]        Written by David Kennedy (ReL1K)          [---]
  [---]                 Version: 1.1.1                   [---]
  [---]           Codename: 'Happy Holidays'             [---]
  [---]     Report bugs to: davek@social-engineer.org    [---]
  [---]          Follow Me On Twitter: dave_rel1k        [---]
  [---]        Homepage: http://www.secmaniac.com        [---]
  [---]     Framework: http://www.social-engineer.org    [---]

   Welcome to the Social-Engineer Toolkit (SET). Your one
    stop shop for all of your social-engineering needs..
     
    DerbyCon 2011 Sep30-Oct02 - http://www.derbycon.com

Select from the menu:

1.  Spear-Phishing Attack Vectors
2.  Website Attack Vectors
3.  Infectious Media Generator
4.  Create a Payload and Listener
5.  Mass Mailer Attack
6.  Teensy USB HID Attack Vector
7.  SMS Spoofing Attack Vector
8   Update the Metasploit Framework
9.  Update the Social-Engineer Toolkit
10. Help, Credits, and About
11. Exit the Social-Engineer Toolkit

Enter your choice: 1

Welcome to the SET E-Mail attack method. This module allows you
to specially craft email messages and send them to a large (or small)
number of people with attached fileformat malicious payloads. If you
want to spoof your email address, be sure "Sendmail" is installed (it
is installed in BT4) and change the config/set_config SENDMAIL=OFF flag
to SENDMAIL=ON.

There are two options, one is getting your feet wet and letting SET do
everything for you (option 1), the second is to create your own FileFormat
payload and use it in your own attack. Either way, good luck and enjoy!

1. Perform a Mass Email Attack
2. Create a FileFormat Payload
3. Create a Social-Engineering Template
4. Return to Main Menu

Enter your choice: 1

Select the file format exploit you want.
The default is the PDF embedded EXE.

        ********** PAYLOADS **********

1.  SET Custom Written DLL Hijacking Attack Vector (RAR, ZIP)
2.  SET Custom Written Document UNC LM SMB Capture Attack
3.  Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
4.  Microsoft Word RTF pFragments Stack Buffer Overflow (MS10-087)
5.  Adobe Flash Player 'Button' Remote Code Execution
6.  Adobe CoolType SING Table 'uniqueName' Overflow
7.  Adobe Flash Player 'newfunction' Invalid Pointer Use
8.  Adobe Collab.collectEmailInfo Buffer Overflow
9.  Adobe Collab.getIcon Buffer Overflow
10.  Adobe JBIG2Decode Memory Corruption Exploit
11. Adobe PDF Embedded EXE Social Engineering
12. Adobe util.printf() Buffer Overflow
13. Custom EXE to VBA (sent via RAR) (RAR required) 
14. Adobe U3D CLODProgressiveMeshDeclaration Array Overrun
15. Adobe PDF Embedded EXE Social Engineering (NOJS)
16. Foxit PDF Reader v4.1.1 Title Stack Buffer Overflow
17. Nuance PDF Reader v6.0 Launch Stack Buffer Overflow

Enter the number you want (press enter for default): 15
You have selected the default payload creation. SET will generate a normal PDF with embedded EXE.

1. Use your own PDF for attack
2. Use built-in BLANK PDF for attack

Enter your choice (return for default): 2

1. Windows Reverse TCP Shell        Spawn a command shell on victim and send back to attacker.
2. Windows Meterpreter Reverse_TCP        Spawn a meterpreter shell on victim and send back to attacker.
3. Windows Reverse VNC DLL        Spawn a VNC server on victim and send back to attacker.                   
4. Windows Reverse TCP Shell (x64)        Windows X64 Command Shell, Reverse TCP Inline
5. Windows Meterpreter Reverse_TCP (X64)  Connect back to the attacker (Windows x64), Meterpreter
6. Windows Shell Bind_TCP (X64)        Execute payload and create an accepting port on remote system.
7. Windows Meterpreter Reverse HTTPS      Tunnel communication over HTTP using SSL and use Meterpreter

Enter the payload you want (press enter for default): 2
Enter the port to connect back on (press enter for default): 4444
  • Generating fileformat exploit...
  • Payload creation complete.
  • All payloads get sent to the src/program_junk/template.pdf directory


    Sendmail is a Linux based SMTP Server, this can be used to spoof email addresses.
    Sendmail can take up to three minutes to start FYI.
    Sendmail is set to ON. Would you like to start the server now?

    Would you like to start Sendmail yes or no: yes


    As an added bonus, use the file-format creator in SET to create your attachment.
    No previous payload created.
    Enter the file you want to use as an attachment:

    y hasta ahi que es lo que tengo que hacer crear un payload? ya lo he hecho desde metasploit y al idicar la ubicacion de mi . exe me sale los siguiente:

    As an added bonus, use the file-format creator in SET to create your attachment.
    No previous payload created.
    Enter the file you want to use as an attachment:

    FILE NOT FOUND. Try Again.

    y no lo puedo cargar que es lo que debo de hacer para continuar, espero que me ayuden