社会工程学 social-engineer toolkit使用


一、介绍

社会工程师工具包(SET)全称为Social-Engineer Toolkit,由TrustedSec的创始人创建和编写。它是一个开源的Python驱动工具,旨在围绕社交工程进行渗透测试,已经在包括Blackhat,DerbyCon,Defcon和ShmooCon在内的大型会议上提出过。它拥有超过200万的下载量,旨在利用社会工程类型环境下的高级技术攻击。TrustedSec认为,社会工程学是最难防范的攻击方式之一,是现在最流行的攻击方式之一。

二、安装

github地址:https://github.com/trustedsec/social-engineer-toolkit

 

wget https://github.com/trustedsec/social-engineer-toolkit/archive/7.7.9.tar.gz
tar xf 7.7.9.tar.gz 
 cd social-engineer-toolkit-7.7.9/
 #启动postgetrsql(依赖msf)
 service postgresql start
 #启动
 ./setoolkit

  

三、使用(google登录)

#启动
 ./setoolkit
 
 
 #主要选择项
  Select from the menu:

   1) Social-Engineering Attacks #社会工程攻击(钓鱼网站等)
   2) Penetration Testing (Fast-Track)  #渗透测试(快速通道)
   3) Third Party Modules #第三方模块
   4) Update the Social-Engineer Toolkit  #新升级set
   5) Update SET configuration #更新set的设置
   6) Help, Credits, and About #帮助菜单

  99) Exit the Social-Engineer Toolkit  #退出

set> 


  
  
 #1选项
    1) Spear-Phishing Attack Vectors #鱼叉式网络钓鱼攻击
   2) Website Attack Vectors   #网页攻击
   3) Infectious Media Generator #传染媒介式(俗称木马)
   4) Create a Payload and Listener #建立payloaad和listener
   5) Mass Mailer Attack #邮件群发攻击(夹杂木马啊payload的玩意发给你)
   6) Arduino-Based Attack Vector #Arduino基础攻击
   7) Wireless Access Point Attack Vector  #无线接入点攻击
   8) QRCode Generator Attack Vector #二维码攻击
   9) Powershell Attack Vectors #Powershell攻击
  10) SMS Spoofing Attack Vector #短信欺骗
  11) Third Party Modules #第三反模块

  99) Return back to the main menu. #返回上级
 
 #2、选择web攻击
    1) Java Applet Attack Method #java applet攻击(网页弹窗那种)
   2) Metasploit Browser Exploit Method #Metasploit 浏览器漏洞攻击
   3) Credential Harvester Attack Method #钓鱼网站攻击
   4) Tabnabbing Attack Method #标签钓鱼攻击
   5) Web Jacking Attack Method #网站jacking攻击
   6) Multi-Attack Web Method #多种网站攻击方式
   7) Full Screen Attack Method #全屏幕攻击(只能够对谷歌邮箱和脸书用)
   8) HTA Attack Method   #HTA攻击
  99) Return to Main Menu #返回上级

 #再次选择2
    
   1) Web Templates #网站模版
   2) Site Cloner #克隆网站 (这个克隆网站的要求就是最好是静态页面而且有有POST返回的登录界面)
   3) Custom Import #自己设计的网站

  99) Return to Webattack Menu #返回上级
  #选择1测试
  #选择回车(或者输入ip)
  set:webattack> IP address for the POST back in Harvester/Tabnabbing [10.0.0.132]:

--------------------------------------------------------
             **** Important Information ****

For templates, when a POST is initiated to harvest
credentials, you will need a site for it to redirect.

You can configure this option under:

      /etc/setoolkit/set.config

Edit this file, and change HARVESTER_REDIRECT and
HARVESTER_URL to the sites you want to redirect to
after it is posted. If you do not set these, then
it will not redirect properly. This only goes for
templates.

--------------------------------------------------------

  1. Java Required
  2. Google
  3. Twitter
#选择2 Google
#一直回车
[*] The Social-Engineer Toolkit Credential Harvester Attack
[*] Credential Harvester is running on port 80
[*] Information will be displayed to you as it arrives below:

  

浏览器访问

 

 

账号密码 

 

四、网站克隆(钓鱼)

依次选择
1
2
3
#出现
   1) Web Templates
   2) Site Cloner
   3) Custom Import

  99) Return to Webattack Menu

#选择2(克隆)
set:webattack> IP address for the POST back in Harvester/Tabnabbing [10.0.0.132]: 
[-] SET supports both HTTP and HTTPS
[-] Example: http://www.thisisafakesite.com
set:webattack> Enter the url to clone:http://这里是克隆的网址(如http://www.baidu.com)  #有些网站克隆不了

  

浏览器访问

 


免责声明!

本站转载的文章为个人学习借鉴使用,本站对版权不负任何法律责任。如果侵犯了您的隐私权益,请联系本站邮箱yoyou2525@163.com删除。



 
粤ICP备18138465号  © 2018-2025 CODEPRJ.COM