Description: This video gives simple explanation of making a USB backdoor in backtrack. social engineering toolkit (SET) is used for this purpose.
The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.
Source :http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29
Tags: USB , Backdoor , Backtrack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
another great advantage of set. thanks for video
SET toolkit is very easy to use. Great for Social-engineering hacking but i'm Trying this, So i have installed Antivirus that antivirus software detecting my file :( (Avast)
@jackson .... to bypassantivirus ....open that backdoor in hax editer tool ...and find File Signatures....and replace to 0 ....
and otherways ...
Methods of Bypassing AV Detection
The methods for bypassing AV detection can be loosely grouped together as follows:
· Binary Editing
· Encoding
· Packing
· Source Modifcation
· Recompilation
· Use of Alternative programs