The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of the time.

In this lab, you will be using SET to evaluate the different attacks that computer systems face.

The purpose of this activity is to provide information regarding how these programs function in order that adequate defenses can be designed and implemented. These programs should never be used in a malicious fashion against another user.

Part 1: Social Engineering Attacks

  1. Turn on the Windows VM. Open Turn Windows features on or off in the Start Menu or Control Panel. Enable Windows Process Activation Service.
Windows Features
  1. Enable World Wide Web Services and its sub-services. Click OK then Close.
Windows Features
  1. Search for “Command Prompt” in the Start Menu and select Run as Administrator. Restart the IIS manager.
     iisreset /restart
    
  2. Ensure that the Kali Linux VM is on a host-only network. Turn it on and login. Open the site for the Windows VM’s IP http://192.168.56.101 in a browser. It will be the Windows IIS homepage.
  3. Search for in the Kali Linux start menu and launch the social engineering toolkit which is an open-source penetration testing framework designed for social engineering. Enter the kali password when prompted. Review and accept the terms with y. You will see an error message for the tool failing to update, followed by the SET menu.
  4. Enter 1 to select Social-Engineering Attacks. Review the different types of attacks.
  5. Enter 2 to select Website Attack Vectors. Review the different threat vectors.
  6. Enter 3 to select Credential Harvester Attack Method. Review the different types of methods.
  7. Enter 2 to select Site Cloner. Review the different types of tools. The tool is used to clone a webpage and harvest login credentials used on it for a simulated phishing attack.
  8. When prompted for an IP address for the post back, enter the Kali Linux VM’s IP address 192.168.56.102.
  9. When prompted for a URL to clone, enter the Windows IIS homepage http://192.168.56.101. The tool is now hosting a site and waiting for connections to it.
  10. In the Windows VM, browse to the Kali Linux IP at http://192.168.56.102. The Linux server is pretending to be the Windows server.
  11. In the Kali Linux VM, close all windows. Open Terminal and see where the logs are kept.
    sudo ls /root/.set/reports
    
  12. Open the xml files.
    sudo cat /root/.set/reports/*.xml
    

    If we were to clone a login page and login to the clone on the Windows side, this log file would contain the username and password used to login to the cloned site.

Part 2: Malware Attacks

  1. Open the main Social Engineering Toolkit menu and enter 4 to select Create a Payload and Listener. Review the different threat vectors.
  2. Enter 2 to pick Windows Reverse_TCP Meterpreter. Review the various malware types.
  3. When prompted for an IP address for the payload listener, enter the Kali Linux VM’s IP address 192.168.56.102.
  4. When prompted for a port for the reverse listener, enter a random port 1111.
  5. Once the SET tool creates the payload, enter no.
  6. Close all windows.
  7. Open Terminal again and view where the payload was placed.
    sudo ls /root/.set
    
  8. View the plaintext contents of the payload you’ve created.
    sudo strings /root/.set/payload.exe
    

    If we were to have entered yes in step 18, it would begin to listen for an incoming connection, which would come if we were to run this payload on the Windows VM. That connection would create to a shell session from the Kali VM to the Windows VM with Metasploit’s framework.

  9. Delete the payload.
    sudo rm /root/.set/payload.exe
    
  10. Uncheck the services enabled in steps 1 and 2. Shutdown all VMs.
  11. Please write up a paragraph answering the following questions.
    1. How could a user avoid logging into a social engineering site?
    2. How could a security administrator prevent the execution of payloads like these on their company’s systems?
    3. How could a penetration tester use a tool like this to help their company?

More Info