1. First boot your kali linux and wait untill the Grub will come,
As you will see the grub , then scroll down to recovery mode
then press E
2. After pressing E you will see this screen. Here you...
The Powershell Attack Vector module allows you to create PowerShell specific attacks. These attacks will allow you to use PowerShell which is available by default in all operating systems Windows Vista and above. PowerShell provides a fruitful landscape for deploying payloads and performing functions...
ATTACK NAME : INFECTIOUS MEDIA GENRATOR ATTACK
ATTACKING OS : ALL WINDOWS OS
THIS TECHNIQUE MOSTLY USED TO INFECT UR VICTIM USING EXECUTEABLE FILES FROM USB DEVICES. BECAUSE NOW A DAYS THE PEOPLE MOSTLY USE THE USB DEVICES TO TRANSFER DATA SO THAT'S THE REASON FOR BORN OF THE SOCIAL ENGINEERING...
IN THIS TUTORIAL I HAVE HACKED MY OWN WINDOWS 8 PC..
WORKING PLATFORM : WINDOWS, LINUX, MAC
PREREQUEST : INSTALLED JAVA ON VICTIMS PC.
OPEN SET TOOLKIT:
APPLICATION > KALI LINUX > EXPLOITATION TOOLS > SOCIAL ENGINEERING TOOLKIT > SE-TOOLKIT
AFTER OPEN SET U SEE THAT.
LET'S...