Lab-Project 2: Creating Infectious Media With The Social Engineering Toolkit
Lab-Project 2: Creating Infectious Media With The Social Engineering Toolkit
Toolkit
What You Need
A Kali Linux machine to be the Attacker (I used Kali 2.0 32-bit)
A Windows target machine without antivirus software--I recommend using the
Windows 2008 target virtual machine you got in class.
Purpose
We will use Kali Linux and the Social Engineering Toolkit to create a an infectious EXE file.
A user who runs that file.
Finding the Attacker's IP Address
On your Linux machine, in a Terminal window, execute this command:
ifconfig
Find your IP address and make a note of it. In the example below, it is 192.168.119.169.
Post-Exploitation
You now own the target! Here are some fun meterpreter > commands to try:
Begins capturing keys typed in the target. On the Windows target, open
keyscan_start
Notepad and type in some text, such as your name.
Stealing a Password
On the Kali Linux machine, in an open Meterpreter session, execute these commands:
load mimikatz
kerberos
The current user's password appears in plaintext, as shown below.