Simulating Basic Attacks with Metasploit and Social Engineer Toolkit
Resumen
TLDRIn this video, the speaker discusses social engineering attacks, focusing on phishing techniques. Social engineering exploits human psychology instead of relying solely on technical vulnerabilities. The video emphasizes the importance of understanding these methods to better defend against them. Key demonstrations include capturing credentials through a fake login interface using Metasploit and creating a malicious PDF to infect user systems. The Social Engineer Toolkit is explored for its capabilities in conducting phishing campaigns. The content aims to educate viewers, especially those studying secure coding, on how to recognize and prevent such attacks.
Para llevar
- π Social engineering exploits human psychology.
- π§ Phishing involves tricking users into giving sensitive information.
- π οΈ Tools like Metasploit are used for ethical hacking.
- π Always be cautious with emails and links that prompt urgency or fear.
- π¨βπ Awareness training is critical for organizations.
- π» Credential harvesting can lead to unauthorized access.
- π Multi-factor authentication can help prevent phishing attacks.
- π₯οΈ Social Engineer Toolkit is versatile for phishing demonstrations.
- π Creating convincing payloads increases phishing effectiveness.
- β οΈ Always verify the source of digital communications.
CronologΓa
- 00:00:00 - 00:05:00
This video discusses basic social engineering attacks, explaining that social engineering relies on exploiting human psychology instead of technical hacking methods to gain unauthorized access to systems and data. The presenter highlights various social engineering techniques, focusing primarily on phishing attacks which lure individuals into revealing sensitive information or clicking malicious links.
- 00:05:00 - 00:10:00
The video serves as a tutorial for undergraduate students in a secure coding module, detailing the process of implementing basic phishing attacks. The presenter discusses their intention to record this information as an educational resource, acknowledging that the content might vary in relevance for different viewers. They also mention a minor technical issue visible in the video.
- 00:10:00 - 00:15:00
The presenter outlines a practical demonstration involving capturing user credentials using Metasploit and creating a malicious PDF for phishing purposes. They describe the elements involved in these demonstrations, including establishing persistence and gathering hashes to analyze vulnerabilities, which ultimately aids in understanding social engineering tactics.
- 00:15:00 - 00:20:00
Metasploit's command options and features are highlighted, explaining how to search for specific modules to conduct a very basic phishing attack. The presenter elaborates on using HTTP basic authentication to simulate a phishing scenario, where victims are tricked into providing their credentials.
- 00:20:00 - 00:25:00
The video continues with a detailed walkthrough for setting up a fake login page designed to collect credentials from victims, discussing the importance of social engineering in persuading victims to enter their information even when the red flags are apparent. They emphasize that a realistic fake site creation is vital for effective phishing.
- 00:25:00 - 00:30:00
Next, the focus shifts to creating a malicious PDF file that would deploy malware on a user's system when opened. The presenter explains step-by-step how to customize the PDF to look benign, incorporating details that would entice the victim to open the file, aligning with the goals of social engineering attacks.
- 00:30:00 - 00:35:00
The speaker then runs through exploiting the system after the malicious PDF is executed, showcasing how to capture keystrokes, take screenshots, and collect various credentials using Metasploitβs Meterpreter. They discuss the power of Meterpreter's post-exploitation capabilities and the different tactics available for privilege escalation, persistence, and exploitation.
- 00:35:00 - 00:40:00
The presenter runs through various threats posed by malware and social engineering techniques, including the ability for malware to listen to microphones, record webcams, and attempt privilege elevation in order to gain full control over compromised systems.
- 00:40:00 - 00:49:16
Finally, they transition to discussing the Social Engineer Toolkit (SET), attempting to perform website cloning for phishing and various exploit test demonstrations that do not yield success, showcasing the dynamic challenge faced in penetration testing. The video wraps with a summary of the tools discussed and encourages viewers to share any interesting techniques or tools to explore further.
Mapa mental
VΓdeo de preguntas y respuestas
What is social engineering?
Social engineering is the art of exploiting human psychology to gain access to systems or sensitive information.
What are common types of social engineering attacks?
Common types include phishing, pretexting, baiting, and impersonation.
How does phishing work?
Phishing typically involves tricking individuals into revealing sensitive information by exploiting emotions like urgency or fear.
What is the purpose of the demonstration in the video?
The demonstration aims to educate on how phishing attacks work to help individuals recognize and defend against such threats.
What tools are used for the demonstrations?
The tools used include Metasploit for exploiting vulnerabilities and Social Engineer Toolkit for phishing attacks.
How can one defend against social engineering attacks?
Awareness and training for employees about recognizing social engineering tactics are critical for defense.
What is the significance of credential harvesting?
Credential harvesting is significant as it allows attackers to gain unauthorized access to accounts by collecting usernames and passwords.
What should organizations do to prevent phishing attacks?
Organizations should implement security awareness training and enable multi-factor authentication to enhance security.
Ver mΓ‘s resΓΊmenes de vΓdeos
My greed is everlasting! Wings of Eternity β¨
Shadow of the Destroyer π₯ Beast-Yeast Episode 5 Update!
How I Make $1,000 a Day Using ChatGPT (Step-by-Step Guide!)
δΈε£ζ°δΊθ§£ε ³η¨
Legenda Keong Mas | Cerita Rakyat Jawa Timur | Kisah Nusantara
Sociolinguistics (and the basics of language attitudes)
- 00:00:00hi everybody in this video we'll be
- 00:00:02looking at some basic social engineering
- 00:00:03attacks
- 00:00:04so social engineering is the art of
- 00:00:06exploiting human psychology rather than
- 00:00:08technical hacking techniques to gain
- 00:00:10access to buildings systems or data so
- 00:00:13for example
- 00:00:14rather than trying to find and exploit a
- 00:00:16software vulnerability
- 00:00:17a social engineer might impersonate an
- 00:00:19employee and
- 00:00:21try to trick employees into giving over
- 00:00:23their credentials or opening a malicious
- 00:00:25file
- 00:00:26or something like that they might drop
- 00:00:27some usb sticks around a car park and
- 00:00:30hope that some employees pick them up
- 00:00:31and plug them in
- 00:00:33um so there are quite a few different
- 00:00:34social engineering attack types in this
- 00:00:36video we'll be focusing primarily on
- 00:00:38fishing and quite basic fishing
- 00:00:40attacks at that so we all know the
- 00:00:42classic fishing scams that we get
- 00:00:43through email and they exploit a sense
- 00:00:46of
- 00:00:46urgency curiosity or fear in order to
- 00:00:49try and get us to either reveal
- 00:00:50sensitive information or click on a
- 00:00:52malicious link or open a file which will
- 00:00:54then
- 00:00:55infect the system considering that
- 00:00:58humans are considered to be the weakest
- 00:01:00link typically in security
- 00:01:02social engineering and phishing is
- 00:01:04obviously a serious issue
- 00:01:06you know if employees aren't aware of
- 00:01:08these kinds of attacks
- 00:01:09then it's very hard for organizations to
- 00:01:12defend against it
- 00:01:14this video will be a little bit
- 00:01:15different to the content i typically put
- 00:01:16on youtube
- 00:01:18the reason i'm recording this is
- 00:01:19essentially i was asked to put together
- 00:01:21a basic fishing and social engineering
- 00:01:23attack demo for final year students
- 00:01:25undergraduate students who are doing a
- 00:01:26secure coding module
- 00:01:28so i figured i might as well record it
- 00:01:30as well and see if it can help anybody
- 00:01:32else at the same time so bearing that in
- 00:01:33mind this might be
- 00:01:35above your level or below your level but
- 00:01:37hopefully you can find something in it
- 00:01:39that's useful anyway
- 00:01:40i'm also re-recording this intro at the
- 00:01:42moment because
- 00:01:44i had a long run on the last intro about
- 00:01:47youtube removing my videos which they
- 00:01:49seem to have resolved so i figured i'd
- 00:01:50come back and
- 00:01:51re-record the intro also i noticed that
- 00:01:53there's a little white block at times
- 00:01:55around
- 00:01:56my cursor throughout the video not not
- 00:01:57all the way through but at certain times
- 00:01:59and it's quite small it shouldn't cover
- 00:02:01too much up but i thought i'd also
- 00:02:02mention that as well
- 00:02:03you can skip down at the bottom between
- 00:02:05the chapters if you want to skip ahead
- 00:02:06but
- 00:02:07essentially we'll be looking at
- 00:02:10capturing some basic auth credentials in
- 00:02:11metaexploit
- 00:02:12and then we will create a malicious pdf
- 00:02:15which will we would
- 00:02:16be sending as a phishing email to infect
- 00:02:19the victim
- 00:02:20and then get them interpret a shell at
- 00:02:22which point we'll have a look at some
- 00:02:23different
- 00:02:24modules we can use how we can establish
- 00:02:26persistence and
- 00:02:28dump hashes and use some different
- 00:02:31modules
- 00:02:32to scan for local vulnerabilities and
- 00:02:34things like that and then finally we'll
- 00:02:36take a look at the social engineer
- 00:02:37toolkit so i hadn't actually looked at
- 00:02:39this for several years myself
- 00:02:41and it's kind of me playing around with
- 00:02:42it a bit at the end but we will
- 00:02:44do the credential harvester attack and
- 00:02:47we'll look at the browser auto pwn mode
- 00:02:49and see what we can get working let's
- 00:02:52just say this is for educational
- 00:02:53purposes we're learning how social
- 00:02:55engineering and efficient attacks work
- 00:02:57so that we can be aware of them and
- 00:02:58defend against them if you're interested
- 00:03:00in this topic i would recommend checking
- 00:03:01out
- 00:03:02the art of deception by kevin mitnick
- 00:03:04and
- 00:03:05with that out the way i hope you enjoyed
- 00:03:06the video and once meta splits booted up
- 00:03:09we'll see some statistics here about the
- 00:03:11available
- 00:03:11exploits and auxiliary modules post
- 00:03:13modules payloads encoders
- 00:03:16knobs and evasion techniques so
- 00:03:20we can check out the help menu here
- 00:03:21let's run help and see what kind of
- 00:03:23commands we have
- 00:03:24got develop developer commands
- 00:03:26credential back-end commands
- 00:03:29uh database back-end commands job
- 00:03:31commands module commands there's a lot
- 00:03:33of stuff here
- 00:03:34if there's anything particularly you
- 00:03:35want to find information on for example
- 00:03:37there's a search function there so if we
- 00:03:38run search
- 00:03:39we can just type search and it'll come
- 00:03:40back with a help we can also do help
- 00:03:42search and that will bring back the same
- 00:03:45information
- 00:03:46and then uh so for any modules anything
- 00:03:48you're not too sure about
- 00:03:49just just run help and you'll get the
- 00:03:51you'll get the info you need or just run
- 00:03:52it without any parameters and you'll
- 00:03:53probably get the info you need as well
- 00:03:56so we're gonna search first of all for
- 00:03:58http
- 00:04:00basic and this is a really really basic
- 00:04:03example of a phishing attack
- 00:04:05using http basic auth so you can see
- 00:04:08here as basic auth credential collector
- 00:04:10let's because we want to use this module
- 00:04:12we're going to type use and then we'll
- 00:04:13just paste that in
- 00:04:16and whenever we use a module we can do
- 00:04:18show options and we'll get a list of the
- 00:04:20options that are required
- 00:04:22and opt options which are optional as
- 00:04:24well so in this case we can see this is
- 00:04:26required it's already filled in for us
- 00:04:27you don't need to worry about it
- 00:04:28so if it's already filled in you're
- 00:04:29probably ready to run it but
- 00:04:32let's make a couple of changes here the
- 00:04:33first thing is our service host so if we
- 00:04:35have a couple of different ips let me go
- 00:04:37and do
- 00:04:38ifconfig you might have some different
- 00:04:40interfaces here so i'm going to specify
- 00:04:42and say we want to do this on our
- 00:04:43ethernet
- 00:04:44so we'll set the service host we can use
- 00:04:47auto complete there
- 00:04:49paste in the ip address and then we
- 00:04:51might want to set ssl as well although
- 00:04:53if we do that
- 00:04:54bear in mind it's going to be a
- 00:04:55self-signed certificate so
- 00:04:57it might raise more suspicion than not
- 00:05:00using ssl because they're going to get
- 00:05:02the victim's going to get an alert
- 00:05:03saying this is a self-signed untrusted
- 00:05:06certificate do you wish to add an
- 00:05:07exception and that's a big
- 00:05:09red flag so we'll not do that in this
- 00:05:11case
- 00:05:12we have a realm so what do we want to
- 00:05:14present this authentication as so
- 00:05:16let's assume this is a really really
- 00:05:18basic attack maybe we're trying to get
- 00:05:20into somebody's facebook or something
- 00:05:22like that
- 00:05:22obviously as a educationally we're not
- 00:05:25we're not actually trying to hack into
- 00:05:27somebody's facebook that'd be
- 00:05:29unethical and illegal um
- 00:05:32but if we were in uh doing a pen test or
- 00:05:35something like that and we were trying
- 00:05:36to
- 00:05:37fish some credentials off one of the
- 00:05:38employees
- 00:05:40with full authorization by the company
- 00:05:43then we might set the realm here
- 00:05:44let's set the realm to i'm going to put
- 00:05:47facebook
- 00:05:48login obviously it's going to look
- 00:05:51nothing like a facebook login
- 00:05:52so that's where the social engineering
- 00:05:54comes in that's where
- 00:05:56we need to persuade the victim to
- 00:05:59entering their credentials into this
- 00:06:01even though everything
- 00:06:02about it should be telling them don't
- 00:06:04put your login details in here
- 00:06:07we can also set the uri path so let's
- 00:06:09set that to something like uri
- 00:06:11path um
- 00:06:14slash login and is there anything else i
- 00:06:18think that looks good we can set the
- 00:06:19redirect url as well so let's do
- 00:06:20set redirect url
- 00:06:25to facebook.com
- 00:06:30all right and we can just go and show
- 00:06:32the options just make sure we've got
- 00:06:33everything in as we
- 00:06:34as we want it and then we can run
- 00:06:38the server so now it's given us a url
- 00:06:40that this is running on
- 00:06:43and essentially then we would pass this
- 00:06:44url to the victim so
- 00:06:46maybe we would send out a phishing email
- 00:06:48or that looks like it's coming from
- 00:06:50facebook or something like that maybe we
- 00:06:51would
- 00:06:52just provide the url to the victim so
- 00:06:55we'll go over to i've got a windows xp
- 00:06:57system here
- 00:06:58a vulnerable system with some vulnerable
- 00:07:00plugins and things like that
- 00:07:01i was testing out the social engineer
- 00:07:03toolkit with this operating system and
- 00:07:05with a windows 7
- 00:07:06operating system that i used to use for
- 00:07:08tracking exploit kits but for some
- 00:07:10reason
- 00:07:11i was i wasn't able to get the a shell
- 00:07:14using any of the methods in there i
- 00:07:16tried using the browser
- 00:07:17pwning methods i tried using phishing
- 00:07:20and
- 00:07:21i wasn't able to get it working so we'll
- 00:07:22have a look at that at the end anyway
- 00:07:23maybe somebody can tell me
- 00:07:25what i'm doing wrong or what the bug is
- 00:07:27so we give this to the victim they open
- 00:07:29the link and they see
- 00:07:30facebook login requires a username and
- 00:07:32password now obviously
- 00:07:33this doesn't look anything like facebook
- 00:07:35and the server doesn't look like
- 00:07:37facebook
- 00:07:38so this could be a bit more realistic
- 00:07:39but assuming that we have
- 00:07:41um emailed the victim with a convincing
- 00:07:44enough email or maybe we have them on
- 00:07:46the phone and we're saying okay
- 00:07:47you just need to enter in your
- 00:07:49credentials here and that'll reset your
- 00:07:51password or you need to first put in
- 00:07:52your current password so
- 00:07:54say they put in crypto and crypto
- 00:07:57and then you tell them okay click ok and
- 00:07:59then you'll go through to facebook
- 00:08:00and now i want you to try and just log
- 00:08:02in so they go through to facebook we're
- 00:08:03no longer capturing this traffic this is
- 00:08:05just them being redirected
- 00:08:06they go and log in as normal and see uh
- 00:08:09my password is actually working i'm not
- 00:08:10too sure what that
- 00:08:11password box was about but
- 00:08:14on our kali system if we go back we'll
- 00:08:18see that
- 00:08:18a user attempted to authenticate with
- 00:08:21that login box with the credentials
- 00:08:22crypto
- 00:08:23crypto and then they were redirected to
- 00:08:25facebook.com so now we can take those
- 00:08:27credentials and we can go and log in as
- 00:08:28a user and then presumably change the
- 00:08:30password and stuff like that
- 00:08:32so that's a really really basic phishing
- 00:08:34example wouldn't
- 00:08:36really be used in practice typically
- 00:08:39what you would do there is you would
- 00:08:41actually create a website that looks
- 00:08:43like facebook so you can clone the
- 00:08:44website there's actually features to do
- 00:08:46that in a social engineering toolkit
- 00:08:48and then you can you know maybe you set
- 00:08:50up a domain with a very similar sound
- 00:08:52and domain name
- 00:08:53and you would do something similar so it
- 00:08:55actually looks like facebook the user
- 00:08:56puts in their
- 00:08:57facebook credentials and then what you
- 00:08:59could do rather than just redirecting to
- 00:09:01facebook where they'll have to log in
- 00:09:02again
- 00:09:03and that would again raise suspicion
- 00:09:06because they just think well i just
- 00:09:07i just logged in there was it asked me
- 00:09:08to log in again you could
- 00:09:10automate that so if you if you have a
- 00:09:13fake facebook page and the user puts in
- 00:09:15their username and password you have
- 00:09:16their username password which means you
- 00:09:17can redirect them to facebook.com
- 00:09:19but you can also log them in with the
- 00:09:21credentials that they just entered
- 00:09:23so the whole transition between the
- 00:09:25attack site and
- 00:09:26the actual benign site is is um
- 00:09:31invisible so that's a really basic
- 00:09:33example
- 00:09:34let's now have a look at creating a
- 00:09:36malicious pdf
- 00:09:38and see how we could actually get
- 00:09:39control of the user system
- 00:09:43so i'm going to search we'll search for
- 00:09:45name pdf
- 00:09:47and you can go by the ranks here as well
- 00:09:48you see we've got a couple of excellent
- 00:09:50ones one
- 00:09:50is the adobe pdf embedded exe
- 00:09:54social engineering so let's take that
- 00:09:56copy
- 00:09:58we'll use
- 00:10:02and then we want to show the options see
- 00:10:04what we need to enter in here
- 00:10:05by default the file name is evil.pdf so
- 00:10:08obviously that doesn't sound too benign
- 00:10:10so we'll change that we'll set file name
- 00:10:13to paslip.pdf
- 00:10:17you could also modify the launch message
- 00:10:20you could modify the template so
- 00:10:21in an actual example you could imagine
- 00:10:23that
- 00:10:25maybe you're doing a pen test against an
- 00:10:27organization and
- 00:10:28they normally give out their pay slips
- 00:10:31through these pdfs
- 00:10:32you could you could use an actual pay
- 00:10:34slip from that company as the template
- 00:10:36so that's what the victim will see
- 00:10:38whenever they open it up and then we
- 00:10:39also have this launch message so the
- 00:10:41launch message to view the encrypted
- 00:10:42content please take do not show this
- 00:10:44message again and press open
- 00:10:45so that might be changed to something
- 00:10:46else as well to say something like
- 00:10:49uh we're currently updating our pay slip
- 00:10:51generation system
- 00:10:53um if you get any false positives from
- 00:10:57your antivirus please ignore
- 00:10:59and um you know click to open
- 00:11:02something like that so let's
- 00:11:05see what else do we need to change here
- 00:11:06we've already got the payload set up
- 00:11:08it's set up to use windows meter
- 00:11:09reverse tcp which is good we'll leave
- 00:11:12that
- 00:11:14um here it's set to no handler will be
- 00:11:16created that's fine we'll create a
- 00:11:17handle
- 00:11:18ourselves no worries so let's try and
- 00:11:22run that let's create this payslip.pdf
- 00:11:25in our root directory so let's copy that
- 00:11:28let's copy it over to our
- 00:11:32desktop and
- 00:11:35now we need to set up the payload so
- 00:11:37we're gonna do use
- 00:11:39exploit multi handler
- 00:11:43and then it's set at the moment to
- 00:11:44generic shell so we need to say
- 00:11:46um set payload to windows
- 00:11:53windows meterpreter
- 00:11:56reverse tcp show options
- 00:12:00we also need to set our l host so set l
- 00:12:02host in this case hopefully i'll be able
- 00:12:03to just auto complete
- 00:12:05which i can and then we need to make
- 00:12:07sure it's on the right port as well we
- 00:12:08just left it on the default 444
- 00:12:10port so that should be fine so if we
- 00:12:12didn't run that
- 00:12:14then essentially the victim would open
- 00:12:15the pdf it would try to make a
- 00:12:16connection back to this ip address on
- 00:12:18this port
- 00:12:19to open up the meterpreter shell and
- 00:12:21this there's no listener here so it'll
- 00:12:23just do nothing
- 00:12:24really um so now that's running we need
- 00:12:28to get this pay slip over to the victim
- 00:12:30system so this might be a case of
- 00:12:32in an actual pen test it's probably
- 00:12:33going to be a case of sending this in an
- 00:12:35email
- 00:12:35and you would have an email looking like
- 00:12:37it's coming from hr with your pay slip
- 00:12:39and stuff like that
- 00:12:40in our example i don't have the email
- 00:12:42set up on these systems and
- 00:12:45i don't so we'll do another example
- 00:12:47which is kind of realistic as well let's
- 00:12:48do
- 00:12:49python not in this not for the pay slip
- 00:12:51maybe but for a social engineering
- 00:12:53attack so we'll do python
- 00:12:55m http
- 00:12:58dot server and i'm going to run this
- 00:13:01port 1337
- 00:13:02so now we're running our this directory
- 00:13:06as a web server so if we go back to
- 00:13:09what's the ip address again let me grab
- 00:13:11the ip
- 00:13:14so if we go back to our windows system
- 00:13:15now
- 00:13:17and we'll go http
- 00:13:21port 1337 pasteslip.pdf
- 00:13:26we get the payslip we'll save it and we
- 00:13:29get this message
- 00:13:30and we were told to view the encrypted
- 00:13:32content please take do not show this
- 00:13:33message again so we'll take that
- 00:13:35and then press open so we'll do that as
- 00:13:36well open okay
- 00:13:38where's my pay slip okay that's weird
- 00:13:42it's a blank page
- 00:13:43and then if we go back to our kelly or
- 00:13:46parrot or whatever linux system you're
- 00:13:48using here you'll see that we've
- 00:13:49actually got a materpa shell open
- 00:13:51so if we do get uid we'll see that we're
- 00:13:54logged in as admin on that windows
- 00:13:56machine
- 00:13:57so let's look at some of the things that
- 00:13:58we can do in meterpreter so
- 00:14:00if if we had just set that up to use
- 00:14:03just the generic
- 00:14:04shell then we can we can get shell here
- 00:14:07from interpreter just type shell hit
- 00:14:08enter
- 00:14:09and this is this would be us basically
- 00:14:10in the command prompt on that windows
- 00:14:12system right so we can run
- 00:14:13the directories we can do all of our
- 00:14:14usual stuff but it's not quite as
- 00:14:16powerful as having access to
- 00:14:19this materpa shell so interpreter we can
- 00:14:21just do ps here get a list of all the
- 00:14:23processors
- 00:14:24we can actually let's look at the help
- 00:14:25section look at help
- 00:14:27here's the different commands that we
- 00:14:28have available to us and if there are
- 00:14:29any commands that we want more
- 00:14:30information on
- 00:14:32so in here you can see we can get around
- 00:14:34the file system while using linux
- 00:14:35commands which is quite handy we can
- 00:14:37download files we can upload files
- 00:14:40we can
- 00:14:45um we can look at the network
- 00:14:48configurations
- 00:14:49we can kill processors
- 00:14:53clear the event log execute commands
- 00:14:56steal tokens reboot the system so
- 00:14:59there's a lot of cool stuff we can do
- 00:15:00here we can
- 00:15:02uh capture keystrokes we can get
- 00:15:05screenshot of the desktop
- 00:15:07we can start listening on the mic or
- 00:15:10recording the webcam we can play an
- 00:15:12audio file on the system just to maybe
- 00:15:13freak them out
- 00:15:15and get systems try and elevate the
- 00:15:16privileges so it'll run through
- 00:15:18a few different techniques to try and
- 00:15:19get system access
- 00:15:21we can do hash dump to dump the contents
- 00:15:23uh et cetera so if there's something
- 00:15:24here we want more information on let's
- 00:15:25do help
- 00:15:26dump oh there is no help for that okay
- 00:15:30um help get system
- 00:15:33okay i'm picking all things that don't
- 00:15:34have help available let's do
- 00:15:37[Music]
- 00:15:38all right we'll do help migrate
- 00:15:41and you'll see here then it'll give you
- 00:15:43the the syntax here so we need to
- 00:15:45migrate
- 00:15:46on whatever process id we want to
- 00:15:48migrate to so
- 00:15:50often maybe not in this case but
- 00:15:52normally if you run this
- 00:15:54process command we'll have we'll
- 00:15:56actually see a binary here with maybe
- 00:15:58some randomly
- 00:15:59named binary which is actually our
- 00:16:01malware
- 00:16:03so we might want to migrate to another
- 00:16:04process that's not likely to be killed
- 00:16:06by the antivirus or
- 00:16:08by the the user suspecting there's
- 00:16:09something going on with that
- 00:16:11so we might try to move to the explorer
- 00:16:13let's go
- 00:16:15migrate 3804
- 00:16:18oops that was not the right one
- 00:16:21non-existent process
- 00:16:22okay so we can try to migrate
- 00:16:25migration completely successfully so now
- 00:16:27we're in the so they actually have to
- 00:16:28kill ie explorer here
- 00:16:30in order to actually we should have done
- 00:16:32that to explore.exe i don't know what i
- 00:16:33was thinking there
- 00:16:34but um that's fine also you also want to
- 00:16:36consider what privileges
- 00:16:38the process has and what architecture is
- 00:16:42so sometimes you might get a shell and
- 00:16:43it's a
- 00:16:4432-bit shell but in order to get full
- 00:16:46contro
- 00:16:47in order to get full functionality we
- 00:16:49might want to move over to
- 00:16:50a 64-bit process
- 00:16:53you can see actually we have this
- 00:16:54template.pdf running here as well
- 00:16:57let's try and run something that's
- 00:16:58running as system because we don't have
- 00:17:00system access
- 00:17:03let's try and migrate to 852.
- 00:17:13okay it migrated successfully there okay
- 00:17:16that's fine and
- 00:17:17we can look at some post modules we can
- 00:17:19do run post
- 00:17:21um and you can just hit yes to get a
- 00:17:24list of all the different types commands
- 00:17:25here i'm gonna go run post windows
- 00:17:28gather credentials
- 00:17:32and see what we have available to us so
- 00:17:33you can see we can gather different
- 00:17:34types of credentials here
- 00:17:38uh we can go for credential correct
- 00:17:40collector
- 00:17:41let's try and run that and you'll see
- 00:17:42it's actually come back with all the
- 00:17:43hashes for the
- 00:17:45various um accounts as well we could
- 00:17:47have also done hash dump
- 00:17:50sometimes if we weren't a privilege user
- 00:17:51there
- 00:17:53then um there's a couple of things we
- 00:17:54could do we could try and run this let's
- 00:17:56do get uid again
- 00:17:58so we could try and run
- 00:18:02oh we're yeah we're already in a system
- 00:18:05there now okay we were admin i guess
- 00:18:06that was
- 00:18:07us uh swapping the process but
- 00:18:10if we weren't system we could do this
- 00:18:12get system command and it would try some
- 00:18:14different techniques to see if it can
- 00:18:15actually just escalate the privileges to
- 00:18:17system
- 00:18:19let's see what else we can do there if
- 00:18:20we do our
- 00:18:22um gather we can also
- 00:18:25check vm here as well to see if we're
- 00:18:27inside a virtual machine so
- 00:18:28the person we're trying to do social
- 00:18:30engineering attack on might actually be
- 00:18:33a malware analyst who's trying to
- 00:18:36analyze the malware or is trying to
- 00:18:38track down a threat actor or something
- 00:18:40like that
- 00:18:42so yeah there's a lot of different
- 00:18:43options in there let's
- 00:18:48let's move on to get persistence as well
- 00:18:51so let's do help
- 00:18:56persistence
- 00:19:00oh okay
- 00:19:04let's run
- 00:19:08persistence can i do help dash help
- 00:19:11there okay
- 00:19:13this is depreciated so you should try
- 00:19:14and use exploit local
- 00:19:16okay run
- 00:19:20exploit
- 00:19:23so we can run exploit windows local
- 00:19:25persistence from
- 00:19:27i guess we'd need to background the
- 00:19:28session first
- 00:19:30um but we can still use the old syntax
- 00:19:32the old syntax would have been to say
- 00:19:33run persistence and then we can say dash
- 00:19:36u
- 00:19:36dash p let's say one three three seven
- 00:19:40and this is actually gonna set up
- 00:19:41persistence so that every time the
- 00:19:43system reboots it's gonna try and
- 00:19:44connect back to our ip address
- 00:19:46on port one three three seven so as long
- 00:19:48as we have uh
- 00:19:49a listener opening open waiting for a
- 00:19:52connection from the meterpreter
- 00:19:54payload then we'll we'll get we'll get a
- 00:19:56shell every time the system reboots
- 00:20:00which is pretty cool so what else can we
- 00:20:02do let's let's grab that screenshot as
- 00:20:04well we had the
- 00:20:04screenshot option so if you grab a
- 00:20:07screenshot
- 00:20:07it saves it to our desktop let's
- 00:20:11display that
- 00:20:15and you can see that we've got the
- 00:20:16screenshot of the desktop we could run
- 00:20:19the key scan let's do key scan
- 00:20:23start and it's starting to sniff the
- 00:20:26keystrokes let's go back to
- 00:20:27our system here and
- 00:20:31we could go to
- 00:20:34facebook.com
- 00:20:37go and try and log in
- 00:20:42and that'll attempt to log us in if we
- 00:20:44go back to our
- 00:20:46system here and say key scan we don't
- 00:20:49have to stop it but i'm going to stop it
- 00:20:50here first
- 00:20:51let's dump it first key scan dump and it
- 00:20:53okay it didn't actually dump anything
- 00:21:06uh that's strange let me do that again
- 00:21:07key scan start let's go back
- 00:21:16crypto crypto
- 00:21:20that's strange the last time i tested
- 00:21:22that out it worked okay
- 00:21:29dump no all right that's weird last time
- 00:21:31this worked for me fine i'm not too sure
- 00:21:33what's going on there
- 00:21:34um that's fine though let's see what
- 00:21:36else we can do here we'll run help
- 00:21:40and let's actually take a look at some
- 00:21:41of the plug-in modules so
- 00:21:44if we go and
- 00:21:46[Music]
- 00:21:47uh use type use and then hit tab and
- 00:21:49you'll get a list of some
- 00:21:50plugins we can use here so we can can
- 00:21:52add in powershell python
- 00:21:54sniffer kiwi which is mimi cut so let's
- 00:21:57do use kiwi
- 00:21:58it loads the extension and then
- 00:22:03let's type help again type help and it
- 00:22:05now has the list of the
- 00:22:06kiwi commands so we can run creds all
- 00:22:11and it's gonna try oh we lost our shell
- 00:22:19system has been shut down windows must
- 00:22:21now restart because it
- 00:22:22unexpectedly okay that was not planned
- 00:22:29the shutdown was initiated by empty
- 00:22:31authority system
- 00:22:32okay maybe there might have been
- 00:22:35something to do with maybe one of us
- 00:22:37the processes i migrated to all right
- 00:22:39let me get this restarted
- 00:22:40and uh reconnected one second
- 00:22:44let's actually see here if we can set
- 00:22:46the uh
- 00:22:47payload let's show options set the l
- 00:22:50port to 1337
- 00:22:53and run oh we're already
- 00:22:56using that for uh http let's run that
- 00:22:59again
- 00:23:04i'm just wondering if whenever this
- 00:23:07boots up oh
- 00:23:08it's probably too late now it already
- 00:23:09booted up okay i was just
- 00:23:11because we set up that persistence last
- 00:23:12time but
- 00:23:14let's not worry about it we'll put that
- 00:23:16back to 444
- 00:23:18we'll run that again and we'll just go
- 00:23:19and open up the pdf document again
- 00:23:24open up pdf oh it's not a support file
- 00:23:27now
- 00:23:28interesting all right let's delete that
- 00:23:32let's go to our internet explorer again
- 00:23:37let's go back and do our python http
- 00:23:40server
- 00:23:43need to grab that ip
- 00:23:52http oh it's still saved great
- 00:23:57saver opener
- 00:24:00and let's go back we've got a shell back
- 00:24:03all right cool what were we doing we
- 00:24:05were
- 00:24:06using kiwi use kiwi
- 00:24:10help and then that's pretty cool wi-fi
- 00:24:14list
- 00:24:14password change we can change the
- 00:24:15passwords we can
- 00:24:19execute an arbitrary command
- 00:24:22use a kerberos ticket create golden
- 00:24:24kerberos ticket
- 00:24:26let's just run here creds all
- 00:24:30and we're not running a system so
- 00:24:32execution may fail so let's use
- 00:24:33get let's actually check our get get uid
- 00:24:36we're currently running as admin let's
- 00:24:38do
- 00:24:39in fact instead of let's do get system
- 00:24:41let's let me quickly
- 00:24:42show how we can check for local
- 00:24:44privilege escalation exploits
- 00:24:46currently admin but in some cases we
- 00:24:48might be an even lower privileged user
- 00:24:51we might just be
- 00:24:52trying to get up to admin at first
- 00:24:53before we try to get ri or system access
- 00:24:56so we can do here run post
- 00:24:59multi because we can do this on
- 00:25:00different architectures
- 00:25:02recon let's see what options we actually
- 00:25:04have here oh we don't have too much
- 00:25:06local exploit suggester and this is
- 00:25:08going to
- 00:25:10scan the system and see what kind of
- 00:25:12local privilege escalation exploits
- 00:25:14might work
- 00:25:14on the system so quite often these are
- 00:25:17quite generic and you know
- 00:25:18um in doing a pen test you might run
- 00:25:21through
- 00:25:22a series of them yes it's not too
- 00:25:24reliable
- 00:25:25basically so let's try and run through a
- 00:25:28couple of them here
- 00:25:29and see if see if we can escalate the
- 00:25:32privileges we'll also look into how we
- 00:25:34can manage sessions as well then
- 00:25:36because in order to test out one of
- 00:25:38these exploits
- 00:25:39we're gonna you can see there are 35
- 00:25:41exploits being tried
- 00:25:43services running could not be validated
- 00:25:45so you get um
- 00:25:49some of these uh these are some of the
- 00:25:52local exploits we can try so
- 00:25:54if we want to try one of these let's
- 00:25:57i'm going to copy this we need to
- 00:26:00background our session so we do
- 00:26:01background
- 00:26:04and then we can if we want to look at
- 00:26:08our sessions we can type sessions it'll
- 00:26:09show what sessions we have and then
- 00:26:11we can do help again help sessions and
- 00:26:13this will tell us how we can jump
- 00:26:15between sessions and background them and
- 00:26:16things like that
- 00:26:17so we've got a session let's say we want
- 00:26:20to use this local exploit now
- 00:26:23and it's defaulted to another payload
- 00:26:25we'll show options
- 00:26:26we need to set the session so set
- 00:26:29session
- 00:26:30in this case session two because we had
- 00:26:31that first session which got killed
- 00:26:33um for some reason we'll use a different
- 00:26:36port because we're already using port
- 00:26:38four four four four so i'll do
- 00:26:40four four four five and
- 00:26:44okay uh exploit target all right that
- 00:26:46all looks good so now if we do
- 00:26:50run
- 00:26:53and export is complete but no session
- 00:26:56was created
- 00:26:57so we might want to try another one of
- 00:26:59these payloads
- 00:27:01i'm trying to think what's a reliable
- 00:27:04one
- 00:27:06uh let's try this show options hopefully
- 00:27:10it's kept all of our options
- 00:27:11the same no all right so we need to set
- 00:27:13the session
- 00:27:15to session two and set the l port to
- 00:27:18four four four five we'll run this
- 00:27:22see it's trying to exploit it's
- 00:27:24injecting the payload
- 00:27:25it's done it's verified verify
- 00:27:27privileges manually or get uid
- 00:27:29to verify okay but it didn't actually
- 00:27:30create a session there so
- 00:27:34okay we'll try one more
- 00:27:37of those local exploits try
- 00:27:40proxy or reflection let's try this
- 00:27:46reflection
- 00:27:51it sets the default payload again all
- 00:27:53right set session
- 00:27:55two we'll set the l port four four four
- 00:27:58five
- 00:27:59and then run that
- 00:28:03waiting for hopefully privileged payload
- 00:28:05execution and there we go we've got a
- 00:28:06third
- 00:28:07meterpreter session let's do get uid and
- 00:28:10we're still an admin so that didn't
- 00:28:11actually help at all all right so i'm
- 00:28:12going to run get system if i just before
- 00:28:14i do that let me show we can now
- 00:28:16background that
- 00:28:17we can now have a look at our sessions
- 00:28:19and we have two different sessions
- 00:28:20running so let's go into
- 00:28:22sessions dash i three that's our new
- 00:28:26session
- 00:28:27and you can see that it's on a different
- 00:28:29port here and
- 00:28:32then we can let's just do get system
- 00:28:37and now if we do get uid we'll see that
- 00:28:39we are empty authority system
- 00:28:41which means if we are
- 00:28:45if we use kiwi
- 00:28:49and then check the help and now do creds
- 00:28:51all
- 00:28:52we'll see that oh it actually killed the
- 00:28:55session is this
- 00:28:57okay didn't crash that time
- 00:29:05okay let's see
- 00:29:09sessions we still have our session two
- 00:29:11sessions i2
- 00:29:14we're interacting with it now we are
- 00:29:17still an admin here so we'll do get
- 00:29:19system
- 00:29:22i'm also gonna maybe migrate the process
- 00:29:24let's migrate to
- 00:29:31[Music]
- 00:29:33why is explorer.exe not there okay
- 00:29:36i'm not gonna do that leave that we
- 00:29:39already have kiwi
- 00:29:40here help
- 00:29:43creds all and all right there we go we
- 00:29:47got
- 00:29:47we got our creds so let's come back the
- 00:29:49passwords we don't actually have any
- 00:29:50passwords they're all set to
- 00:29:52um just be blank and then we have our
- 00:29:55hashes and stuff there as well
- 00:29:56all right cool so that's a demonstration
- 00:29:58of using the mimikatz plugin let's see
- 00:30:00what other plugins we can check out as
- 00:30:01well
- 00:30:03so we can again we'll check the use
- 00:30:08option here let's have a look and see
- 00:30:10what we've actually got incognito
- 00:30:14let's do help again incognito so we can
- 00:30:16add users
- 00:30:17all right so we might want to add a new
- 00:30:18user what else can we do we can use
- 00:30:22powershell
- 00:30:26and help again and this will allow us to
- 00:30:29execute powershell commands it will
- 00:30:31allow us to import scripts so we could
- 00:30:33look at imports in powersplit maybe
- 00:30:35which has some really good
- 00:30:37uh privilege escalation techniques in
- 00:30:39that we can get a powershell
- 00:30:41shell if we want if we want to drop
- 00:30:44straight into a shell uh what else do we
- 00:30:47have there we can use
- 00:30:50sniffer help again and a sniffer so we
- 00:30:53can actually
- 00:30:54sniff interfaces there by look so we can
- 00:30:56set up let's do
- 00:30:58help sniffer
- 00:31:05start okay
- 00:31:10sniffer start dash h i'm just wondering
- 00:31:12what the parameters are okay so it takes
- 00:31:14an interface id
- 00:31:16a packet buffer so we can actually
- 00:31:17specify what interface on the system we
- 00:31:20want to capture the traffic from
- 00:31:22that's pretty cool we can start and stop
- 00:31:24that we can dump all the
- 00:31:25packet captures that been received so
- 00:31:26far into a all the packets have been
- 00:31:28received so far into a pickup file
- 00:31:31so that's pretty cool um
- 00:31:34use pe injector
- 00:31:38uh help again okay so we can inject
- 00:31:42shell code into a given executable
- 00:31:46so you can get an idea once you start to
- 00:31:48load in these plugins
- 00:31:49uh how powerful the interpret shell can
- 00:31:51be even with the default commands here
- 00:31:53we have a lot of things available so we
- 00:31:54can screen share we can watch a remote
- 00:31:56users desktop in real time
- 00:31:59we can
- 00:32:03basically do anything that the user
- 00:32:04could do on the system
- 00:32:06on and more and automate a lot of that
- 00:32:09so
- 00:32:10yeah um if you're if you're checking out
- 00:32:12my interpreter check out those plugins
- 00:32:14remember as well you can run a lot of
- 00:32:16different post modules
- 00:32:18see there's 231 possibilities here so
- 00:32:21you can go through and just play around
- 00:32:22with some of these we can enumerate the
- 00:32:24networks we can enumerate
- 00:32:26different services you can see here and
- 00:32:28enumerate snmp
- 00:32:30and enumerate mounts we can
- 00:32:34check usb device histories um
- 00:32:38a lot of different things and i think
- 00:32:41that'll do it for the meterpreter post
- 00:32:42exploitation demo
- 00:32:44what i'll do now is move on to testing
- 00:32:48out i'm going to close my social
- 00:32:54engineer toolkit which
- 00:32:57uh in the last couple of last couple of
- 00:32:59times i played around with that i wasn't
- 00:33:00able to get anything all working but
- 00:33:03we'll have a look at what the options
- 00:33:04are what should be available
- 00:33:06and maybe if you're watching this video
- 00:33:07and you have more experience with the
- 00:33:09social engineer toolkit than me you'll
- 00:33:11be able to tell me what's going wrong
- 00:33:12for me but
- 00:33:14it it used to work for me i remember
- 00:33:15doing demos with it you know a good few
- 00:33:16years ago and
- 00:33:17we were able to clone websites and use
- 00:33:20them for
- 00:33:21phishing and use them for use them as
- 00:33:24exploits so actually using browser
- 00:33:26exploits in cloned websites and getting
- 00:33:28a shell back
- 00:33:29but everything i've been trying uh
- 00:33:31recently
- 00:33:32isn't working so let's take a look at it
- 00:33:35now anyway
- 00:33:38so i'm going to go and check out the
- 00:33:40home page first let's see this tools by
- 00:33:42trusted sec
- 00:33:43so we'll just open up the home page and
- 00:33:45that'll give us
- 00:33:48a little bit of info about it and how to
- 00:33:51get it set up so we can get clone it
- 00:33:53here or we can go and view it on git as
- 00:33:55well
- 00:33:56and this is created by dave kennedy
- 00:33:58founder of trusted sex
- 00:33:59open source python driven tool aimed at
- 00:34:01penetration testing around social
- 00:34:03engineering
- 00:34:04been presented at black cat derby con
- 00:34:07defcon and schmuck on so
- 00:34:09you can go and check out those videos
- 00:34:12they're quite old now
- 00:34:13and i think a lot of the stuff that did
- 00:34:15work on there it's probably not gonna
- 00:34:16work now but
- 00:34:18you can see here in terms of the
- 00:34:20updating of this it seems pretty
- 00:34:23it doesn't really seem to be getting too
- 00:34:24much maintenance now
- 00:34:27so let's run through what we need to
- 00:34:28anyway to get this set up
- 00:34:32i'm going to clone this to the desktop
- 00:34:43and we'll go into the sc toolkit
- 00:34:47it wants us to install these so i'm
- 00:34:49going to set i'm going to use my
- 00:34:51python 3
- 00:34:55virtual environment and then do pip
- 00:34:58install our requirements
- 00:35:04can install whatever's needed
- 00:35:10and then we just need to run python
- 00:35:14setup
- 00:35:23all right so that's set up we'll do
- 00:35:25python setup.py
- 00:35:28it's right it's trying to install those
- 00:35:29anyway and it wants to set up a
- 00:35:31shortcut so it's going to need pseudo
- 00:35:32privileges i'll just give it that
- 00:35:35all right that's it done now it just
- 00:35:36says run sc toolkit to start the social
- 00:35:39engineering toolkit so let's do that
- 00:35:43oh we need to run it as root
- 00:35:46so we run that we get some terms and
- 00:35:49conditions here we need to use this
- 00:35:51purely for good and not evil
- 00:35:52so yep we're gonna do that sure
- 00:35:54[Music]
- 00:35:57all right so we boot this up we've got
- 00:35:59our different options available to us
- 00:36:01the main menu so we can do social
- 00:36:03engineering attacks penetration testing
- 00:36:04third party modules and then
- 00:36:06updates and config and stuff like that
- 00:36:08so let's start off with the social
- 00:36:09engineering attack
- 00:36:10section where we can do spear phishing
- 00:36:12website attacks
- 00:36:14infectious media generator create pale
- 00:36:16and listener okay
- 00:36:17so let's have a look first of all
- 00:36:21at the website attack vectors
- 00:36:26so these are basically using browser
- 00:36:28based exploits
- 00:36:29so you have different exploits available
- 00:36:32here
- 00:36:33the credential harvester i guess we'll
- 00:36:35just clone a yes we can clone a website
- 00:36:37that has a username password feel and
- 00:36:39harvest all the information let's try
- 00:36:40that first of all
- 00:36:42so this sounds a bit a bit like what we
- 00:36:44did with metasploit to begin with the
- 00:36:46basic http auth but a more realistic
- 00:36:48example where rather than a pop-up box
- 00:36:51a generic hp or pop-up box we're
- 00:36:53actually going to use the username and
- 00:36:54password field of the website so
- 00:36:57let's try it out we'll go to three and
- 00:36:59then we can import our own we can use
- 00:37:00some templates let's actually have a
- 00:37:02look at the templates
- 00:37:04does it okay it doesn't
- 00:37:09um i thought it was going to give a list
- 00:37:11of some different ones there okay let's
- 00:37:12go back into that it was
- 00:37:14spearfishing was it spearfishing no we
- 00:37:16were in website attack vectors
- 00:37:18you can hit ctrl and c to go back to the
- 00:37:19main menu so we're in
- 00:37:22oh wait we weren't in we were in social
- 00:37:25engineering attacks
- 00:37:27and then we were in website attack
- 00:37:30vectors right
- 00:37:31yeah okay there we go and we've got the
- 00:37:33credential harvester attack method
- 00:37:35so three i'm going to do the site cloner
- 00:37:38let's try and clone facebook here if we
- 00:37:39can
- 00:37:40ip address for the post back so this is
- 00:37:43going to be our ip address
- 00:37:47okay so now we want to use the http it
- 00:37:50also supports https okay so let's do
- 00:37:52face hps www.facebook.com
- 00:37:59it's gonna try and clone this
- 00:38:01login.facebook.com okay best way to use
- 00:38:04this attack is if the username and
- 00:38:05password form fields are available
- 00:38:07regardless it will capture all posts on
- 00:38:09a website okay
- 00:38:11and credential harvester is running on
- 00:38:13port 80 information will be displayed to
- 00:38:15you as it arrives below
- 00:38:17okay has it given us
- 00:38:21a url
- 00:38:32i'm not sure am i supposed to be waiting
- 00:38:33for something there or
- 00:38:36are they waiting for me okay it went
- 00:38:37straight to facebook cool right that's
- 00:38:39that's good all right we'll type in here
- 00:38:41crypto
- 00:38:43and crypto in
- 00:38:47say yes and it's actually redirected us
- 00:38:50to facebook there you'll see
- 00:38:51but if we go back to our
- 00:38:56if we go back to our social engineer
- 00:38:59toolkit here we'll see that the post
- 00:39:00request
- 00:39:01actually went through here and we can
- 00:39:03see the email
- 00:39:04we actually entered in the username
- 00:39:05crypto and the password crypto as well
- 00:39:08and we were able to harvest those
- 00:39:10credentials
- 00:39:11all right so that worked actually pretty
- 00:39:12well it worked with a https site as well
- 00:39:16and it also redirected
- 00:39:17to facebook afterwards what would be
- 00:39:19cool is if it also took the username and
- 00:39:21password and logged into facebook so
- 00:39:23this was all kind of seamless
- 00:39:25but um that seems to be working quite
- 00:39:28well in general anyway all right cool
- 00:39:29let's see what else we can do
- 00:39:36let's check out we could have a look
- 00:39:37multi-attack method or
- 00:39:39meta split browser exploit method we
- 00:39:42could create a java applet as well i'm
- 00:39:43going to do
- 00:39:44let's do the multi attack and
- 00:39:48site cloner we'll do the same again
- 00:39:51we'll say no we're not using port
- 00:39:53forwarding
- 00:39:55all right that's our local host and now
- 00:39:57the website we want to clone we'll just
- 00:39:58do the same again
- 00:40:00picking on facebook today
- 00:40:04and then what attacks we want to use
- 00:40:07i'm gonna use them all tactical nuke or
- 00:40:10hail mary
- 00:40:13and let's see what happens here it's
- 00:40:15going to clone the website it's
- 00:40:16injecting iframes
- 00:40:18for the msf attack what payload do you
- 00:40:20want to generate i'm going to leave
- 00:40:22these at the default
- 00:40:23that will be memory injection port 443
- 00:40:25that's fine by me
- 00:40:28materpr reverse tcp oh it's set to https
- 00:40:31at the moment i'm going to set that to
- 00:40:32just set that to one just in case
- 00:40:36and
- 00:40:38we'll just set that to two use the
- 00:40:39built-in here's the list of exploits
- 00:40:41that we can attempt to use so
- 00:40:42i am running a vulnerable windows xp
- 00:40:44system with an old version of internet
- 00:40:46explorer on it and some old plugins but
- 00:40:49um i do remember trying this before and
- 00:40:51not having any luck
- 00:40:53so let's try it i'm going to do i'm
- 00:40:56going to use the
- 00:40:5746 just because let's just throw
- 00:40:59everything at it and see if something
- 00:41:01works
- 00:41:04the site has been moved web server is
- 00:41:06now listening it's now going to load up
- 00:41:08our net split framework
- 00:41:10and it's running this as a background
- 00:41:13job starting exploit modules do we need
- 00:41:15to hit run here it didn't give
- 00:41:19i was kind of expecting to see
- 00:41:22i was running a background job okay
- 00:41:24running the background okay so let's go
- 00:41:28did it give us a url to go to
- 00:41:32uh here we go starting starting to
- 00:41:34produce some urls now starting these
- 00:41:36servers so
- 00:41:39each of these exploits is on a different
- 00:41:41service and
- 00:41:42on a different uri sorry so we could we
- 00:41:44could test those out one by one
- 00:41:47but i believe if we let this complete
- 00:41:48it's just going to give us a url
- 00:41:50right here local ip
- 00:41:53so this is the url if we were to send
- 00:41:55this an email to the victim or somehow
- 00:41:57get them to click on this
- 00:41:59it's going to essentially run through
- 00:42:00each of these exploits and try to get us
- 00:42:02a reverse shell
- 00:42:04so i'm going to go over to our
- 00:42:08victims machine here we'll enter that
- 00:42:10url
- 00:42:11let's just agree to anything it asks us
- 00:42:13and let's also just check as well can we
- 00:42:22if we try to view the source here
- 00:42:28oh
- 00:42:34you can see it's tried to throw these
- 00:42:36exploits there you can see
- 00:42:38there's our ip address of the windows
- 00:42:39system 1.134
- 00:42:41it's tried to throw all of these
- 00:42:42exploits in
- 00:42:44and it doesn't look like it has
- 00:42:49achieved a shell
- 00:42:54let's go back and just try that again
- 00:42:58it does try to load up there but not
- 00:43:00able to view the source that's
- 00:43:01interesting
- 00:43:11okay
- 00:43:15um because i loaded that again it looks
- 00:43:17like it's just trying to run through all
- 00:43:18of those same exploits again it's
- 00:43:20responding with these 14 exploits
- 00:43:23all the java ones there by the looks of
- 00:43:25it
- 00:43:27but you can see that it's not actually
- 00:43:28[Music]
- 00:43:30spawned as a shell yet
- 00:43:36so presumably this is just down to my uh
- 00:43:39the the honeypot system i have set up
- 00:43:41there
- 00:43:41i did have a better windows 7 system
- 00:43:43with a lot of
- 00:43:44which are set up for exploit kit
- 00:43:47tracking which had a lot of
- 00:43:48anti-analysis stuff
- 00:43:50um done to it to make sure that it
- 00:43:52wasn't detectable as a vm
- 00:43:54and it had a lot of vulnerable stuff on
- 00:43:56it but i
- 00:43:57i can't find my working version of it's
- 00:44:01been a couple of years so
- 00:44:03all right doesn't look like it's going
- 00:44:04to get us a shell here anyway
- 00:44:08we didn't help that i left the page let
- 00:44:10me just one more time let's run that
- 00:44:15see it's loading we're going to see any
- 00:44:16redirections occur in here
- 00:44:20[Music]
- 00:44:21you can see it's throwing all the
- 00:44:22exploits here anyway
- 00:44:30in an actual explicit attack this is
- 00:44:32kind of you know
- 00:44:33a crude example of an actual exploit kit
- 00:44:36attack where
- 00:44:37maybe you would visit a legitimate
- 00:44:38website which has either been
- 00:44:40hacked or has a malicious advertisement
- 00:44:43or something on it
- 00:44:44and maybe in the advertisement will be a
- 00:44:45little piece of code which redirects to
- 00:44:47another site which redirects to another
- 00:44:49site which redirects to another site
- 00:44:51and you go through this chain of
- 00:44:52redirections without actually maybe
- 00:44:54seeing anything happen
- 00:44:55in the browser you'll go through this
- 00:44:56chain of redirections and then at some
- 00:44:58point you'll get to a landing page
- 00:45:00where the um the landing page will
- 00:45:03basically
- 00:45:04scan your system to see what operating
- 00:45:06system what
- 00:45:07browser what plug-ins you're using and
- 00:45:09it'll look to see what co
- 00:45:10what corresponding exploits it has what
- 00:45:12exploits it has it matched those
- 00:45:14vulnerable software versions if it finds
- 00:45:17some it'll try and cue them and it'll
- 00:45:18run each one until it gets uh
- 00:45:20until it until the exploit is successful
- 00:45:22and then maybe it'll drop some
- 00:45:23ransomware or a key logger or something
- 00:45:25like that
- 00:45:26if it fails or if the system is not
- 00:45:28vulnerable it'll normally just do
- 00:45:30nothing or redirect to a benign page so
- 00:45:32that
- 00:45:33tracking can be quite difficult it also
- 00:45:36exploit kits
- 00:45:37typically have quite good evasion and
- 00:45:38anti-analysis techniques so if they're
- 00:45:40running inside a vm
- 00:45:42they'll normally not even try to run any
- 00:45:44exploits
- 00:45:45and um they'll only
- 00:45:48even if even if you've got a good honey
- 00:45:50pot and you go to visit the
- 00:45:51the exploit kit it'll only try to
- 00:45:54exploit once
- 00:45:54so if you if the exploit fails or if you
- 00:45:57want to test it again you'll actually
- 00:45:58have to get a new ip address
- 00:46:00in order to in order to test it again so
- 00:46:04they can be quite tricky to to analyze
- 00:46:06in that way
- 00:46:07but yeah it doesn't look like it's
- 00:46:08getting us a shell here anyway let's
- 00:46:10exit this
- 00:46:14let's go back and see what else we can
- 00:46:15do
- 00:46:17so go back to the main menu we have some
- 00:46:20powershell attack vectors here let's
- 00:46:22have a quick look at that powershell
- 00:46:24so we can just um use these to generate
- 00:46:26the shells
- 00:46:30um all right go back we have a qr
- 00:46:34code generator so so generate create a
- 00:46:37qr code for whatever url you want so we
- 00:46:39could create a malicious url
- 00:46:41like in those examples you just did and
- 00:46:43then use that to generate a qr code and
- 00:46:45then send that to the victim that's
- 00:46:46pretty cool
- 00:46:48we have the infectious media generator
- 00:46:51let's have a look
- 00:46:54so this will create a
- 00:46:57we can create a malicious usb or cd or
- 00:46:59dvd with an auto run file in it so that
- 00:47:01if the victim
- 00:47:02enters that so if you're doing a pen
- 00:47:04test you maybe drop some usb sticks
- 00:47:05around
- 00:47:06a company's um car park or something
- 00:47:09like that
- 00:47:10employees go and pick them up and see
- 00:47:12who does this belong to we'll plug it in
- 00:47:13and find out see if there's some
- 00:47:14identifiable information on it
- 00:47:16as soon as they plug it in if auto run
- 00:47:17is enabled it's just going to execute
- 00:47:19straight away the
- 00:47:21malicious payload that we've put in
- 00:47:23that's pretty cool
- 00:47:24we have wireless access point attack
- 00:47:26vectors as well let's go back to that
- 00:47:31so we can set up a malicious access
- 00:47:33point by looks of it okay it's going to
- 00:47:34use these modules
- 00:47:36these applications to do that
- 00:47:39yeah okay that's pretty cool as well i
- 00:47:42don't actually have wireless on this
- 00:47:43system so we're not gonna be able to do
- 00:47:44that you can see that this was not
- 00:47:45detected either
- 00:47:47let's go back and
- 00:47:50the last thing we'll look at then is the
- 00:47:52email
- 00:47:53as i said before i didn't set up i
- 00:47:55haven't set up like an email server i
- 00:47:57haven't set this up to send emails back
- 00:47:58and forward
- 00:48:00and i i know you were able to do this
- 00:48:02with gmail before you could just enter
- 00:48:04the gmail
- 00:48:05email address and password but i'm not
- 00:48:06too sure how well it works now but we
- 00:48:08can create
- 00:48:09we can form a mass mail attack we can
- 00:48:11create a file format payload we can
- 00:48:12create a social engineering template
- 00:48:14let's get an idea
- 00:48:16enter name as an author all right so we
- 00:48:20can yeah we're basically creating a
- 00:48:21phishing email here
- 00:48:22i'm going to just go back there we have
- 00:48:24the mass mail attack so we can go in
- 00:48:26here and again
- 00:48:27we've got payloads what do we want to
- 00:48:28send it out to let's just go with the
- 00:48:30defaults
- 00:48:31default default
- 00:48:34oh okay maybe it created it there i'm
- 00:48:36not too sure
- 00:48:37um but uh yeah i think that'll do it for
- 00:48:40the video i hope
- 00:48:43um i hope this has been
- 00:48:46useful um the social engineering toolkit
- 00:48:49demo went a bit better than i expected i
- 00:48:50didn't expect
- 00:48:51really whenever i was trying to run this
- 00:48:53previously i was getting a lot of errors
- 00:48:54about
- 00:48:55strings and bytes which looked like they
- 00:48:57were to do with python 3.
- 00:48:58um but we didn't see any errors there
- 00:49:00which is which is good i guess
- 00:49:03um but yeah i hope you've enjoyed this
- 00:49:05video if you have any questions comments
- 00:49:07if you have any
- 00:49:08cool techniques or tools that i should
- 00:49:10check out in future videos
- 00:49:12do let me know let me know down below
- 00:49:14thanks
- social engineering
- phishing
- cybersecurity
- Metasploit
- credential harvesting
- Social Engineer Toolkit
- security awareness
- malicious PDF
- user education
- exploit techniques