SET browser exploit lab

In this lab, we will demonstrate how to use SET to deliver a payload through a victim's web browser using Autopwn. For this lab, we are using Kali Linux running in VMware as our attacking machine. Our victim will be a Windows 7 machine running in VMware. We will provide screenshots for each step:

  1. First, we need to open SET by opening a Terminal and typing setoolkit. On the first options menu screen type 1 for Social-Engineering Attacks. The following screenshot displays the first options menu you will see:
  1. On the next menu options screen, we will type 2 for Website AttackVectors. The following screenshot displays ...

Get Applied Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.