Anonymous USB attack

During this attack, we are going to craft an executable that will open a reverse connection between the target machine and our testing machine. To deliver this executable, we are going to place it on a USB device with a name that will pique the curiosity of the target. Once the USB is configured, leaving it in a public area in the target organization should produce the results we need.

For more information, visit the SET section at http://www.social-engineer.org/framework/general-discussion/.

The steps to perform our USB attack are as follows:

  1. From the main options list, we choose 1) Social Engineering Attacks:

  1. To craft ...

Get Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.