O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

We will build our infections media:

  1. From the Applications menu, select Social Engineering Tools | SET Social Engineering Toolkit. You will be presented with the following screen:
Initial setookit screen
  1. Select the top option 1) Social-Engineering Attacks.
  2. Select 3) Infectious media generator.
  3. Select 2) Standard Metasploit Executable.
  4. Let's use 2) Windows Reverse_TCP Meterpreter.
  5. For the LHOST, use the IP address of your Kali machine 192.168.56.10.
  6. Enter the port for callback 8123.
  7. It will then generate the payload. Go ahead and start a listener right now:
Payload generation output
  1. From here, we have an autorun option ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required