setoolkit工具使用总结
我同学今天说了一下你会盗号不,这个问题真的不好回答,现在大部分盗号都是社工钓鱼,没有那种直接用什么方法黑入到管理用户密码的地方毕竟是方法的不能这样做对吧!
项目地址https://github.com/trustedsec/social-engineer-toolkit
安装
1 2 3 4
| git clone https://github.com/trustedsec/social-engineer-toolkit/ setoolkit/ cd setoolkit pip3 install -r requirements.txt python setup.py
|
使用
启动命令setoolkit


这个软件都是英文的我看不懂,下面是我好长时间的翻译,用的翻译软件翻译的,有的可能不准见谅
1 2 3 4 5 6 7 8 9 10
| 1) Social-Engineering Attacks 2) Penetration Testing (Fast-Track) 3) Third Party Modules 4) Update the Social-Engineer Toolkit 5) Update SET configuration 6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit
set>
|
社会工程攻击
1 2 3 4 5 6 7 8 9 10 11 12 13 14
| 1) Spear-Phishing Attack Vectors 2) Website Attack Vectors 3) Infectious Media Generator 4) Create a Payload and Listener 5) Mass Mailer Attack 6) Arduino-Based Attack Vector 7) Wireless Access Point Attack Vector 8) QRCode Generator Attack Vector 9) Powershell Attack Vectors 10) Third Party Modules
99) Return back to the main menu.
set>
|
鱼叉式网络钓鱼攻击向量
1 2 3 4 5 6 7
| 1) Perform a Mass Email Attack 2) Create a FileFormat Payload 3) Create a Social-Engineering Template
99) Return to Main Menu
set:phishing>
|
进行大规模电子邮件攻击
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
| 1) SET Custom Written DLL Hijacking Attack Vector (RAR, ZIP) 2) SET Custom Written Document UNC LM SMB Capture Attack 3) MS15-100 Microsoft Windows Media Center MCL Vulnerability 4) MS14-017 Microsoft Word RTF Object Confusion (2014-04-01) 5) Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow 6) Microsoft Word RTF pFragments Stack Buffer Overflow (MS10-087) 7) Adobe Flash Player "Button" Remote Code Execution 8) Adobe CoolType SING Table "uniqueName" Overflow 9) Adobe Flash Player "newfunction" Invalid Pointer Use 10) Adobe Collab.collectEmailInfo Buffer Overflow 11) Adobe Collab.getIcon Buffer Overflow 12) Adobe JBIG2Decode Memory Corruption Exploit 13) Adobe PDF Embedded EXE Social Engineering 14) Adobe util.printf() Buffer Overflow 15) Custom EXE to VBA (sent via RAR) (RAR required) 16) Adobe U3D CLODProgressiveMeshDeclaration Array Overrun 17) Adobe PDF Embedded EXE Social Engineering (NOJS) 18) Foxit PDF Reader v4.1.1 Title Stack Buffer Overflow 19) Apple QuickTime PICT PnSize Buffer Overflow 20) Nuance PDF Reader v6.0 Launch Stack Buffer Overflow 21) Adobe Reader u3D Memory Corruption Vulnerability 22) MSCOMCTL ActiveX Buffer Overflow (ms12-027)
set:payloads>
|
网页攻击向量
1 2 3 4 5 6 7 8 9 10 11
| 1) Java Applet Attack Method 2) Metasploit Browser Exploit Method 3) Credential Harvester Attack Method 4) Tabnabbing Attack Method 5) Web Jacking Attack Method 6) Multi-Attack Web Method 7) HTA Attack Method
99) Return to Main Menu set:webattack>
|
JavaApplet攻击方法
1 2 3 4 5 6 7
| 1) Web Templates 2) Site Cloner 3) Custom Import
99) Return to Webattack Menu
set:webattack>
|
1 2 3 4 5 6 7
| 1) Web Templates 2) Site Cloner 3) Custom Import
99) Return to Webattack Menu
set:webattack>
|
网站攻击向量模块下面都是一样的
传染性媒体生成器
1 2 3 4 5 6
| 1) File-Format Exploits 2) Standard Metasploit Executable
99) Return to Main Menu
set:infectious>
|
创建有效载荷和侦听器
没有什么参数
群发邮件攻击
1 2 3 4 5 6
| 1. E-Mail Attack Single Email Address 2. E-Mail Attack Mass Mailer
99. Return to main menu. set:mailer>
|
基于Arduino的攻击向量
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
| 1) Powershell HTTP GET MSF Payload 2) WSCRIPT HTTP GET MSF Payload 3) Powershell based Reverse Shell Payload 4) Internet Explorer/FireFox Beef Jack Payload 5) Go to malicious java site and accept applet Payload 6) Gnome wget Download Payload 7) Binary 2 Teensy Attack (Deploy MSF payloads) 8) SDCard 2 Teensy Attack (Deploy Any EXE) 9) SDCard 2 Teensy Attack (Deploy on OSX) 10) X10 Arduino Sniffer PDE and Libraries 11) X10 Arduino Jammer PDE and Libraries 12) Powershell Direct ShellCode Teensy Attack 13) Peensy Multi Attack Dip Switch + SDCard Attack 14) HID Msbuild compile to memory Shellcode Attack
99) Return to Main Menu
set:arduino>
|
无线接入点攻击向量
没有什么参数
QRCode生成器攻击向量
没有什么参数
Powershell攻击向量
1 2 3 4 5 6 7 8
| 1) Powershell Alphanumeric Shellcode Injector 2) Powershell Reverse Shell 3) Powershell Bind Shell 4) Powershell Dump SAM Database
99) Return to Main Menu
set:powershell>
|
第三方模块
1 2 3 4 5 6 7
| 1. RATTE (Remote Administration Tool Tommy Edition) Create Payload only. Read the readme/RATTE-Readme.txt first 2. RATTE Java Applet Attack (Remote Administration Tool Tommy Edition) - Read the readme/RATTE_README.txt first 3. Google Analytics Attack by @ZonkSec
99. Return to the previous menu
set:modules>
|
渗透测试(快速跟踪)
1 2 3 4 5 6 7 8 9 10
| 1) Microsoft SQL Bruter 2) Custom Exploits 3) SCCM Attack Vector 4) Dell DRAC/Chassis Default Checker 5) RID_ENUM - User Enumeration Attack 6) PSEXEC Powershell Injection
99) Return to Main Menu
set:fasttrack>
|
Microsoft SQL Bruter
1 2 3 4 5 6
| 1) Scan and Attack MSSQL 2) Connect directly to MSSQL
99) Return to Main Menu
set:fasttrack:mssql>
|
自定义漏洞
没有什么参数
SCCM攻击向量
没有什么参数
Dell DRAC /机箱默认检查器
没有什么参数
RID_ENUM-用户枚举攻击
没有什么参数
PSEXEC Powershell注入
没有什么参数
第三方模块
1 2 3 4 5 6 7
| 1. RATTE (Remote Administration Tool Tommy Edition) Create Payload only. Read the readme/RATTE-Readme.txt first 2. RATTE Java Applet Attack (Remote Administration Tool Tommy Edition) - Read the readme/RATTE_README.txt first 3. Google Analytics Attack by @ZonkSec
99. Return to the previous menu
set:modules>
|
实战
用他自带web钓鱼盗号









登录网页克隆钓鱼盗号







然后我们输入自己的IP就可以访问这个钓鱼用的登录网址了



生成URL二维码




