View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0000516 | Kali Linux | Kali Package Bug | public | 2013-08-17 06:52 | 2025-07-14 09:38 |
| Reporter | humayun-shakeel | Assigned To | dookie | ||
| Priority | normal | Severity | minor | Reproducibility | always |
| Status | closed | Resolution | no change required | ||
| Platform | x86 | OS | Kali | OS Version | 1.0 |
| Product Version | 1.0.4 | ||||
| Summary | 0000516: se-toolkit 5.3.2 credential harvester bug | ||||
| Description |
[---] The Social-Engineer Toolkit (SET) [---]
The Social-Engineer Toolkit is a product of TrustedSec.
Select from the menu: 1) Social-Engineering Attacks 99) Exit the Social-Engineer Toolkit set> 1
[---] The Social-Engineer Toolkit (SET) [---]
The Social-Engineer Toolkit is a product of TrustedSec.
Select from the menu: 1) Spear-Phishing Attack Vectors 99) Return back to the main menu. set> 2 The Web Attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim. The Java Applet Attack method will spoof a Java Certificate and deliver a metasploit based payload. Uses a customized java applet created by Thomas Werth to deliver the payload. The Metasploit Browser Exploit method will utilize select Metasploit browser exploits through an iframe and deliver a Metasploit payload. The Credential Harvester method will utilize web cloning of a web- site that has a username and password field and harvest all the information posted to the website. The TabNabbing method will wait for a user to move to a different tab, then refresh the page to something different. The Web-Jacking Attack method was introduced by white_sheep, Emgent and the Back|Track team. This method utilizes iframe replacements to make the highlighted URL link to appear legitimate however when clicked a window pops up then is replaced with the malicious link. You can edit the link replacement settings in the set_config if its too slow/fast. The Multi-Attack method will add a combination of attacks through the web attack menu. For example you can utilize the Java Applet, Metasploit Browser, Credential Harvester/Tabnabbing, and the Man Left in the Middle attack all at once to see which is successful. 1) Java Applet Attack Method 99) Return to Main Menu set:webattack>3 The first method will allow SET to import a list of pre-defined web The second method will completely clone a website of your choosing The third method allows you to import your own website, note that you 1) Web Templates 99) Return to Webattack Menu set:webattack>2 [] Cloning the website: https://login.facebook.com/login.php The best way to use this attack is if username and password form
| ||||
| Attached Files | |||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2013-08-17 06:52 | humayun-shakeel | New Issue | |
| 2013-08-17 06:52 | humayun-shakeel | File Added: se-toolkit 5.3.2 credential harvester bug | |
| 2013-08-19 12:53 | dookie | Note Added: 0000764 | |
| 2013-08-19 12:53 | dookie | Status | new => closed |
| 2013-08-19 12:53 | dookie | Assigned To | => dookie |
| 2013-08-19 12:53 | dookie | Resolution | open => no change required |
| 2015-08-18 12:46 | g0tmi1k | Priority | immediate => normal |
| 2025-07-14 09:38 | g0tmi1k | Severity | crash => minor |