View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0005626 | Kali Linux | Kali Package Bug | public | 2019-08-09 05:37 | 2019-08-15 14:07 |
Reporter | CyBroNic | Assigned To | rhertzog | ||
Priority | urgent | Severity | minor | Reproducibility | always |
Status | closed | Resolution | no change required | ||
Product Version | 2019.2 | ||||
Summary | 0005626: SET bug | ||||
Description | Dear all [] Cloning the website: https://login.facebook.com/login.php [*] Apache appears to be running, moving files into Apache's home Web Server Launched. Welcome to the SET Web Attack. [--] Tested on Windows, Linux, and OSX [--]
when i hit enter it goes to the this page. utilizes iframe replacements to make the highlighted URL link to appear legitimate however when clicked a window pops up then is replaced with the malicious link. You can edit the link replacement settings in the set_config if its too slow/fast. The Multi-Attack method will add a combination of attacks through the web attack menu. For example you can utilize the Java Applet, Metasploit Browser, Credential Harvester/Tabnabbing all at once to see which is successful. The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser. 1) Java Applet Attack Method 99) Return to Main Menu set:webattack> and i do not what is a problem for this.can you help me please? | ||||