mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-11-23 21:13:05 +00:00
Added a script for me to use
This commit is contained in:
parent
bf0ac67474
commit
1cef0b285c
5 changed files with 22 additions and 11 deletions
|
@ -8,4 +8,4 @@ DISCLAIMER: This is only for testing purposes and can only be used where strict
|
||||||
|
|
||||||
Any modifications, changes, or alterations to this application is acceptable, however, any public releases utilizing this code must be approved by TrustedSec. Check the LICENSE file for more information.
|
Any modifications, changes, or alterations to this application is acceptable, however, any public releases utilizing this code must be approved by TrustedSec. Check the LICENSE file for more information.
|
||||||
|
|
||||||
The Social-Engineer Toolkit is an open-source penetration testing framework designed for Social-Engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of the time. SET is a product of TrustedSec, LLC - An Information Security consulting firm located in Cleveland Ohio.
|
The Social-Engineer Toolkit is an open-source penetration testing framework designed for Social-Engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of the time. SET is a product of TrustedSec, LLC - An Information Security consulting firm located in Cleveland, Ohio.
|
||||||
|
|
|
@ -170,7 +170,7 @@ TERMINAL=SOLO
|
||||||
### Digital signature stealing method must have the pefile Python modules loaded
|
### Digital signature stealing method must have the pefile Python modules loaded
|
||||||
### from http://code.google.com/p/pefile/. Be sure to install this before turning
|
### from http://code.google.com/p/pefile/. Be sure to install this before turning
|
||||||
### this flag on!!! This flag gives much better AV detection
|
### this flag on!!! This flag gives much better AV detection
|
||||||
DIGITAL_SIGNATURE_STEAL=ON
|
DIGITAL_SIGNATURE_STEAL=OFF
|
||||||
#
|
#
|
||||||
### These two options will turn the upx packer to on and automatically attempt
|
### These two options will turn the upx packer to on and automatically attempt
|
||||||
### to pack the executable which may evade anti-virus a little better.
|
### to pack the executable which may evade anti-virus a little better.
|
||||||
|
@ -220,13 +220,10 @@ POWERSHELL_INJECT_PAYLOAD_X86=windows/meterpreter/reverse_tcp
|
||||||
### NOTE THAT POWERSHELL INJECTION MUST BE SET TO ON.
|
### NOTE THAT POWERSHELL INJECTION MUST BE SET TO ON.
|
||||||
POWERSHELL_MULTI_INJECTION=ON
|
POWERSHELL_MULTI_INJECTION=ON
|
||||||
#
|
#
|
||||||
### THIS WILL CONFIGURE WHICH PORTS TO USE FOR POWERSHELL INJECTION
|
|
||||||
POWERSHELL_MULTI_PORTS=443,21,22,25
|
|
||||||
#
|
|
||||||
### THIS WILL SPECIFY WHICH PORTS TO ITERATE THROUGH TO DO THE POWERSHELL INJECTION. NOTE IF YOU ARE USING SET
|
### THIS WILL SPECIFY WHICH PORTS TO ITERATE THROUGH TO DO THE POWERSHELL INJECTION. NOTE IF YOU ARE USING SET
|
||||||
### PORT 80 IS USED BY THE WEB SERVER. THE REST OF PORTS SHOULD BE OPEN. CONSIDER IF YOU WANT TO USE PORT 80 TO
|
### PORT 80 IS USED BY THE WEB SERVER. THE REST OF PORTS SHOULD BE OPEN. CONSIDER IF YOU WANT TO USE PORT 80 TO
|
||||||
### PLACE THE LISTENER ON A DIFFERENT SERVER.
|
### PLACE THE LISTENER ON A DIFFERENT SERVER.
|
||||||
POWERSHELL_MULTI_PORTS=21,22,23,25,53,3389,443,8080
|
POWERSHELL_MULTI_PORTS=22,53,443
|
||||||
#
|
#
|
||||||
### This will display the output of the powershell injection attack so you can see what is being placed on the
|
### This will display the output of the powershell injection attack so you can see what is being placed on the
|
||||||
### system.
|
### system.
|
||||||
|
|
|
@ -9,10 +9,10 @@
|
||||||
# SET updated using the 'Update SET Configuration' menu item in #
|
# SET updated using the 'Update SET Configuration' menu item in #
|
||||||
# the main menu. This file will be updated with the new settings. #
|
# the main menu. This file will be updated with the new settings. #
|
||||||
# #
|
# #
|
||||||
# set_config.py generated: 2013-03-14 10:18:10.495402 #
|
# set_config.py generated: 2013-03-15 11:13:36.564372 #
|
||||||
# #
|
# #
|
||||||
#######################################################################
|
#######################################################################
|
||||||
CONFIG_DATE='2013-03-14 10:18:10.495402'
|
CONFIG_DATE='2013-03-15 11:13:36.564372'
|
||||||
METASPLOIT_PATH="/opt/metasploit/apps/pro/msf3"
|
METASPLOIT_PATH="/opt/metasploit/apps/pro/msf3"
|
||||||
METASPLOIT_DATABASE="postgresql"
|
METASPLOIT_DATABASE="postgresql"
|
||||||
ENCOUNT=4
|
ENCOUNT=4
|
||||||
|
@ -50,7 +50,7 @@ COMMAND_CENTER_INTERFACE="127.0.0.1"
|
||||||
COMMAND_CENTER_PORT=44444
|
COMMAND_CENTER_PORT=44444
|
||||||
SET_INTERACTIVE_SHELL=True
|
SET_INTERACTIVE_SHELL=True
|
||||||
TERMINAL="SOLO"
|
TERMINAL="SOLO"
|
||||||
DIGITAL_SIGNATURE_STEAL=True
|
DIGITAL_SIGNATURE_STEAL=False
|
||||||
UPX_ENCODE=True
|
UPX_ENCODE=True
|
||||||
UPX_PATH="/usr/bin/upx"
|
UPX_PATH="/usr/bin/upx"
|
||||||
AUTO_REDIRECT=True
|
AUTO_REDIRECT=True
|
||||||
|
@ -65,8 +65,7 @@ POWERSHELL_INJECTION=True
|
||||||
POWERSHELL_INJECT_PAYLOAD_X64="windows/x64/meterpreter/reverse_tcp"
|
POWERSHELL_INJECT_PAYLOAD_X64="windows/x64/meterpreter/reverse_tcp"
|
||||||
POWERSHELL_INJECT_PAYLOAD_X86="windows/meterpreter/reverse_tcp"
|
POWERSHELL_INJECT_PAYLOAD_X86="windows/meterpreter/reverse_tcp"
|
||||||
POWERSHELL_MULTI_INJECTION="True"
|
POWERSHELL_MULTI_INJECTION="True"
|
||||||
POWERSHELL_MULTI_PORTS="443,21,22,25"
|
POWERSHELL_MULTI_PORTS="22,53,443"
|
||||||
POWERSHELL_MULTI_PORTS="21,22,23,25,53,3389,443,8080"
|
|
||||||
POWERSHELL_VERBOSE=False
|
POWERSHELL_VERBOSE=False
|
||||||
WEB_PROFILER=False
|
WEB_PROFILER=False
|
||||||
DEPLOY_OSX_LINUX_PAYLOADS="False"
|
DEPLOY_OSX_LINUX_PAYLOADS="False"
|
||||||
|
|
|
@ -25,6 +25,10 @@ version 4.7
|
||||||
* rewrote the java jar file to handle multiple powershell alphanumeric shellcode points injected into applet.
|
* rewrote the java jar file to handle multiple powershell alphanumeric shellcode points injected into applet.
|
||||||
* added signed and unsigned jar files to the java applet attack vector
|
* added signed and unsigned jar files to the java applet attack vector
|
||||||
* removed create_payload.py from saving files in src/html and instead in the proper folders src/program_junk
|
* removed create_payload.py from saving files in src/html and instead in the proper folders src/program_junk
|
||||||
|
* fixed a payload duplication issue in create_payload.py, will now check to see if port is there
|
||||||
|
* removed a pefile check unless backdoored executable is in use
|
||||||
|
* turned digital signature stealing from a pefile to off in the set_config file
|
||||||
|
* converted all src/html/msf.exe to src/program_junk/ and fixed an issue where the applet would not load properly
|
||||||
|
|
||||||
~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~
|
||||||
version 4.4.5
|
version 4.4.5
|
||||||
|
|
11
src/webattack/java_applet/unsigned.py
Normal file
11
src/webattack/java_applet/unsigned.py
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
#
|
||||||
|
# simple jar file
|
||||||
|
#
|
||||||
|
import subprocess
|
||||||
|
import os
|
||||||
|
subprocess.Popen("rm Java_Update.jar", stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
|
||||||
|
subprocess.Popen("rm Java.class", stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
|
||||||
|
subprocess.Popen("javac Java.java", shell=True).wait()
|
||||||
|
subprocess.Popen("jar cvf Java_Update.jar Java.class", shell=True).wait()
|
||||||
|
print "[*] Jar file exported as Java_Update.jar"
|
Loading…
Reference in a new issue