Jump to content

Social Engineering Tool Kit


Skorpinok Rover

Recommended Posts

Hello,

I ran a social engineering tool kit(BT5) & chose sphere -phishing attack- Perform a Mass Email Attack-payloads-Windows Reverse TCP Shell,E-Mail Attack Single Email Address-Do you want to setup a listener yes or no: yes ...., after i sent this mail to victim with payload & when victim opens pdf file there is no response in msf exploit(handler)> why this happens? the victim lives in another country & he's been informed about this test. i have a shared internet connection.

does this work only with LAN? plz suggest me if you have any idea.

regards.

Link to comment
Share on other sites

Hello,

I ran a social engineering tool kit(BT5) & chose sphere -phishing attack- Perform a Mass Email Attack-payloads-Windows Reverse TCP Shell,E-Mail Attack Single Email Address-Do you want to setup a listener yes or no: yes ...., after i sent this mail to victim with payload & when victim opens pdf file there is no response in msf exploit(handler)> why this happens? the victim lives in another country & he's been informed about this test. i have a shared internet connection.

does this work only with LAN? plz suggest me if you have any idea.

regards.

Best to ask that question on the backtrack forums as they would be able to help you better, but there are many things that can go wrong, IE Firewalls isp blocking connections misconfiguration in bt5 etc... or you could go check out the SET site. sorry i couldn't help more.

Link to comment
Share on other sites

Best to ask that question on the backtrack forums as they would be able to help you better, but there are many things that can go wrong, IE Firewalls isp blocking connections misconfiguration in bt5 etc... or you could go check out the SET site. sorry i couldn't help more.

I agree.

Best way is to set up a VM machine purely to be the 'victim' of your attack on a local network.(I have seperate wifi connection, only for testing)

Then scale from there. A lot of the attacks in SET are targeted at machines with older OS's.

Learn to play with Metasploit, starting with Armitage to see different attacks and how to write your own (easy).

Then, you can perform tests over the internet as your confidence grows.

Link to comment
Share on other sites

I don't know if you have done this part, but since its a reverse connection, you will need to enable port forwarding on your router or the connection will fail to establish.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...