creating a backdoor with SET - Ethical Hacking Techniques course
To Create a backdoor with Social Engineering Toolkit (SET)
Install kali linux either in partition or virtual box or in live mode
Investigate on the various categories of tools as follows:
Open terminal and try execute some kali linux commands
Social Engineering attacks are the various cons used by the hackers to trick people into providing sensitive data to the attackers. The command sudo setoolkit in the prompt gives menu with set prompt: The command sudo setoolkit in the prompt gives menu with set prompt. Select menu1 for Social Engineering Attacks: It displays the following menu and select 2 for Website Attack Vectors:
The website Attack Vectors displays the following menu. In this menu3 for Credential Harvester Attack Method is selected: The Credential Harvester Attack Method displays the following menu. In this menu1 for Web Templates is selected: It shows the following screen in which the ip address of the attacker need to be given which is the default value: It shows the following screen in which the option Google can be selected: SET starts my Kali Linux Webserver on port 80, with the fake Google account login page. The setup is done:
The Social Engineering Toolkit (SET) is used to create backdoor is examined successfully