Book Image

Mastering Metasploit

By : Nipun Jaswal
Book Image

Mastering Metasploit

By: Nipun Jaswal

Overview of this book

Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Providing additional features and further readings


SET is comprised of too many attacks, and covering them all here will push us beyond the scope of the book. However, some more information about attacks with SET can be found at http://www.social-engineer.org/framework/se-tools/computer-based/social-engineer-toolkit-set/.

SET can also be made to run against wireless vectors. More information on wireless attacks with SET can be found at http://resources.infosecinstitute.com/raising-a-rogue-access-point/.

The SET web interface

SET also provides a user-friendly web interface that is run by typing in the following command:

After the interface gets bound to http://127.0.0.1 on port 4444, we can simply browse to this address via a web browser and graphically initiate attack vectors. This is shown in the following screenshot:

Automating SET attacks

Attacks in SET can be automated too, like we did earlier for Metasploit. Here, instead of using resource scripts, a normal text file is enough to automate...