Was 2
Was 2
Procedure:
1. Turn on the intercept and search for the website which needs to be captured.
2. Add the captured request to the Target scope.
3. Go to Target section and search for the captured request in the item field
and send the target item to the repeater.
4. The request in the repeater section will be modified and send to the Decoder.
5. Before sending the response to the browser, Copy the URL below and
paste into a browser that to configured to use Burp as its proxy.
6. Open the browser to see the modified response. An alert message is
popup while opening the website.
Result:
Thus the above vulnerability is successfully executed and verified.
Ex No : Attack the website using Social Engineering method
Date :
Aim:
Step 2: As of now you are on a desktop so here you have to create a new directory named
SEToolkit using the following command.
>>>mkdir SEToolkit
Step 3: Now as you are in the Desktop directory however you have created a SEToolkit
directory so move to SEToolkit directory using the following command
>>>cd SEToolkit
Step 4: Now you are in SEToolkit directory here you have to clone SEToolkit from
GitHub so you can use it.
Step 5: Social Engineering Toolkit has been downloaded in your directory now you have to
move to the internal directory of the social engineering toolkit using the following command.
>>>cd setoolkit
Step 6: Congratulations you have finally downloaded the social engineering toolkit in
your directory SEToolkit. Now it’s time to install requirements using the following
command.
`pip3 install -r requirements.txt
Step 7: All the requirements have been downloaded in your setoolkit. Now it’s time to install
the requirements that you have downloaded
>>>python setup.py
Step 8: Finally all the processes of installation have been completed now it’s time to run the
social engineering toolkit .to run the SEToolkit type following command.
>>>Setoolkit
Step 9: At this step, setoolkit will ask you (y) or (n). Type y and your social engineering
toolkit will start running.
Step 10: Now your setoolkit has been downloaded into your system now it’s time to use
it .now you have to choose an option from the following
options .here we are choosing option 2 Website
Attack Vector
Option: 2
Step 11: Now we are about to set up a phishing page so here we will choose option 3 that is
the credential harvester attack method.
Option: 3
Step 12: Now since we are creating a Phishing page so here we will choose option 1 that is
web templates.
Option: 1
Step 13: Create a google phishing page so choose option 2 for that then a phishing page
will be generated on your localhost.
RESULT:
Thus, the experiment to attach the website using social engineering method is
executed and verified successfully.