This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
social_engineering_toolkit [2019/09/28 13:35] acm |
social_engineering_toolkit [2019/09/28 18:37] (current) acm |
||
---|---|---|---|
Line 7: | Line 7: | ||
=== Credential Harvesting === | === Credential Harvesting === | ||
- | This type of attack works by cloning the login page of a site and tricking the target into entering their login information into the site. The information is then sent back to you and the target is logged into the actual site. | + | This type of attack works by cloning the login page of a site and tricking the target into entering their login information into the site. The information is then sent back to you and the target is logged into the actual site. The site cloning works the same as it does with the java applet attack. |
+ | |||
+ | === Metasploit Browser === | ||
+ | The Metasploit browser attack works much the same way as the last two, tricking the target into visiting what they believe to be a legitimate website, but is actually a website that will attempt to run various exploits from the Metasploit tool against the target' | ||
+ | |||
+ | === References === | ||
+ | *https:// | ||
+ | *https:// | ||
+ | *https:// |