How To Hack – Use SET on Kali to Create Backdoor EXE Meterpreter Session with Persistence


The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community.
SETThe Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best-seller in security books for many months since its release, “Metasploit: The Penetrations Testers Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni. SET is included in the latest version of the most popular Linux distribution focused on security, Kali Linux.

Instructions:

Setting Up EXE

  1. Go to: Applications >> Kali Linux >> Exploitation Tools >> Social Engineering Toolkit >> se-toolkit
  2. Choose 1) Social-Engineering Attacks
  3. Choose 4) Create a Payload and Listener
  4. Put in your Local IP
  5. Choose 2) Windows Reverse_TCP Meterpreter
  6. Choose 16) Backdoored Executable (BEST)
  7. Leave Port at 443
  8. Start Listener: Yes
  9. Then my phone rang

Sending Executable

  1. Go to: Places >> Home Folder
  2. Click to usr >> share >> set
  3. Right-click msf.exe and go to Properties >> Permissions Tab
  4. Click check mark – Allow executing file as program, then rename file.
  5. Transfer to target computer with USB, email, or some other ingenious method
  6. When Target executes EXE, meterpreter session will be opened.
  7. From here, you can type help. I will leave the rest up to you.
Bookmark the permalink.

8 Responses to How To Hack – Use SET on Kali to Create Backdoor EXE Meterpreter Session with Persistence

  1. Kali says:

    Is it possible to reverse engineer the ip in the exec?
    Also how would you get around that if it is possible to reverse engineer the ip?

    • So if I understand you correctly, you want to know how to find the ip if your own machine is infected with such an EXE?
      What I do on my PCs is run TCPView every once in a while. Become familiar with the servers and IPs your computer is normally communicating with.
      Then keep tabs on if certain EXEs tend to be transferring many bytes. A decent metasploit user will migrate their process to an innocuous EXE…
      So, if you see notepad.exe transferring bytes to an ip on TCPView, you know something is probably up.
      BTW – TCPView will tell you the remote IP, if that was your question.

  2. Steven says:

    Can anyone tell me where I can find msf.exe . I know for sure that I do not have it in my files. or on my desk .

    Can I get this file from somehwere?

    Thanks

  3. Injector says:

    Hello dear
    i saw all of your tutorial in youtube but here im in trouble
    actually when im going to Social Engineering Toolkit after choose Windows Reverse_TCP Meterpreter with number 2 i have 4 number to choose i dont know why ! but there’s no any best ! can u help me in this one ?
    so I’ve put it here to show you
    1) shikata_ga_nai
    2) No Encoding
    3) Multi-Encoder
    4) Backdoored Executable

  4. led says:

    When I send the exe file it will tells that is a virus, so it will not attached via email, its error. what will i do?

    • Pritamd47 says:

      go to windows defender/microsoft security essentials and turn off the real-time protection

      Then test on your OWN computer.

  5. cheese says:

    Hi,

    I followed all the steps but I can’t seem to find the msf.exe file in the set folder…

Leave a Reply

Your email address will not be published. Required fields are marked *