Ataques de ingeniería social: engañar a las personas.
setoolkit -> ataques de ingeniería social en Linux.
Introducción a la Escalada de Privilegios
Comienza a escalar privilegios en Linux, Windows y aplicaciones web
Qué es la escalada de privilegios
Estrategias de escalada de privilegios
Creación y delegación de privilegios en sistemas operativos
Escalada de privilegios en dispositivos móviles
Escalada de Privilegios Horizontal
Keylogging
SQL Injection para Login Bypass
Password Cracking
Broken Access Control
Password Guessing
Ingeniería social
Escalada de Privilegios Vertical
Sudo Security Bypass
Linpeas
Cracking de llaves SSH privadas con John the Ripper
Escalada de Privilegios con Binarios
Winpeas
Despedida
Continúa Aprendiendo de Hacking de Aplicaciones Web
You don't have access to this class
Keep learning! Join and start boosting your career
Social engineering is a criminal technique that has become a favorite of many attackers. This type of attack seeks to manipulate people into revealing confidential information, allowing attackers to gain unauthorized access to networks or systems. One of the most commonly used tools in these attacks is the Social Engineering Toolkit (SE Toolkit), available on systems such as Kali Linux. This tool offers a variety of social engineering-oriented attacks, from spear phishing to more sophisticated attacks such as Credential Harvester.
The SE Toolkit, short for Social Engineering Toolkit, is a toolkit designed to perform social engineering attacks. When started in Kali Linux with the sudo se toolkit
command, the user is presented with several options for carrying out different types of attacks. One of the most common is option 2: Web-Based Attack Vectors.
The Credential Harvester attack mimics a legitimate web page to trick victims into entering their credentials. The steps to follow are:
Start the SE Toolkit: Open the terminal and run sudo se toolkit
.
Select the attack type: Choose option 2 for web-based attack vectors.
Configure the attack:
Clone a website: Indicate the website you want to clone, such as "linkedin.com", and the SE Toolkit will make an exact replica of this page.
Verify the copy: From a browser, access localhost
or the configured IP to check the clone of the official page and its functionality.
Experienced attackers use Pony Code to manipulate URLs to make them look legitimate. For example, a domain may look like "apple.com" but include special encoding characters that are difficult to detect. This tactic highlights the importance of being extremely cautious when verifying URLs before entering sensitive information.
For attacks that require external access without configuring port forwarding, services such as ngrok are popular options. By executing commands such as ngrok http 80
, the user obtains a public domain that redirects to the local domain, simplifying the process by not requiring manual port opening.
Organizations should train their employees as the first line of defense against social engineering attacks. Conducting simulations and training can reveal vulnerabilities and prevent a real hacker from compromising the company's security. In addition, attacks do not only affect companies; individuals can also be targets, as happened in the case of Xcaret in Mexico, where a fake hotel reservation caused unexpected financial losses.
Stimulating awareness and continuing education is vital to combat these threats. IT security is not only a matter of technologies, but also of people; keep learning and protecting yourself from these risks!
Contributions 4
Questions 0
Ataques de ingeniería social: engañar a las personas.
setoolkit -> ataques de ingeniería social en Linux.
Maquinas virtuales con sistema Linux
********************************************
git clone https://github.com/trustedsec/social-engineer-toolkit/ setoolkit/
cd setoolkit
pip3 install -r requirements.txt
python setup.py
ngrok. tunneling dominios puertos IPs locales
Punycode, crear dominios con caracteres especial.
Windows Subsystem Linux /WSL2 Kali Linux
Comando de SEToolkit
sudo apt install set -y
Want to see more contributions, questions and answers from the community?