web-dev-qa-db-ja.com

Kali Linux内でSETを使用する難しさ

Webサイトの攻撃ベクトルを設定するとき、Kaliがローカルに情報を受け取るためにポートを指定するオプションを提供していないことに気づきました。さらに、別のコンピューターで外部IPアドレスを開こうとすると、「このページを読み込めません」というエラーが表示されるため、作成したリスナーにアクセスできません。私のSET構成は次のとおりです。

set:webattack>3

The first method will allow SET to import a list of pre-defined web
 applications that it can utilize within the attack.

 The second method will completely clone a website of your choosing
 and allow you to utilize the attack vectors within the completely
 same web application you were attempting to clone.

 The third method allows you to import your own website, note that you
 should only have an index.html when using the import website
 functionality.

   1) Web Templates
   2) Site Cloner
   3) Custom Import

  99) Return to Webattack Menu

set:webattack>1
[-] Credential harvester will allow you to utilize the clone capabilities     within SET
[-] to harvest credentials or parameters from a website as well as place them into a report
[-] This option is used for what IP the server will POST to.
[-] If you're using an external IP, use your external IP for this
set:webattack> IP address for the POST back in     Harvester/Tabnabbing:73.196.210.4

  1. Java Required
  2. Google
  3. Facebook
  4. Twitter
  5. Yahoo

set:webattack> Select a template:2

[*] Cloning the website: http://www.google.com
[*] This could take a little bit...

The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
[*] Apache is set to ON - everything will be placed in your web root directory of Apache.
[*] Files will be written out to the root directory of Apache.
[*] ALL files are within your Apache directory since you specified it to ON.
Apache webserver is set to ON. Copying over PHP file to the website.
Please note that all output from the harvester will be found under     Apache_dir/harvester_date.txt
Feel free to customize post.php in the /var/www/html directory
[*] All files have been copied to /var/www/html
[*] SET is now listening for incoming credentials. You can control-c out of this and completely exit SET at anytime and still keep the attack going.
[*] All files are located under the Apache web root directory: /var/www/html
[*] All fields captures will be displayed below.
[Credential Harvester is now listening below...]

ご覧のとおり、「Credential Harvester is running on Port 80」というメッセージは表示されず、jsutが作成したハーベスターを使用できません。どんな助けでもありがたいです!

1
mlz7

Apache2サービスが実行されていることを確認してください

service Apache2 start

仮想マシンでSETを使用すると、問題が発生する場合があることに注意してください。

そして最後に、SETの新しいバージョンでは、端末自体でユーザー名とパスワードを見つけることができず、代わりにwwwディレクトリでそれらを見つけると思います

enter image description here

enter image description here

3
HSN