O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking with SET

Let's cover some of the previously discussed attack techniques in the following scenarios.

Creating a Payload and Listener

The Creating a Payload and Listener vector is the most basic attack to advance with. In this attack vector, we will generate a malicious executable payload that, when made to run at the target system, will get the attacker complete access of the victim's system. So, let's proceed with the creation of a malicious payload:

Creating a Payload and Listener

From the main menu of SET, we will select the fourth option, Create a Payload and Listener. After this step, SET will list different payloads for the selection of the appropriate one to use, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required