How to do it...

We have already seen how to use HTA in a previous recipe, but SET takes it to a new level.

  1. After selecting the HTA Attack Method in SET, we can clone a site through which we will deliver our payload, creating a more credible pretext for why the user should open the HTA application:
  1. Like the mass email attack, SET will launch Metasploit using a resource script and start the Generic Payload Handler for us:
  1. Now, when the victim browses to our malicious site they will be prompted to open the HTA application; since it comes ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.