1 00:00:00,510 --> 00:00:06,720 Hi and welcome back in this lecture, you learn how to steal the login information using the social 2 00:00:06,720 --> 00:00:08,040 engineering toolkit. 3 00:00:09,060 --> 00:00:16,230 So first of all, make sure DNS mask host APD and Apache Web Server is running on your system. 4 00:00:17,010 --> 00:00:22,860 And then you need to have the Captive Portal web page, which will be used to appear when clients try 5 00:00:22,860 --> 00:00:24,660 to connect to the access point. 6 00:00:25,830 --> 00:00:31,230 And in my case, I have the captive portal files here in the basic portal folder. 7 00:00:31,950 --> 00:00:35,100 So if I use L.S., you can see the files. 8 00:00:36,000 --> 00:00:44,130 OK, now let's start the social engineering toolkit by typing CIT Toolkit and here select social engineering 9 00:00:44,130 --> 00:00:46,830 attacks by typing number one. 10 00:00:47,910 --> 00:00:50,700 Now it will show you another set of options. 11 00:00:51,420 --> 00:00:59,340 So select second option website attack vectors and use the Credential Harvester attack method. 12 00:01:00,480 --> 00:01:02,910 And here I would select custom import. 13 00:01:03,330 --> 00:01:06,630 This option allows you to import your own website. 14 00:01:07,720 --> 00:01:13,990 Now, in this step, it would ask you for your IP address, so if you are using this attack with an 15 00:01:13,990 --> 00:01:20,590 access point made sure you are using the IP address form your wireless interface, which you can easily 16 00:01:20,590 --> 00:01:27,670 find by typing ifconfig and here own DoubleLine Zero is the IP address. 17 00:01:28,780 --> 00:01:37,240 So I will type one and two one six say that 1.1 and no, I need to enter the pad for the captive portal 18 00:01:37,240 --> 00:01:39,070 files or website. 19 00:01:40,090 --> 00:01:45,580 So in my case, is rude slash basic portal and press enter. 20 00:01:46,270 --> 00:01:50,500 And here I will use the second option to copy the entire folder. 21 00:01:51,220 --> 00:01:57,130 And for the URL, I will use the IP address for the login page and press enter. 22 00:01:58,180 --> 00:02:00,820 And now the credential hardware store is running. 23 00:02:02,050 --> 00:02:06,370 So let's just do Windows Machine and connect to the access point. 24 00:02:07,630 --> 00:02:14,950 And I'm going to type test for the user name and set tool kit for the password and click the login button. 25 00:02:16,090 --> 00:02:23,230 OK, now let's go back to the machine and you can see the login credentials from the target. 26 00:02:24,100 --> 00:02:27,670 So thanks for watching and I'll see you next time.