<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to SET-en</title><link>https://sourceforge.net/p/maguey/wiki/SET-en/</link><description>Recent changes to SET-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/SET-en/feed" rel="self"/><language>en</language><lastBuildDate>Thu, 12 Dec 2013 17:07:23 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/SET-en/feed" rel="self" type="application/rss+xml"/><item><title>SET-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/SET-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -34,30 +34,21 @@
 &lt;p&gt;
 Obtain confidential information from users.
 &lt;ul&gt;
+&lt;li&gt;Provides several attack scenarios in order to obtain confidential information for the users such as: Java Applet Attack Method, Metasploit Browser Exploit Method, Credential Harvester Attack Method, Tabnabbing Attack Method, Man Left in the Mtiddle Attack Method, Web Jacking Attack Method, etc.
+&lt;/li&gt;&lt;/ul&gt;
+&lt;/p&gt;
+
+&lt;p&gt;
+Obtain access to the users systems.
+&lt;ul&gt;
 &lt;li&gt;Provides the functionalities to gain access to the users system in order to compromise the systems such as executing system commands, opening a back door, etc.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

-&lt;p&gt;
-Obtain access to the users systems.
-&lt;ul&gt;
-&lt;li&gt;Retrieves the following information 
-&lt;ul&gt;
-&lt;li&gt;Database user name.
-&lt;/li&gt;&lt;li&gt;Database name.
-&lt;/li&gt;&lt;li&gt;Database version.
-&lt;/li&gt;&lt;li&gt;Database tables.
-&lt;/li&gt;&lt;li&gt;Database tables schema: keys, fields names and type.
-&lt;/li&gt;&lt;/ul&gt;
-&lt;/li&gt;&lt;/ul&gt;
-&lt;/p&gt;
-

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
-Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
-&lt;ul&gt;
-&lt;li&gt;Merge report from the exploitation and data mining in TXT and XML format.
+Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;X&lt;/span&gt;
 &lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;

 &lt;!-- **********************  USAGE ********************** --&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 17:07:23 -0000</pubDate><guid>https://sourceforge.net8becc77870a4ec91fba9f9a75560d88cf05139cb</guid></item><item><title>SET-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/SET-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -63,15 +63,13 @@
 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Realizar un ataque de clonación de un sitio Web para obtener credenciales de acceso de un usuario. &lt;/b&gt;El siguiente comando inicia el menú principal de la herramienta.
+&lt;b&gt;Perform a mirror of a trusted web site in order to steal user’s credentials. &lt;/b&gt;The following command initiates the tool main menu.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 ./set
 &lt;/div&gt;&lt;br /&gt;

-La herramienta lanza el menú principal, a partir de aquí todo consiste en seleccionar una opción e introducir datos que se soliciten, como son: ip local, URL de sitio a clonar, mensajes informativos, por mencionar algunos.
-
-Elegir la opción número uno Social-Engineering Attacks.
+The main menu displays the tool configuration options; select the first option “Social-Engineering Attacks”.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 Select from the menu:
@@ -88,7 +86,7 @@

 &lt;/div&gt;&lt;br /&gt;

-A continuación elegir la opción número dos Website Attack Vectors.
+Next, select the second option “Website Attack Vectors”.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -110,7 +108,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Ahora para recolectar credenciales de un usuario elegir el vector de ataque Credential Harvester Attack Method, opción número tres.
+Next, select the third option “Credential Harvester Attack Method” in order to harvest the user credentials from a web application.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -127,7 +125,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Elija el modo Site Cloner, opción número dos, esta opción permite indicar cualquier página Web que al usuario le resulte familiar, con el fin de abusar de la confianza que tenga el usuario en el sitio clonado.
+Select the second option “Site Cloner” to provide the trusted web site URL address in order to obtain a local mirror of the site.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -139,7 +137,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Proporcionar la IP de la maquina donde la herramienta regresará las credenciales que logre capturar.
+Provide the IP address of the machine that will harvest the user credentials.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -152,7 +150,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Proporcionar la URL de la página que se clonará para recolectar las credenciales del usuario víctima.
+Provide the trusted web site URL address to be cloned.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -161,7 +159,7 @@

 &lt;/div&gt;&lt;br /&gt;

-La herramienta comienza el proceso para clonación de la página Web que se indicó en el paso anterior.
+The tool will then begin with the cloning process.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -174,7 +172,7 @@

 &lt;/div&gt;&lt;br /&gt;

-En caso de que el servicio de Apache este corriendo, la herramienta solicita confirmación para detenerlo. Detiene el servicio Apache, pública la página Web que clono en el puerto 80 y queda en espera de que una usuario accese a a sito fraudulento.
+Note:  In case an Apache web server is currently running in the harvesting machine on the port 80 the tool will request permission to stop it so the cloned site can be published.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -188,9 +186,7 @@

 &lt;/div&gt;&lt;br /&gt;

-La URL de explotación se conforma de la siguiente manera: http:// IP_PROPORCIONADA/index.html
-
-Cuando la herramienta identifica una conexión a la página que fue clonada, muestra un aviso en la consola. 
+The published “cloned” site will then be available on the URL address: http:// IP_address/index.html. When the process is completed the tool will display a message.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -198,7 +194,7 @@

 &lt;/div&gt;&lt;br /&gt;

-El usuario que ingresa a la página, llena el formulario de acceso con sus credenciales y presiona el botón de para ingresar. Entonces la herramienta captura el request HTTP y lo muestra en consola. 
+When the user access the “cloned” site and provides their user credentials the tool will capture the petition and display the information on the terminal.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

@@ -220,7 +216,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Finalmente detenemos la página Web clonada con la combinación de teclas Ctrl + C.
+Finally, the tool can be stopped by pressing the key combination “Ctrl+C”.

 &lt;!-- **********************  RESOURCES ********************** --&gt;

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 17:03:04 -0000</pubDate><guid>https://sourceforge.net5986458288dc577baf627b64eee0946cae1c3a96</guid></item><item><title>SET-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/SET-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -14,35 +14,32 @@
 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Security application developed in PHP that helps identify and exploit in an automated way SQL Injection vulnerabilities.
+SET (Social Engineer Toolkit), tool that helps exploiting vulnerabilities in web applications based on the "human factor". It uses social engineering techniques to achieve successful attacks.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Automated detection of parameters vulnerable to SQL Injection.
-&lt;/li&gt;&lt;li&gt;Automated and configurable data base data mining.
-&lt;/li&gt;&lt;li&gt;Automated shell upload in order to comprise the application server.
+&lt;/li&gt;&lt;li&gt;Obtain confidential information from users.
+&lt;/li&gt;&lt;li&gt;Obtain access to the users systems.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a MySQL database backend.
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS).

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Automated detection of parameters vulnerable to SQL Injection.
-&lt;ul&gt;
-&lt;li&gt;Automated parameter tampering for both URL parameters (GET) and form data (POST).
-&lt;/li&gt;&lt;li&gt;Generates a configurable site-map of the application in order to identify all its resources: pages and parameters for further testing.
-&lt;/li&gt;&lt;li&gt;Provides the name of the parameter and URL from the detected vulnerabilities.
+Obtain confidential information from users.
+&lt;ul&gt;
+&lt;li&gt;Provides the functionalities to gain access to the users system in order to compromise the systems such as executing system commands, opening a back door, etc.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;

 &lt;p&gt;
-Automated and configurable data base data mining.
+Obtain access to the users systems.
 &lt;ul&gt;
 &lt;li&gt;Retrieves the following information 
 &lt;ul&gt;
&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 16:59:04 -0000</pubDate><guid>https://sourceforge.net1968d8abf063cb2c3b15d540e7df734d2dcaf514</guid></item><item><title>SET-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/SET-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/SET-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;SET&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;Primary: Exploitation.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Security application developed in PHP that helps identify and exploit in an automated way SQL Injection vulnerabilities.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Automated detection of parameters vulnerable to SQL Injection.
&lt;/li&gt;&lt;li&gt;Automated and configurable data base data mining.
&lt;/li&gt;&lt;li&gt;Automated shell upload in order to comprise the application server.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a MySQL database backend.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Automated detection of parameters vulnerable to SQL Injection.
&lt;ul&gt;
&lt;li&gt;Automated parameter tampering for both URL parameters (GET) and form data (POST).
&lt;/li&gt;&lt;li&gt;Generates a configurable site-map of the application in order to identify all its resources: pages and parameters for further testing.
&lt;/li&gt;&lt;li&gt;Provides the name of the parameter and URL from the detected vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
Automated and configurable data base data mining.
&lt;ul&gt;
&lt;li&gt;Retrieves the following information 
&lt;ul&gt;
&lt;li&gt;Database user name.
&lt;/li&gt;&lt;li&gt;Database name.
&lt;/li&gt;&lt;li&gt;Database version.
&lt;/li&gt;&lt;li&gt;Database tables.
&lt;/li&gt;&lt;li&gt;Database tables schema: keys, fields names and type.
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;Merge report from the exploitation and data mining in TXT and XML format.
&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Realizar un ataque de clonación de un sitio Web para obtener credenciales de acceso de un usuario. &lt;/b&gt;El siguiente comando inicia el menú principal de la herramienta.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
./set
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta lanza el menú principal, a partir de aquí todo consiste en seleccionar una opción e introducir datos que se soliciten, como son: ip local, URL de sitio a clonar, mensajes informativos, por mencionar algunos.&lt;/p&gt;
&lt;p&gt;Elegir la opción número uno Social-Engineering Attacks.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Select from the menu:

   1) Social-Engineering Attacks&lt;br /&gt;
   2) Fast-Track Penetration Testing&lt;br /&gt;
   3) Third Party Modules&lt;br /&gt;
   4) Update the Metasploit Framework&lt;br /&gt;
   5) Update the Social-Engineer Toolkit&lt;br /&gt;
   6) Update SET configuration&lt;br /&gt;
   7) Help, Credits, and About

  99) Exit the Social-Engineer Toolkit

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;A continuación elegir la opción número dos Website Attack Vectors.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

Select from the menu:&lt;br /&gt;
&lt;br /&gt;
   1) Spear-Phishing Attack Vectors&lt;br /&gt;
   2) Website Attack Vectors&lt;br /&gt;
   3) Infectious Media Generator&lt;br /&gt;
   4) Create a Payload and Listener&lt;br /&gt;
   5) Mass Mailer Attack&lt;br /&gt;
   6) Arduino-Based Attack Vector&lt;br /&gt;
   7) SMS Spoofing Attack Vector&lt;br /&gt;
   8) Wireless Access Point Attack Vector&lt;br /&gt;
   9) QRCode Generator Attack Vector&lt;br /&gt;
  10) Powershell Attack Vectors&lt;br /&gt;
  11) Third Party Modules&lt;br /&gt;
&lt;br /&gt;
  99) Return back to the main menu.

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Ahora para recolectar credenciales de un usuario elegir el vector de ataque Credential Harvester Attack Method, opción número tres.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

   1) Java Applet Attack Method&lt;br /&gt;
   2) Metasploit Browser Exploit Method&lt;br /&gt;
   3) Credential Harvester Attack Method&lt;br /&gt;
   4) Tabnabbing Attack Method&lt;br /&gt;
   5) Man Left in the Mtiddle Attack Method&lt;br /&gt;
   6) Web Jacking Attack Method&lt;br /&gt;
   7) Multi-Attack Web Method&lt;br /&gt;
   8) Create or import a CodeSigning Certificate

  99) Return to Main Menu

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Elija el modo Site Cloner, opción número dos, esta opción permite indicar cualquier página Web que al usuario le resulte familiar, con el fin de abusar de la confianza que tenga el usuario en el sitio clonado.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

   1) Web Templates&lt;br /&gt;
   2) Site Cloner&lt;br /&gt;
   3) Custom Import&lt;br /&gt;
&lt;br /&gt;
  99) Return to Webattack Menu

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Proporcionar la IP de la maquina donde la herramienta regresará las credenciales que logre capturar.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

set:Webattack&gt;2&lt;br /&gt;
[-] Credential harvester will allow you to utilize the clone capabilities within SET&lt;br /&gt;
[-] to harvest credentials or parameters from a Website as well as place them into a report&lt;br /&gt;
[-] This option is used for what IP the server will POST to.&lt;br /&gt;
[-] If you're using an external IP, use your external IP for this&lt;br /&gt;
set:Webattack&gt; IP address for the POST back in Harvester/Tabnabbing: 127.0.0.1 

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Proporcionar la URL de la página que se clonará para recolectar las credenciales del usuario víctima.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

[-] Example: http://www.thisisafakesite.com&lt;br /&gt;
set:Webattack&gt; Enter the url to clone: URL_A_CLONAR. 

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta comienza el proceso para clonación de la página Web que se indicó en el paso anterior.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

[*] Cloning the Website: https://login.url.com/login.php&lt;br /&gt;
[*] This could take a little bit...&lt;br /&gt;
&lt;br /&gt;
The best way to use this attack is if username and password form fields are available. Regardless, this captures all POSTs on a Website.&lt;br /&gt;
[*] Social-Engineer Toolkit Credential Harvester Attack&lt;br /&gt;
[*] Credential Harvester is running on port 80&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;En caso de que el servicio de Apache este corriendo, la herramienta solicita confirmación para detenerlo. Detiene el servicio Apache, pública la página Web que clono en el puerto 80 y queda en espera de que una usuario accese a a sito fraudulento.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

[*] Information will be displayed to you as it arrives below:&lt;br /&gt;
[*] Looks like the Web_server can't bind to 80. Are you running Apache?&lt;br /&gt;
Do you want to attempt to disable Apache? [y/n]: y&lt;br /&gt;
 * Stopping Web server &lt;br /&gt;apache2    &lt;br /&gt;                                                                           apache2: Could not reliably determine the server's fully qualified domain name, using 127.0.1.1 for ServerName&lt;br /&gt;
 ... waiting            &lt;br /&gt;                                                                              [ OK ]&lt;br /&gt;
[*] Successfully stopped Apache. Starting the credential harvester.&lt;br /&gt;
[*] Harvester is ready, have victim browse to your site.

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La URL de explotación se conforma de la siguiente manera: http:// IP_PROPORCIONADA/index.html&lt;/p&gt;
&lt;p&gt;Cuando la herramienta identifica una conexión a la página que fue clonada, muestra un aviso en la consola. &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

IP_USUARIO - - [14/Nov/2013 16:43:15] "GET / HTTP/1.1" 200 -&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;El usuario que ingresa a la página, llena el formulario de acceso con sus credenciales y presiona el botón de para ingresar. Entonces la herramienta captura el request HTTP y lo muestra en consola. &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;

[*] WE GOT A HIT! Printing the output:&lt;br /&gt;
PARAM: lsd=AVpgu8gq&lt;br /&gt;
PARAM: display=&lt;br /&gt;
PARAM: enable_profile_selector=&lt;br /&gt;
PARAM: legacy_return=1&lt;br /&gt;
PARAM: profile_selector_ids=&lt;br /&gt;
PARAM: trynum=1&lt;br /&gt;
PARAM: timezone=360&lt;br /&gt;
PARAM: lgnrnd=144204_hbWo&lt;br /&gt;
PARAM: lgnjs=1384469624&lt;br /&gt;
POSSIBLE USERNAME FIELD FOUND: email= usuario@hotmail.com&lt;br /&gt;
POSSIBLE PASSWORD FIELD FOUND: pass= micontrasena12345&lt;br /&gt;
PARAM: persistent=1&lt;br /&gt;
PARAM: default_persistent=0&lt;br /&gt;
[*] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Finalmente detenemos la página Web clonada con la combinación de teclas Ctrl + C.&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="https://www.trustedsec.com/downloads/social-engineer-toolkit/" rel="nofollow"&gt;https://www.trustedsec.com/downloads/social-engineer-toolkit/&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; David Kennedy&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; irc.freenode.net canal #setoolkit&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; BSD licensing&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 16:13:16 -0000</pubDate><guid>https://sourceforge.nete9caef49f074f8f03f93bc7869d4f329ba6e6e96</guid></item></channel></rss>