![]() ![]() ![]() Now victim will download the zip file and click on the sales.jpg. Now it generates a link as you can observe it from highlighted part of the screenshot and then send this link to the victim. Give a name to your payload which will be displayed to the victim as file name, from the screenshot you can see I had given sales. Now select the icon for your malicious image. Select payload to build as I had chosen window/meterpreter/reverse_tcp for the attack.Īfter then a pop-up box will open which will allow choosing any jpg image so that it could hide. ![]() AUTO_PAYLOAD_BUILD=YESĪfter making certain changes in setting file then open the terminal and run the program file: cd FakeImageExploiter In the same way, set these two values also as shown in the screenshot then save the changes. I had set PAYLOAD_EXETNSION=bat similarly set BYPASS_RH=NO and scroll down for next configuration. You can set any extension among these four: ps1, bat, txt, exe. Here you have to declare the type of payload extension you will use to hide it inside the image. Now make some changes inside the setting file as shown the screenshot: Once it gets downloaded then opens the folder and selects the file “ settings” for configuration before running the program as shown the given screenshot. Open the terminal inside your Kali Linux and type following command to download it from GitHub. It is designed so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with a hidden malicious. In this article, we are introducing a newly launched hacking tool “ Fake Image Exploiter”. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |