Metasploit Browser Exploit Method – Setoolkit Tutorial

Metasploit Browser Exploit – Welcome to another article, In this article we are going to discuss about Metasploit browser exploit method in setoolkit tutorial.
Metasploit Browser Exploit Method - Setoolkit Tutorial

Step 1: choose Browser exploit

First you type this below command this command will help you to open setookit in your terminal.

sudo setoolkit

Once you open setoolkit tool in your terminal choose first option 1. Social -Engineering Attack Now you can see 10 module but you choose 2nd option website attack vector In this place you can see metasploit browser exploit option just choose it.
Metasploit Browser Exploit Method - Setoolkit Tutorial

Step 2: choose phishing websites

Once you choose metasploit browser exploit method you can see this below three option
1. web Templates

This is first method will allow SET to import a list of pre-defined web applications that it can utilize within the attack.

2. Site Cloner

This is second method will completely clone a website of your choosing and allow you to utilize the attack vectors within the completely same web application you were attempting to clone.

3. Custom Import

The third method allows you to import your own website, note that you should only have an index.html when using the import website functionality.

You choose 2nd option site cloner and follow this below image

Metasploit Browser Exploit Method - Setoolkit Tutorial

Once you choose phishing website select payload I choose 1st option

Metasploit Browser Exploit Method - Setoolkit Tutorial

Once you choose payload then you select payload option for reverse connection I choose reverse_tcp and select your port

setoolkit tutorial

Now you will get one shareable link share that link to victim once your victim click your link payload will automatically exploit in their system so you can control your victim device remotely.

setoolkit tutorial

Leave a Reply

Your email address will not be published. Required fields are marked *