1 00:00:00,360 --> 00:00:04,480 In the previous video, we have seen how to create malicious files. 2 00:00:04,890 --> 00:00:11,200 OK, and now in this video we will see how we can create a malicious USB drive. 3 00:00:11,640 --> 00:00:18,370 That is how to make your friend drive malicious using social engineering toolkit. 4 00:00:18,990 --> 00:00:21,330 So let's run as a tool kit. 5 00:00:27,400 --> 00:00:35,170 Now, as we've done in the previous videos, select the first option, that is social engineering attacks. 6 00:00:40,290 --> 00:00:41,030 Legit Lord. 7 00:00:43,100 --> 00:00:49,230 And now this time, we are going to select the third option, which is infectious media generator. 8 00:00:49,880 --> 00:00:52,760 So, three, enter here. 9 00:00:53,240 --> 00:00:58,760 You have two options, fine format experts and standard US executable. 10 00:00:59,160 --> 00:01:01,990 OK, so we will select the second one. 11 00:01:03,500 --> 00:01:08,330 And here let's select this one, which is windows. 12 00:01:08,650 --> 00:01:09,620 The reverse is true. 13 00:01:09,630 --> 00:01:15,400 DHBs, if you remember, we have used this before in our in one of our previous videos. 14 00:01:15,830 --> 00:01:19,310 So seven enter now it says. 15 00:01:20,230 --> 00:01:22,430 IP address for the payload listener. 16 00:01:22,960 --> 00:01:30,580 So enter the IP of the attacker machine and enter the port for the reverse listener. 17 00:01:30,820 --> 00:01:32,500 So let's see, four, four, three. 18 00:01:35,000 --> 00:01:39,830 Now it's generating the payload, so we have to wait till the process gets completed. 19 00:01:43,340 --> 00:01:50,470 So the billion has been created and it says Paillard has been exported to this, but which is cheroot 20 00:01:50,630 --> 00:01:53,660 OK with the name below not exceed. 21 00:01:54,950 --> 00:02:02,880 Right now what happened is it has created two different fines for our use screwdriver. 22 00:02:02,930 --> 00:02:04,510 One is ortolan. 23 00:02:05,000 --> 00:02:08,820 You can see it here and the other one is Middleboro. 24 00:02:09,470 --> 00:02:13,710 OK, so analysis creates a listener right now. 25 00:02:13,820 --> 00:02:15,280 OK, yes. 26 00:02:16,670 --> 00:02:22,880 Now it will going to launch Mehta's framework console from here. 27 00:02:24,520 --> 00:02:25,780 That is MSF console. 28 00:02:32,480 --> 00:02:39,440 So now it says it started its reverse handler here on board four, four, three. 29 00:02:39,860 --> 00:02:41,530 Now it's up to you. 30 00:02:41,540 --> 00:02:42,740 You can change this board. 31 00:02:42,740 --> 00:02:47,030 No to anything like one, two, three, four or five, six, seven, eight, etc.. 32 00:02:47,060 --> 00:02:55,300 OK, now, the only job left is to attach your user drive with your machine and copy your payload. 33 00:02:56,090 --> 00:03:03,080 Then take that brain driven or edgett on your target computer system and it will automatically run and 34 00:03:03,080 --> 00:03:04,980 create a station for us. 35 00:03:05,470 --> 00:03:08,720 OK, so that's it for this tutorial.