YouTube VideoWatch this video on YouTube.This is a demonstration on how Facebook users credentials are lifted from right under their nose. Social Engineering Toolkit is a powerful tool. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community. This demonstration is for EDUCATIONAL PURPOSE ONLY!!! Please Subscribe and tell your friends Where they can find real hacks.
can i ask something, if i using backtrack 5 install n boot in from usb i start it,,then i update,and upgrade it, also and i add a few application to it,such as reaver or vlc or chrome,then after do that, i shutdown it and start windows, then after few, i boot it again from usb , are the stuff that i did like the update n upgrade n installing app still there? , i test it n its not there,is it possible to make it stay on the usb? , please reply, really appreaciate it if u do. thank. here my email , [email protected] , please contact me to give the answer. really appreciate it so much
thank man, and just how do i use it? the yamas or explico, how to i use it after downloaded it, i kind of new ,haha can u make it clear for me? ,so i understand, i really appreciate it.
Use this for Yamas : http://lmgtfy.com/?q=Yamas+tutorial Use this for Xplico : http://lmgtfy.com/?q=Xplico+tutorial
i ask about how to make my bootable usb with backtrack5 r3 in it can save my every session on backtrack, ex, i update, it n install reaver, vlc or whatever, n after shutdown BT, i start my windows, later on.... i boot back the backtrack n all my application that i install is missing,n i has to update n install everyting, how do i make that stay ?n not to have it install everytime, thanz, if u can figure this out, i rally respect that.
1. Download Gparted iso http://gparted.sourceforge.net/download.php 2. Run Gparted using Vmware ( Vmware can be downloaded here https://xiaopan.co/forums/threads/vmware-workstation-9-0-1-build-894247.772/ ) 3. Plug in your USB ( preferably 8GB ) and mount to vmware. 4. Create 1st partition 5GB and format to FAT32 5. Create 2nd partition the rest and format to ext4. After formatting label it as "casper-rw" 6. Run Yumi multiboot usb ( Download here https://xiaopan.co/forums/threads/multiboot-usb-creator.2618 ) 7. Install Back Track with Yumi to your USB. 8. Locate multiboot\menu\bt5.cfg . Replace the whole content with this Code: Select All # Simple Menu Created by Lance http://www.pendrivelinux.com for YUMI - (Your USB Multiboot Installer) menu title BackTrack 5 (Penetration Testing) Boot Menu menu background yumi.png MENU WIDTH 72 MENU MARGIN 10 MENU VSHIFT 3 MENU HSHIFT 6 MENU ROWS 15 MENU TABMSGROW 20 MENU TIMEOUTROW 22 menu color title 1;36;44 #66A0FF #00000000 none menu color hotsel 30;47 #C00000 #DDDDDDDD menu color sel 30;47 #000000 #FFFFFFFF menu color border 30;44 #D00000 #00000000 std menu color scrollbar 30;44 #DDDDDDDD #00000000 none default label DEFAULT menu label ^BackTrack Persistent Text - Persistent Text Mode Boot kernel /multiboot/backtrack5/casper/vmlinuz append cdrom-detect/try-usb=true noprompt floppy.allowed_drive_mask=0 ignore_uuid live-media-path=/multiboot/backtrack5/casper file=/cdrom/preseed/custom.seed boot=casper persistent initrd=/multiboot/backtrack5/casper/initrd.gz text splash vga=791-- label text menu label BackTrack Text - Boot Text Mode kernel /casper/vmlinuz append file=/cdrom/preseed/custom.seed boot=casper initrd=/casper/initrd.gz text splash vga=791-- label STEALTH menu label BackTrack Stealth - No Networking enabled kernel /multiboot/backtrack5/casper/vmlinuz append cdrom-detect/try-usb=true noprompt floppy.allowed_drive_mask=0 ignore_uuid live-media-path=/multiboot/backtrack5/casper file=/cdrom/preseed/custom.seed boot=casper initrd=/multiboot/backtrack5/casper/initrds.gz text splash staticip vga=791-- label FORENSICS menu label BackTrack Forensics - No Drive or Swap Mount kernel /multiboot/backtrack5/casper/vmlinuz append cdrom-detect/try-usb=true noprompt floppy.allowed_drive_mask=0 ignore_uuid live-media-path=/multiboot/backtrack5/casper file=/cdrom/preseed/custom.seed boot=casper initrd=/multiboot/backtrack5/casper/initrdf.gz text splash vga=791-- label NODRM menu label BackTrack noDRM - No DRM Drivers kernel /multiboot/backtrack5/casper/vmlinuz append cdrom-detect/try-usb=true noprompt floppy.allowed_drive_mask=0 ignore_uuid live-media-path=/multiboot/backtrack5/casper file=/cdrom/preseed/custom.seed boot=casper initrd=/multiboot/backtrack5/casper/initrd.gz text splash nomodeset vga=791-- label debug menu label BackTrack Debug - Safe Mode kernel /multiboot/backtrack5/casper/vmlinuz append cdrom-detect/try-usb=true noprompt floppy.allowed_drive_mask=0 ignore_uuid live-media-path=/multiboot/backtrack5/casper file=/cdrom/preseed/custom.seed boot=casper initrd=/multiboot/backtrack5/casper/initrd.gz text-- label memtest menu label BackTrack Memtest - Run memtest kernel /isolinux/memtest append - label hd menu label Hard Drive Boot - boot the first hard disk localboot 0x80 append - MENU SEPARATOR label <-- Back to Main Menu kernel vesamenu.c32 append /multiboot/syslinux.cfg 9. Hit "save" and close bt5.cfg 10. Reboot PC and load your Live BT5 with persistent. This is how I created mine. I'm pretty sure there are many ways of doing it