Today in this article we are going to compromise the target through VNC payload attack. It is a very simple method for beginners.
In this tutorial, we will learn how to create a VNC payload using Social Engineering Toolkit. We will try to achieve the VNC shell of a victim’s PC.
Let’s Start!!!
Open a terminal in Kali Linux, and type “setoolkit” on it to start the Social Engineering Toolkit Framework. Select the first option to choose from the list of Social-Engineering Attacks.
Press ‘1’
To proceed further we will choose “Create a Payload and Listener” option.
Press ‘4’
This will show an arsenal of different payloads. As in this article, our focus is VNC, hence we will select the VNC payload.
Press ‘3’
Next Step requires an IP address on which the payload listener is to be started. In our case, it is 192.168.1.109(attacker’s IP) and after that, it will ask for the port for the reverse listener. In our case, it will be 4444
After setting up this, it starts generating VNC payload and save it under the highlighted path. Explore /root/.set/payload.exe. Send the payload.exe file to the target.
Further, it will ask to start payload listener Type “yes” and hit “Enter” this will start loading the Metasploit Framework.
After loading the Metasploit Framework, it runs the multi handler automatically; Now once the victim clicks on the payload file sent by the attacker, the attacker will get a VNC shell.
Great!!!!
Our VNC attack using set toolkit is successful and we received the victim’s VNC
shell on our system.