trustedsec / social-engineer-toolkit

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
10.69k stars 2.74k forks source link

Using DNS with SET #181

Closed AngryBananer closed 8 years ago

AngryBananer commented 8 years ago

First of all thanks for your great tool and fast help, but could you explain me a liddle bit more what you mean with "Use the HTTPS module for that", because i dind't found anything like that. I like to create an undetectable Payload with the Powershell Alphanumeric Shellcode Injector. It must not be with Powershell but it should be undetectable (where the Powershell Alphanumeric Shellcode Injector is the best way from my point of view) and it must go over an DNS...

Thanks for your patience with me ;)

https://github.com/trustedsec/social-engineer-toolkit/issues/176

trustedsec commented 8 years ago

There's no way to tunnel a shell over DNS unless you do something custom like dnscat2 or something like Corelans unofficial DNS meterpreter. If you are looking to use hostnames for your shell, when SET prompts you for the LHOST option, you would specify a hostname instead of an IP. SET supports hostnames or IP addresses in the field for the LHOST lookup field as long as the payload supports it. The SET Interactive Shell, Meterpreter, and everything else should support hostnames.