During this attack, we are going to craft an executable that will open a reverse connection between the target machine and our testing machine. To deliver this executable, we are going to place it on a USB device with a name that will pique the curiosity of the target. Once the USB is configured, leaving it in a public area in the target organization should produce the results we need.
The steps to perform our USB attack are as follows:
- From the main options list, we choose 1) Social Engineering Attacks:

- To craft the executable we are going to use, choose 3) Infectious Media Generator:

- The Infectious Media Generator will prompt the type of exploit to use. For our purposes, we are going to use a Metasploit Executable. Select 2) Standard Metasploit Executable:

- There are a number of different payloads available to use. For example, the Windows Meterpreter Reverse HTTPS payload would be useful in a corporate setting, as organizations will often allow blanket HTTPS connections to the public internet. For our purposes, we will use a simple reverse TCP connection. Enter the payload for a reverse TCP Shell, which in this case is 2) Windows reverse TCP Meterpreter:

- We need to set the payload listener, which in this case is the IP address of our testing machine (172.16.122.185). In some cases, you can have a central server with Kali Linux and conduct this attack with multiple USBs, all returning to the payload listener address. Set the reverse listener port to 4444, then press Enter. You will be prompted to create a listener. If you are testing, enter yes, which will start the Meterpreter listener:

- Navigate to /root/.set and you will see the executable listed:

- Simply copy the payload.exe file to the desktop and you can then load it onto a USB device. Another trick is to change the name of the executable to something that would leverage the target's curiosity, such asĀ Executive Bonus. This is handy if the Autorun feature has been disabled on USB ports. Now that you have loaded up the USB, drop it in a public area inside the target enterprise or even in the parking lot.
- Our unsuspecting victim picks up the USB device and plugs it in. At this point, the executable runs and we see the Meterpreter shell open on our testing machine:

SET is continually updated by its creators, and as such is subject to undergoing drastic changes at any moment. We have only scratched the surface of this tool's capability. It is highly recommended that you continue to learn about this formidable social engineering toolset by visiting https://www.trustedsec.com/downloads/social-engineer-toolkit/; start by watching the videos that are presented on that site.