1.)
2.) Click the New Campaign button.
3.) Enter a descriptive name for the campaign. For example, USB-Payroll helps you easily identify the campaign type and the executable file name.
4.) Select the Custom setup.
5.) Click the Add e-mail, web page, portable file button. A set of buttons for campaign components appears.
6.) Click the Portable File button.
7.) Enter a unique name for the portable file component. This name displays under the portable file icon on the campaign configuration page.
8.) Enter a name for the generated file. This is the file name that the human target sees when they look at the contents of the USB drive. For example, if you are generating a malicious PDF, you can specify a name like Corporate_Bonuses_2012.PDF or John_Smith_Resume.PDF.
9.) Select File format exploit for the File generation type. A list of available file format exploits appears.
10.) Use the search field to narrow down the list of exploits. For example, if you are searching for the Adobe CoolType exploit, you can search for name:cooltype. The keyword tag, name, specifies that you want to search for the keyword, cooltype, in the module’s name.
11.) When you find the exploit that you want to use, click on the module name. The module configuration page appears.
12.) You can modify any of the exploit settings, such as the payload and connection type, but it is recommended that you use the default configuration for the exploit.
13.) Click OK to apply the module configuration.
15.) When the campaign configuration area reappears, you will see a Download link located below the campaign component icon. Click the Download link and save the file to a location on your local machine. The Desktop or Downloads folder is a good location.
16.) Click the Launch Campaign button to start the campaign. The campaign must be online in order for you to get a session on the human target’s system.The USB key is now ready for you to drop off. You should select a area that has high traffic or a location where people are more likely to set things down and forget them, such as bathrooms, copy rooms, and break rooms.
![]() |