Social - Engineer Toolkit (SET) - Website Attack Vectors question
Hello. Im testing on my network the Social - Engineer Toolkit (SET) - Website Attack Vectors option. After I make the dns_spoof and some other user enters the webpage that Im cloning and sets the fields with password etc. and clicks login everything is working fine and I get his password and username but on his side the browser is not transfered to the original web site after he clicks login ... is that normal? :confused: :confused: :confused: I was reading one topic on the Internet about that option and they said that its a very good attack because the victim dosent understand what happened because he is transfered to the original webpage. Im using backtrack 5 with awus036h. Thanks for your time!