Generate a QR Code Attack Vector

David Artykov
Geek Culture
Published in
3 min readMay 16, 2021

--

By Pieter Arntz

QR codes are almost ubiquitous nowadays. You can find them in any product, on theater tickets, and even in street commercials. The primary objective of QR Codes is to be used for advertisements or to provide more detail about a particular product or service to people who are interested. However, attackers and penetration testers may benefit from the widespread use of QR codes. Hackers can use QR codes to target untrustworthy users, and penetration testers can incorporate this form of attack into their social engineering interactions.

When a QR code is scanned, attackers can easily embed a malicious URL containing custom malware, which can then ex-filtrate data from a mobile device. They may also provide a malicious URL in a QR code that guides users to a phishing site and invites them to reveal their credentials.

If you’re running a penetration test and want to use this form of assault, it’s a simple process to do so. In reality, there are a plethora of forms and variations to try with this attack vector, but in this article, we’ll show you how to use Social Engineering Toolkit to carry it out.

After starting “Social Engineering Toolkit” in your Linux terminal, select option “1” for social engineering attacks and hit “Enter.”

--

--