Difference between revisions of "Social Engineering Toolkit"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 12: Line 12:


After launching the Social Engineering Toolkit we see the above mentioned menu.
After launching the Social Engineering Toolkit we see the above mentioned menu.
Here we can choose between following submenus:
* Social-Engineering Attacks
* Penetration Testing
* Third Party Modules
* Update the Social-Engineer Toolkit
* Update SET configuration
* Help, Credits, and About


  echo foo
  echo foo

Revision as of 17:51, 10 July 2021

Summary

Social Engineering Toolkit (SET) is a menu driven system that allows you to control your attacks tailored to the desired target.

Requirements

As part of this guide, I used Kali (Kali GNU/Linux Rolling 5.10.0-kali3-amd64) as the OS, so it was already preinstalled. I installed Kali on a Virtual machine (VMware® Workstation 15 Pro 15.5.5 build-16285975).

Example

Start: Run Social Engineering Toolkit

After launching the Social Engineering Toolkit we see the above mentioned menu. Here we can choose between following submenus:

  • Social-Engineering Attacks
  • Penetration Testing
  • Third Party Modules
  • Update the Social-Engineer Toolkit
  • Update SET configuration
  • Help, Credits, and About
echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Courses

  • WFP-1

References