Friday, 8 November 2013

SOCIAL-ENGINEERING TOOLKIT (SET) - VIDEO TUTORIALS

SOCIAL-ENGINEERING TOOLKIT (SET) - VIDEO TUTORIALS




The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It's main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed. Currently SET has two main methods of attack, one is utilizing Metasploit[1] payloads and Java-based attacks by setting up a malicious website that ultimately delivers your payload. The second method is through file-format bugs and e-mail phishing. The second method supports your own open-mail relay, a customized sendmail open-relay, or Gmail integration to deliver your payloads through e-mail. The goal of SET is to bring awareness to the often forgotten attack vector of social-engineering.

Official Site: http://www.social-engineer.org/


Sample Usage:
==========================================


root@netinfinity-laptop:/pentest/web_2a/web2a/social_engineering_toolkit# python set


[---] The Social Engineering Toolkit (SET) [---]
[---] Written by David Kennedy (ReL1K) @ SecureState [---]
[---] Version: 0.2 Alpha [---]

Welcome to the Social Engineering Toolkit, your one-stop shop
for all of your social engineering needs.

Select from the menu on what you would like to do:

1. Automatic E-Mail Attacks
2. Website Attacks
3. Update the Metasploit Framework
4. Update the Social-Engineering Toolkit
5. Create a Payload and Listener
6. Help
7. Exit the Toolkit

Enter your choice:



VIDEO TUTORIALS:

1:  Phishing Attack Demo Using The Social Engineering Toolkit

2:  Java Applet Attack Using The Social Engineering Toolkit

No comments:

Post a Comment