Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

How to Use "SET", the Social-Engineer Toolkit

Jun 14, 2013 07:57 PM
Conceptual illustration of social engineering with a human skull and digital elements.

Welcome back my social engineers/hackarians! Today we'll be looking

Social engineering attack concept with a quote on human error.

into a fantastic piece of software, The Social-Engineer Toolkit or just SET for short. SET is designed, Developed and used by several Social-engineers. So... Let's get started!

Getting Familiar

When you boot up SET you'll see this screen:

Code snippet in a dark-themed code editor displaying programming commands and syntax.

Now we are able to pick one of the options listed above

We'll use:

>1) Social engineering attacks

>2) Fast-track penetration testing


The other options are not important. So what happens when we press 1 We'll get this screen:

Code displayed on a terminal screen with syntax highlighting.

Now there are numerous of things here so let's look into that!

Spear-Phishing Attack Vectors

This tool allows you to send e-mails with a malicious file as payload.

Website Attack Vectors

This tool allows you to create a malicious website link.

Infectious Media Generator

This tool creates a payload and a .ini file for a usb,cd or dvd injection.

Create a Payload and Listener

Straightforward just creates a .exe file and opens a listener.

Mass Mailer Attack

This tool will send e-mails to the target.

Arduino-Based Attack Vector

For use with a "teensy usb."

SMS Spoofing Attack Vector

With this tool you'll be able to craft sms messages and send them.

Wireless Access Point Attack Vector

Should be straightforward.

QRCode Generator Attack Vector

Generates a QRCode to a specific URL.

Powershell Attack Vectors

This will allow you to use Powershell exploits (powershell is available on windows vista and above.)

Third Party Modules

Will allow you to browse for more add-ons.

Getting Started!

I won't create a whole tutorial about the different options available in SET because it's just to much. Also SET is pretty straightforward. For example, in metasploit you'll need to use set RHOST:xxx.xxx.xxx.xxx. SET just asks: What is the remote host? ==> xxx.xxx.xxx.xxx

So go ahead and try to social engineer someone, and i hope this helps.

The next big software update for iPhone is coming sometime in April and will include a Food section in Apple News+, an easy-to-miss new Ambient Music app, Priority Notifications thanks to Apple Intelligence, and updates to apps like Mail, Photos, Podcasts, and Safari. See what else is coming to your iPhone with the iOS 18.4 update.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!