GO BACK TO HOME

Social Engineering Toolkit (SET) Detailed Guide

Introduction to SET

The Social Engineering Toolkit is an open-source penetration testing framework designed for social engineering attacks. It helps simulate real-world social engineering techniques to test the security awareness of individuals and organizations.

Launching SET

Open a terminal and start SET by running:

setoolkit

Choosing an Attack Vector

Upon launching, you will be presented with various attack options:

Select the desired option by entering the corresponding number.

Social-Engineering Attacks

Choose from various options:

Website Attack Vectors

Generate a phishing page or clone a legitimate website. Follow the prompts to select the target website and customize the page.

Infectious Media Generator

Create a USB drive that automatically runs a payload when connected to a computer. Choose the type of payload and target OS (Windows, Linux, etc.).

SMS Spoofing

Send spoofed SMS messages to the target. Input the target’s phone number and customize the message.

Creating Payloads

Use built-in payload options such as reverse shells or meterpreter sessions. Choose the listener type and configure the payload settings.

Mass Mailer

Send phishing emails to multiple targets. Provide a list of email addresses and customize the message content.

Credential Harvester

Set up a phishing page to collect credentials from users. Configure the page to capture usernames and passwords.

Post-Attack Considerations

Analyze the collected data. Report findings to the organization to improve security awareness.

Getting Help and Resources

For further information, consult the official documentation.