SET is designed, Developed and used by several Social-engineers.
![]()
Use Social Engineering Toolkit Generator This ToolInfectious Media Generator This tool creates a payload and a.ini file for a usb,cd or dvd injection. Use Social Engineering Toolkit .Exe File AndCreate a Payload and Listener Straightforward just creates a.exe file and opens a listener. Mass Mailer Attack This tool will send e-mails to the target. SMS Spoofing Attack Vector With this tool youll be able to craft sms messages and send them. Wireless Access Point Attack Vector Should be straightforward. QRCode Generator Attack Vector Generates a QRCode to a specific URL. Powershell Attack Vectors This will allow you to use Powershell exploits (powershell is available on windows vista and above.) Third Party Modules Will allow you to browse for more add-ons. For example, in metasploit youll need to use set RHOST:xxx.xxx.xxx.xxx. SET just asks: What is the remote host xxx.xxx.xxx.xxx So go ahead and try to social engineer someone, and i hope this helps. If your running bugtraq you should go to pentesting and it should be there Th3skYf0x. Honestly, I find that trying to run hacks in a VM are nothing but trouble. Stop relying on Winblows, take a leap of faith (in yourself) and stop running Kali in a VM on top of Winblows. Use Social Engineering Toolkit Install Kali OrYou would be better off to install Kali or Parrot Security and run Winblows in a VM if you REALLY need mycockisoft er I mean microsoft.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |