

Among them was one that he employed the most, Social Engineering. Social Engineering can be defined as a psychological play on people in order to lead them into performing certain desired actions or divulging sensitive information. In lay man’s terms it’s an art of conning people and it has been one of the most successful technique of information gathering and fraud in the history of cyber-crime. While Social Engineering is primarily conducted in person, there are few tools that can be used as an aid. One of the simplest, but most effective tool that works on the basic concept of social engineering is the Social-Engineer Toolkit (SET).

It is written in Python and is developed by TrustedSec as an Open-Source tool. The Social-Engineer Toolkit (SET) enables you to perform various types of social engineering techniques like spear phishing attacks, credential harvesting. Given its popularity, SET has been integrated into Kali Linux.

Kali is a Debian based linux operating system developed specifically for the purpose of penetration testing. It can be found in “Exploitation Tools” category in the applications menu of Kali Linux. The backbone of the SET is its configuration file. SET works fine with the default configurations most of the time. However, in order to achieve higher success rates, and to ensure that attacks occur without any hiccups users may need to modify the configuration file as per their requirements.
#Kali social engineering toolkit spear phising generator#
There are three main subcategories of this toolkit:Įach of these categories is divided into several modules. We will create a Facebook phishing page using Social Engineering Toolkit which is a preinstalled functionality in Kali Linux OS. Select from the menu: 1) Spear-Phishing Attack Vectors 2) Website Attack Vectors 3) Infectious Media Generator 4) Create a Payload and Listener 5) Mass Mailer Attack 6) Arduino-Based Attack Vector 7) SMS Spoofing Attack Vector 8) Wireless Access Point Attack Vector 9) QRCode Generator Attack Vector 10) Powershell Attack Vectors 11) T. This is the most important part of SET and it contains following sub-modules.
