[go: up one dir, main page]

0% found this document useful (0 votes)
49 views2 pages

Setoolkit

The document discusses the Social-Engineer Toolkit, an open-source platform for penetration testing and ethical hacking. It allows security professionals to simulate and evaluate social engineering attacks through phishing, website attack vectors, and other tools. The document then focuses on using website attack vectors with the toolkit, explaining how to create a credential harvesting website clone using the IP address of the attacker machine.

Uploaded by

navpreet30112003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views2 pages

Setoolkit

The document discusses the Social-Engineer Toolkit, an open-source platform for penetration testing and ethical hacking. It allows security professionals to simulate and evaluate social engineering attacks through phishing, website attack vectors, and other tools. The document then focuses on using website attack vectors with the toolkit, explaining how to create a credential harvesting website clone using the IP address of the attacker machine.

Uploaded by

navpreet30112003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

SQT- 2023- Security Testing-01

Assignment 1
Set Tool Kit
Date- February 24, 2024

Submitted by: Submitted to:

Gaganpreet kaur Shivani Anand


1. What is SET Toolkit
The Social-Engineer Toolkit, sometimes known as the SET Toolkit, is an open-source platform for
penetration testing and ethical hacking. In order to enable security professionals test people’s
and organisation’s security awareness in safe and authorised contexts, it offers a set of tool and
scripts for simulating and evaluating social engineering attacks.

2. Options were used in the video.


1. Spare- phishing attack vectors.
2. Website attack vectors
3. Infectious media generator
4. Mass mail attack
5. Create a payload and listener.
6. Arduino-based attack vector
7. Wireless access point attack vector
8. QRCode generator attack vector
9. PowerShell attack vectors
10. Third party modules

3. Do work with website attack Vectors.


1. To make website we need to choose credential harvester attack method for this we
use site cloner.
2. When work with it demand IP address of attacker machine.
3. After enter the address it ask the URL which a person want to upload.
4. Then we are able to create are own link
5. To access website after creating link
6. To edit link that is created, firstly login into machine with same Gmail address and
then send it out to same kind of link.
7. For login, search http://10.10.1.13 which is URL of attacker
8. Then we need to add username and password for getting both use setoolkit
9. A person can also use netcraft apps
10. In netcraft, for website we can use phishing site
OR
To crate ophish account for the same

You might also like