Social engineering in Kali Linux — part 1

The SET is an open-source penetration testing framework designed for social engineering. SET has several custom attacks that allow us to attack a fraction of time. These kinds of tools use human behaviors to trick them into the attack vectors.

The SET was created and written by Dave Kennedy, the founder of TrustedSec.The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test. It has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering-type environment.

Dave Kennedy

This is part one of this article in this part we talk about phishing on Email with SET — — In this part we will show you a simple demo of phishing using SET (Phishing is an act of presenting a fake page resembling the original webpage you intend to visit with the sole intention of stealing your credentials.)

tep 1— — Open Kali Linux on your PC

Step 2- Open social engineering (SET)

Step 3- Enter your password and press the “enter” button

Note — While entering your password make sure it is correct because it is not visible….

Step 4- choose the Website attack vectors and press “2”


Step 5- Choose the Credential Harvester Attack method and press “3”

Step 6- Choose web templates and press“1”

Step 7- Copy and paste your Ip address from the terminal and hit the “Enter” button

Step 8- Choose a template If you want to gain an Email id and password with the user then choose” GOOGLE” and press”2"

Step 9- Search your IP address on the browser

step 10- Enter the information on the box and click on the sign-in button

Step 11- Come back to your Terminal

You gain all the data of your victim successfully

Check out this demo video of a Phishing attack using “SET” — -

NOTE — This article is only for an educational purpose if anyone uses it for the wrong purposes WIZARDING CODES or the writer is not responsible for that

uotes on cybersecurity

1-Cyber-Security is much more than a matter of IT

2“Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.” — Chris Pirillo

So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA

Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — Martina Navratilova.