• Kali Linux Bible Book
    Kali Linux Bible Book Cover
  • Home
  • Blog
  • Books
    • Kali Linux Bible Book
    • Web Penetration Testing Like The Pros
    • Application Security Pre-Engagement
  • Online Courses
    • Cracking Hashes with Hashcat
    • Kali Linux Training
    • Exploitation Development Using The Metasploit Framework
    • Learning The Social Engineer Toolkit
    • Cryptography Using Python
    • Pentests Automation
    • Python & Kali Linux
  • About Me
  • Contact the author

Learning The Social Engineer Toolkit

October 13, 2017

The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you’ll learn the social engineering attacks that SET supports. First, you’ll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you’ll explore how to use the website attack vector, along with creating a payload and a listener. Then, you’ll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that, you’ll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you’ll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you’ll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently.

To watch this online course go to:

https://www.pluralsight.com/courses/social-engineering-with-social-engineer-toolkit

Social Engineer ToolkitSocial Engineering
Share

Ethical Hacking  / Exploiting  / Social Engineering

GusKhawaja
Gus Khawaja is a security consultant, as well as an author in Cybersecurity. Gus Holds a BS degree in Computer Science and worked in IT security and Web application development. Gus has successfully delivered and developed IT solutions for companies in Canada. He is passionate about Technology and loves what he’s doing. After many years of experience in computer science, he has turned his attention to cyber security and the importance that security brings to this minefield. His passion for ethical hacking mixed with his background in programming and IT makes him a wise swiss knife professional in the computer science field.

  • The Best [email protected] Book

    Hack Like The Pros

    Kali Linux Bible Book

    Kali Linux Bible Book Cover

  • Do You Want More Like This!




© Copyright Ethical Hacking Blog