People Information Gathering with the Social Engineering Toolkit (SET)
Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.
What you'll learn
Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards.
In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment.
- First, you will demonstrate the ability to craft social engineering attacks such as spear phishing using various payloads.
- Next, you will work with other attack vectors within the Social Engineer Toolkit which relates to malicious payloads and integration into Metasploit.
- Finally, you will be able to simulate a social engineering attack.
Table of contents
In the context of cyber security, Social Engineering is the manupulation of people into giving out sensitive information.
The Social-Engineer Toolkit (SET) enables you to perform various types of social engineering techniques like spear phishing attacks, credential harvesting attacks, and much more.
You will learn how to utilize the Social-Engineer Toolkit (SET) for Initial Access in a red team environment including crafting social engineering attacks, and malicious payloads and integration into Metasploit. Ultimately, you will be able to simulate a social engineering attack.
The Social-Engineer Toolkit (SET) is an open source tool, and it's available on GitHub. You can use the tool on both macOS, Linux, and you can use it within Windows 10 if you make use of the Windows subsystem for Linux.