People Information Gathering with the Social Engineering Toolkit (SET)

Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.
Course info
Level
Intermediate
Updated
Aug 6, 2020
Duration
23m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 6, 2020
Duration
23m
Description

Social engineering assesses people, processes, and procedures by using attack vectors such as email, malicious wireless networks and more in the attempt to breach organizational safeguards. In this course, People Information Gathering with the Social Engineering Toolkit (SET), you will cover how to utilize the Social Engineer Toolkit for Initial Access in a red team environment. First, you will demonstrate the ability to craft social engineering attacks such as spear phishing using various payloads. Next, you will work with other attack vectors within the Social Engineer Toolkit which relates to malicious payloads and integration into Metasploit. Finally, you will be able to simulate a social engineering attack. When you are finished with this course, you will have the skills and knowledge to execute these techniques these techniques: Conduct Social Engineering (T1268) and Spearphishing for information (T1397) using the Social Engineer Toolkit.

About the author
About the author

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

More from the author
Persistence with Empire
Intermediate
23m
Oct 23, 2020
Command and Control with Empire
Intermediate
22m
Sep 17, 2020
More courses by Rishalin Pillay
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview (Tool Introduction)
Hey there. I'm Rishalin Pillay, and welcome to Pluralsight in this red team tools course featuring the Social‑Engineer Toolkit, the open source toolkit developed by David Kennedy and maintained by TrustedSec. The weakest link to any system is the person holding the information. Social engineering has been around for ages. Think of hackers such as Kevin Mitnick who was one of the first people to use social engineering to manipulate people into giving out sensitive information. Today, social engineering techniques are still being used. These types of attacks enable attackers to ultimately execute more intense attacks such as credential theft, ransomware, and much more. The Social‑Engineer Toolkit enables you to perform various types of social engineering techniques. It was specifically designed for attacks against the human element. With this toolkit you have the ability to perform spear phishing attacks, credential harvesting attacks, and much more. If you are looking to learn how to use the Social‑Engineer Toolkit come join me in this course where we will focus on people information gathering with the Social‑Engineer Toolkit.