The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. You'll explore SET, which has a number of custom attack vectors that allow you to execute advanced social engineering tactics.
The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you'll learn the social engineering attacks that SET supports. First, you'll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you'll explore how to use the website attack vector, along with creating a payload and a listener. Then, you'll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you'll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you'll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently.
Course Overview Hi everyone. My name is Gus Khawaja, and welcome to this unique course of Social Engineering with the Social Engineer Toolkit. This application is widely used by hackers and security professionals because of its success to execute social engineering attacks. I know you want to learn and curious about this tool. That's why you're watching this video, right? In each lesson we are going to see together how to understand each type of attack separately in the Social Engineer Toolkit, aka SET. Some of the major topics that we will cover include web-based attacks, reverse shells and meterpreter, PowerShell attacks, post exploitation with empire PowerShell, also USB rubber ducky with that, and much, much more. When finishing all the modules you should grasp the basics of this tool, and you will have an idea of how this looks like in practice. Before beginning this amazing journey you should be familiar with Essentials of Ethical Hacking, but don't worry, I will walk you through all the details. Join me on this course to learn some exciting stuff with the Social Engineer Toolkit.