O'Reilly logo

Kali Linux Social Engineering by Rahul Singh Patel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding the SMS spoofing attack vector

The SMS spoofing attack allows the attacker to send a text SMS using SET without revealing his/her true identity or by using someone else's identity.

Let's go through the steps required to perform this attack:

  1. Start the SET toolkit. You will see the following welcome screen:
    Understanding the SMS spoofing attack vector
  2. SMS Spoofing Attack Vector is present under Social-Engineering Attacks, as shown in the preceding screenshot. This module in SET was created by the team at TB-security.com.
    Understanding the SMS spoofing attack vector
  3. The SMS spoofing attack vector allows you to craft your own SMSes ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required