Chapter 10. Social Engineer Toolkit

In this chapter, we will cover:

  • Getting started with Social Engineer Toolkit (SET)
  • Working with the SET config file
  • Spear-phishing attack vector
  • Website attack vectors
  • Multi-attack web method
  • Infectious media generator

Introduction

Social engineering is an act of manipulating people to perform actions that they don't intend to do. A cyber-based socially engineered scenario is designed to trap a user into performing activities that can lead to the theft of confidential information or some malicious activity. The reason for the rapid growth of social engineering amongst hackers is that it is difficult to break the security of a platform, but it is far easier to trick the user of that platform into performing unintentional ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.