O'Reilly logo

Penetration Testing Bootcamp by Jason Beltrame

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using SET for client-side exploitation

SET is a tool that was designed to create social engineering-based attack vectors. SET can create custom attacks very rapidly. You can create malicious payloads, QRcode-based attacks, and Powershell attacks just to name a few. You can even start up a browser locally on the box, create malicious code, and use Metasploit to deliver. I will be setting up a fake site and harvesting users credentials while they think they are logging in. I am going to show you how easy it is to use and why it's my favorite tool for testing users:

  1. The first thing we are going to do is start SET:
  1. From the main menu, there ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required