O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

We will now use set to create a spear-phishing attack:

  1. From the Applications menu, select Social Engineering Tools | SET Social Engineering Toolkit. You will be presented with the following screen:
Initial setookit screen
  1. Select the top option: 1) Social-Engineering Attacks.
  2. Select 1) Spear-Phishing Attack Vectors.
  3. Select 1) Perform a Mass Email Attack.
  4. From here, we will have several optional attack vectors that we can use. Pick a suitable one based on the email you will be sending, and what you believe the customer has and uses for the software. For our testing purposes, we will use 13) Adobe PDF Embedded EXE Social Engineering ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required