Creating a Spear-Phishing Attack with the Social Engineering Toolkit
The Social
Engineering Toolkit (SET) license agreement states that SET is designed purely for good and not evil. Any use of this tool for malicious purposes that are unauthorized by the owner of the network and equipment violates the
terms of service (TOS) and license of this toolset. To find this tool, go through the menu Kali Linux | Exploitation Tools | Social Engineering Toolkit, or type setoolkit
on the command line:
This is going to be a Metasploit reverse HTTP exploit, so there are a couple of steps that you have to put in place before using SET:
Start the Metasploit service. ...
Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.