... | ... | @@ -2,7 +2,7 @@ |
|
|
|
|
|
The Social Engineering Toolkit (SET) is a quick and powerful tool for generating effective and believable social engineering attacks.
|
|
|
|
|
|
In this wiki, we'll discuss installation and then move on to a couple of example use cases.
|
|
|
In this wiki, we'll discuss installation and then move on to an example use case.
|
|
|
|
|
|
## Installation
|
|
|
|
... | ... | @@ -17,3 +17,26 @@ $ git clone https://github.com/trustedsec/social-engineer-toolkit/ set/ |
|
|
$ cd set
|
|
|
$ pip install -r requirements.txt
|
|
|
```
|
|
|
## Usage
|
|
|
|
|
|
On first boot, you'll be greeted by a lovely page describing terms of service and setting of initial config files looking something like this:
|
|
|
|
|
|

|
|
|
|
|
|
At the bottom, you can simply type Y (or y) to accept the ToS.
|
|
|
|
|
|
When finished, you will be greeted by the main menu!
|
|
|
|
|
|

|
|
|
|
|
|
There are 6 options to choose from:
|
|
|
1. Social-Engineering Attacks -- takes you to the sub-menu of all coded social engineering attacks
|
|
|
2. Penetration Testing (Fast-Track) -- takes you to a list of coded exploits to help with other pentesting than SE
|
|
|
3. Third Party Modules -- Modules added to the git repository not developed by TrustedSec
|
|
|
4. Update the Social-Engineer Toolkit -- Updates the application
|
|
|
5. Update SET Configuration -- Takes you to update your config for using SET
|
|
|
6. Help, Credits, and About -- Built-in help pages plus giving credit to all those who helped and more about SET
|
|
|
|
|
|
## Example
|
|
|
|
|
|
Now time for the fun part! Using SET to generate an attack. |
|
|
\ No newline at end of file |