Video - Using the Social Engineering Toolkit (SET)

6 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€95.97
List Price:  €134.37
You save:  €38.39
£79.80
List Price:  £111.73
You save:  £31.92
CA$139.82
List Price:  CA$195.75
You save:  CA$55.93
A$153.75
List Price:  A$215.26
You save:  A$61.51
S$134.64
List Price:  S$188.51
You save:  S$53.86
HK$778.36
List Price:  HK$1,089.74
You save:  HK$311.37
CHF 89.34
List Price:  CHF 125.09
You save:  CHF 35.74
NOK kr1,107.14
List Price:  NOK kr1,550.05
You save:  NOK kr442.90
DKK kr715.75
List Price:  DKK kr1,002.09
You save:  DKK kr286.33
NZ$171.37
List Price:  NZ$239.93
You save:  NZ$68.55
د.إ367.26
List Price:  د.إ514.18
You save:  د.إ146.92
৳11,945.63
List Price:  ৳16,724.36
You save:  ৳4,778.73
₹8,442.99
List Price:  ₹11,820.52
You save:  ₹3,377.53
RM446.75
List Price:  RM625.47
You save:  RM178.72
₦169,271.38
List Price:  ₦236,986.70
You save:  ₦67,715.32
₨27,777.22
List Price:  ₨38,889.22
You save:  ₨11,112
฿3,446.26
List Price:  ฿4,824.91
You save:  ฿1,378.64
₺3,454.90
List Price:  ₺4,837
You save:  ₺1,382.10
B$580.04
List Price:  B$812.08
You save:  B$232.04
R1,811.35
List Price:  R2,535.96
You save:  R724.61
Лв187.69
List Price:  Лв262.77
You save:  Лв75.08
₩140,436.95
List Price:  ₩196,617.35
You save:  ₩56,180.40
₪370.16
List Price:  ₪518.24
You save:  ₪148.08
₱5,893.31
List Price:  ₱8,250.87
You save:  ₱2,357.56
¥15,475.45
List Price:  ¥21,666.25
You save:  ¥6,190.80
MX$2,042.64
List Price:  MX$2,859.78
You save:  MX$817.14
QR364.56
List Price:  QR510.41
You save:  QR145.84
P1,367.06
List Price:  P1,913.94
You save:  P546.88
KSh12,945.58
List Price:  KSh18,124.33
You save:  KSh5,178.75
E£4,964.52
List Price:  E£6,950.52
You save:  E£1,986
ብር12,237.67
List Price:  ብር17,133.23
You save:  ብር4,895.55
Kz91,290.87
List Price:  Kz127,810.87
You save:  Kz36,520
CLP$98,658.13
List Price:  CLP$138,125.33
You save:  CLP$39,467.20
CN¥724.22
List Price:  CN¥1,013.94
You save:  CN¥289.72
RD$6,024.63
List Price:  RD$8,434.73
You save:  RD$2,410.09
DA13,426.15
List Price:  DA18,797.15
You save:  DA5,371
FJ$227.57
List Price:  FJ$318.61
You save:  FJ$91.03
Q771.64
List Price:  Q1,080.33
You save:  Q308.69
GY$20,913.50
List Price:  GY$29,279.73
You save:  GY$8,366.23
ISK kr13,966.60
List Price:  ISK kr19,553.80
You save:  ISK kr5,587.20
DH1,005.63
List Price:  DH1,407.93
You save:  DH402.29
L1,821.98
List Price:  L2,550.85
You save:  L728.86
ден5,904.20
List Price:  ден8,266.12
You save:  ден2,361.91
MOP$801.48
List Price:  MOP$1,122.11
You save:  MOP$320.62
N$1,812.81
List Price:  N$2,538.01
You save:  N$725.20
C$3,678.31
List Price:  C$5,149.78
You save:  C$1,471.47
रु13,500.25
List Price:  रु18,900.90
You save:  रु5,400.64
S/379.05
List Price:  S/530.69
You save:  S/151.63
K402.47
List Price:  K563.48
You save:  K161
SAR375.40
List Price:  SAR525.58
You save:  SAR150.17
ZK2,764.29
List Price:  ZK3,870.12
You save:  ZK1,105.82
L477.77
List Price:  L668.90
You save:  L191.12
Kč2,432.37
List Price:  Kč3,405.42
You save:  Kč973.04
Ft39,496.05
List Price:  Ft55,296.05
You save:  Ft15,800
SEK kr1,103.50
List Price:  SEK kr1,544.95
You save:  SEK kr441.44
ARS$100,374.93
List Price:  ARS$140,528.92
You save:  ARS$40,153.99
Bs690.75
List Price:  Bs967.07
You save:  Bs276.32
COP$438,931.09
List Price:  COP$614,521.09
You save:  COP$175,589.99
₡50,918.63
List Price:  ₡71,288.12
You save:  ₡20,369.49
L2,526.16
List Price:  L3,536.73
You save:  L1,010.56
₲780,388.98
List Price:  ₲1,092,575.79
You save:  ₲312,186.81
$U4,261.82
List Price:  $U5,966.72
You save:  $U1,704.90
zł416.31
List Price:  zł582.85
You save:  zł166.54
Already have an account? Log In

Transcript

Greetings. In this short video presentation, we're going to take a look at how to go about using the social engineering toolkit or set. The social engineering toolkit set is specifically designed to perform advanced attacks against the human element, I have updated and upgraded my Kali installation. And I have confirmed that I have connectivity between my Kali machine and my Windows XP victim, I confirm the connectivity by doing a ping from my colleague over to my Windows XP machine. To begin this lab, we're going to open up a terminal and at the terminal prompt, we're going to type in set toolkit, and I'm going to go ahead and just hit Enter. And just a moment, it's going to start up and here is where we have to agree to the terms of service.

So I'm gonna type in ally, and that brings us up to our first menu screen. On our first menu screen, we're going to type in the number one for social engineering attacks. Type in number one, I hit Enter On the second screen, we're going to type in the number two. For web site attack vectors. We're going to hit enter. On this next screen, we're going to type in the number three.

For credential harvester attack method, we're going to hit enter. On this next screen, we're going to type in number two for site Cloner. Hit enter. Notice that it captures the IP address of your Kali because Kali is going to act as the web server and when the individual types in their credentials onto this cloned web page. That information is going to be sent back over here to Kali. To get to the next step, we have to hit hit enter.

Now at wants the URL to be clone. For this lab, we're going to create a fake web page for Facebook. We're going to clone the website. And then we need to trick the end user into visiting our cloned website and given us their login. Once I've typed in the URL, I'm going to go ahead and hit enter In just a moment, the website for Facebook will be closed. So it's important that we read everything that's on this page has given you a lot of good information and it's telling you that the information will be displayed to you as it arrives below when it arrives from the victim machine.

So as the victim types in their username and password into the fake Facebook, log on page, that information is going to be sent over to our Cali machine and harvested. So we're now ready to play the victim in this harvesting attack. So how we get the user to partake in this scam is up to us. Normally, we would build a carefully crafted email, and we would make it look as if it was a problem with their account and they need to log in. And here's the link that you can use to log into your Facebook account or your bank account. Or your LinkedIn account, whatever the account is, and when they do that they're going to get a page cannot be found.

But though, that information that they inputted into the username and password field that's being sent over to your county server is being gathered up over there. So let's just see what happens. So here's the Facebook page. So I'm just going to type in a username here, I'll just type in cyber offense. And then I'm just going to type in the word password. And then I'm just going to say login.

Now notice that it says the page cannot be displayed. But if we go back over to our Cali, we see that the username and the password were harvested over onto our Kali machine. So we know that we got this information, and here are the attempts that were made. And there's my username, and there's my password. So you can see that this is a viable attack and it is a way to gather usernames and passwords. Words.

It's just depends on how we go about doing it. But it must work because cyber criminals and criminal organizations around the world use it to gain access to people's mail and their banking accounts. So once you're ready to generate your report, take note of where the report is going to be stored. Because this is where we're going to have to go find a report. The report is saved as an HTML document, and we're going to open it up in Firefox, but I'm going to show you a different way to access it. So we're now ready to go ahead and hit Enter.

And that brings us back to the main menu. On this screen, we can just type in 99 and hit enter and we hit 99. One more time, and hit enter and we hit 99. One more time, and hit enter. We're back to the prompt. I'm going to type in clear.

It's going to give me a nice clean terminal. To demonstrate how we go about accessing our harvested report. At the prop. We're going to Type in the cd command to change directory on over to the Ford slash route forward slash dot set directory. Now once we're up inside of the dot set folder, we can go ahead and type in LS. And that's going to list all the content.

Notice that we have a nother directory called reports. So we're going to CD over to reports. Hit enter. Now I'm inside of the reports directory. I'll do another LS, and here you can see the reports themselves. So what we need to do now is open up the HTML report using Firefox.

So I'm gonna type in Firefox, I'm just going to copy and paste all of this here to include the single quotes. Give it a minute. And just a second, Firefox is going to open up and it's going to give us the end there's our report. So you can go down and through this report, you can see the information presented to you in such a way that you can use Is it as part of a Fishel report or some other use such as record keeping? That concludes your short video presentation on how we go about using the social engineering toolkit to harvest credentials. In this short video presentation, you are shown how to use the set tool to call any website in this case Facebook and to trick users into giving us their username and password and how easy it was for Cali using the set tool to harvest those same credentials.

If you have any questions or concerns about this lab, please do not hesitate to reach out and contact your instructor and I will see you in my next video.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.