
Setoolkit is using Command Line interface, so don’t expect ‘clicky-clicky’ of things here. Here, i am sitting down on my desk, my computer (running Kali Linux) is connected to the internet the same Wi-Fi network as my mobile phone (i am using android). Before we conduct the social engineering attack, we need to set up our phising page first. SET ( shortly) is developed by the founder of TrustedSec ( ), which is written in Python, and it is open source.Īlright that was enough let’s do the practice. Social Engineering Toolkit, is design to perform human-side penetration test. Oh yeah, if you don’t know what is SET is, i will give you the background on this toolkit.
Kali social engineering toolkit facebook install#
Why i used my phone? I will explain below, later.įortunately we are not gonna install any tools, our Kali Linux machine has pre-installed SET (Social Engineering Toolkit), That’s all we need. In this case we first are going to setup phishing Gmail Account login page in my Kali Linux, and use my phone to be a trigger device. I only need his head and trust, and stupidity too! Because, you know, human stupidity can not be patched, seriously!

So, based on the scenario above you can imagine that we don’t even need the victim’s device, i used my laptop and my phone. Goal: Gaining email credential account informationĭevice: Computer or laptop running Kali Linux. Social Engineering Attack to gain email access It is so easy, just follow along the tutorial carefully.
Kali social engineering toolkit facebook how to#
In this post i am going to show you the simple scenario of how to implement Social Engineering Attack in daily life. You might have seen his Social Engineering Attack demo video on YouTube. In most of his attack methods, he used to trick victims into believing that he holds the system authority. Social engineering attacks are not breaking into a system directly, instead it is using human social interaction and the attacker is dealing with the victim directly.ĭo you remember Kevin Mitnick? The Social Engineering legend of the old era.

They target a victim who has a financial account such as banking or credit card information. No system is safe, because the system is made by humans.The most common attack vector using social engineering attacks is spread phishing through email spamming. Social Engineering is a kind of attack targeting human behavior by manipulating and playing with their trust, with the aim to gain confidential information, such as banking account, social media, email, even access to target computer. Humans are the best resource and end-point of security vulnerabilities ever.
