• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Social Engineer Toolkit tutorial (Part 1)

Status
Not open for further replies.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,548
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
Credits: C_J

Hello everyone. I have recently installed the SEToolkit and King Phisher and thought it would be useful if I showed you guy’s how to do it to if you wanted to learn these tools. Lets get started!

Installing the tool: Here are the commands to properly install the SEToolkit from GitHub.

sudo apt-get install git
git [COLOR=var(--hljs-builtin-name)]clone[/COLOR] https://github.com/trustedsec/social-engineer-toolkit/ [COLOR=var(--hljs-builtin-name)]set[/COLOR]/

[COLOR=var(--hljs-builtin-name)]cd[/COLOR] [COLOR=var(--hljs-builtin-name)]set[/COLOR]
pip install -r requirements.txt



Next you will go into your terminal and type

setoolkit



It will then open the terms and agreements. If you want to use the tool you will type Y into the prompt.

You will then encounter a menu that shows you the following
968ae8d0ad05d1ed472afc12dffcfa3baf7f9fdd.png


In this tutorial you will type in the first option (1) and hit enter.

In the next part of the menu you will see the following:
9fa0c7de319ce52cf12a01117a9ef43e14472dc4.png


you will then select the second option which is Website Attack Vectors.

You will then select number 3 from the menu below:
44f7d4e2f522afdd5fa20a3bce89e92d52528ada.png


Further options are narrower, SET has pre-formatted phishing page of popular websites, such Google, Yahoo, Twitter and Facebook. Now choose number 1. Web Templates .
5b9391bccb064fba917f61ddb50c664f8ff961b9.png


Because, my Kali Linux PC and my mobile phone were in the same Wi-Fi network, so just input the attacker ( my PC ) local IP address. And hit ENTER.

PS: To check your device IP address, type: ‘ifconfig’
2a932c2608760aad84e0ab85d54b270010de6582.png


Alright so far, we have set our method and the listener IP address. In this options listed pre-defined web phising templates as i mentioned above. Because we aimed Google account page, so we choose number 2. Google. Hit ENTER.


Now, SET starts my Kali Linux Webserver on port 80, with the fake Google account login page. Our setup is done. Now i am ready walking into my friends room to login into this phishing page using my mobile phone.

53aa866b0bf1980fd342f37b2e256cd44d4dec79.png
3704003adc9b4032f6c3d694abb63a7c3521e93a.png


Tools:




 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top