

Let’s start our introductory recipe about SET, where we will be discussing SET on different platforms.

Getting started with the Social-Engineer Toolkit (SET) So, let’s dive deeper into the world of social engineering. We will mainly focus on creating attack vectors and managing the configuration file, which is considered the heart of SET. In this article, we will analyze the aspect of this tool and how it adds more power to the Metasploit framework. It is an official toolkit available at, and it comes as a default installation with BackTrack 5.
#KALI SOCIAL ENGINEERING TOOLKIT SPEAR PHISHING SOFTWARE#
Just like we have exploits and vulnerabilities for existing software and operating systems, SET is a generic exploit of humans in order to break their own conscious security. The Social-Engineer Toolkit is designed to perform such tricking activities. For example, it is difficult to break the security of Gmail in order to steal someone’s password, but it is easy to create a socially engineered scenario where the victim can be tricked to reveal his/her login information by sending a fake login/phishing page. The reason for the rapid growth of social engineering amongst hackers is that it is difficult to break the security of a platform, but it is far easier to trick the user of that platform into performing unintentional malicious activity. A cyber-based, socially engineered scenario is designed to trap a user into performing activities that can lead to the theft of confidential information or some malicious activity. Social engineering is an act of manipulating people to perform actions that they don’t intend to do. (For more resources related to this topic, see here.)
