![how to use social engineering toolkit how to use social engineering toolkit](https://www.tutorialspoint.com/kali_linux/images/social_engineering_tools.jpg)
Type “99” to go back to the main menu and then type “2” to go to “The web attack vectors”. The first one is letting SET do everything for you (option 1), the second one is to create your own FileFormat payload and use it in your own attack.
![how to use social engineering toolkit how to use social engineering toolkit](https://i.ytimg.com/vi/9f2ANmI2-RI/maxresdefault.jpg)
For example, sending malicious PDF document which if the victim opens, it will compromise the system. The Spear-phishing module allows you to specially craft email messages and send them to your targeted victims with attached FileFormatmalicious payloads. If you press the Enter button again, you will see the explanations for each submenu. Step 3 − Most of the menus shown in the following screenshot are self-explained and among them the most important is the number 1 “Social Engineering Attacks”. Type “y” as shown in the following screenshot. Step 2 − It will ask if you agree with the terms of usage. Step 1 − To open SET, go to Applications → Social Engineering Tools → Click “SET” Social Engineering Tool.
#How to use social engineering toolkit how to#
Let’s learn how to use the Social Engineer Toolkit. These kind of tools use human behaviors to trick them to the attack vectors. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of time. The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering.
![how to use social engineering toolkit how to use social engineering toolkit](https://1.bp.blogspot.com/-KO8V8FmNU_k/TdQAo8__lcI/AAAAAAAAB9s/vRn-6ezXpZo/s1600-e20/se-wp.jpg)
In this chapter, we will learn about the social engineering tools used in Kali Linux.