- #HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX HOW TO#
- #HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX INSTALL#
- #HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX PC#
Now, SET starts my Kali Linux Webserver on port 80, with the fake Google account login page. Because we aimed Google account page, so we choose number 2. In this options listed pre-defined web phising templates as i mentioned above. PS: To check your device IP address, type: ‘ifconfig’Īlright so far, we have set our method and the listener IP address.
#HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX PC#
Web Templates.īecause, my Kali Linux PC and my mobile phone were in the same Wi-Fi network, so just input the attacker ( my PC) local IP address. Hit Enter.įurther options are narrower, SET has pre-formatted phising page of popular websites, such Google, Yahoo, Twitter and Facebook. Yes, of course, we are going to perform Social Engineering Attacks, so choose number 1 and hit ENTER.Īnd then you will be displayed the next options, and choose number 2. You will see the welcome page at the top and the attack options at the bottom, you should see something like this. Setoolkit is using Command Line interface, so don’t expect ‘clicky-clicky’ of things here. Here, i am sitting down on my desk, my computer (running Kali Linux) is connected to the internet the same Wi-Fi network as my mobile phone (i am using android). Before we conduct the social engineering attack, we need to set up our phising page first. SET ( shortly) is developed by the founder of TrustedSec ( ), which is written in Python, and it is open source.Īlright that was enough let’s do the practice. Social Engineering Toolkit, is design to perform human-side penetration test. Oh yeah, if you don’t know what is SET is, i will give you the background on this toolkit.
#HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX INSTALL#
Why i used my phone? I will explain below, later.įortunately we are not gonna install any tools, our Kali Linux machine has pre-installed SET (Social Engineering Toolkit), That’s all we need.
![how to use social engineering toolkit in termux how to use social engineering toolkit in termux](https://static.wixstatic.com/media/94b13a_5e3f294243f64ff4a3c522bc82220ff3~mv2.png)
In this case we first are going to setup phishing Gmail Account login page in my Kali Linux, and use my phone to be a trigger device. I only need his head and trust, and stupidity too! Because, you know, human stupidity can not be patched, seriously! So, based on the scenario above you can imagine that we don’t even need the victim’s device, i used my laptop and my phone. Goal: Gaining email credential account informationĭevice: Computer or laptop running Kali Linux. Social Engineering Attack to gain email access It is so easy, just follow along the tutorial carefully.
#HOW TO USE SOCIAL ENGINEERING TOOLKIT IN TERMUX HOW TO#
In this post i am going to show you the simple scenario of how to implement Social Engineering Attack in daily life.
![how to use social engineering toolkit in termux how to use social engineering toolkit in termux](https://1.bp.blogspot.com/-G4417E4Jj60/X4A5Jrl6igI/AAAAAAAASmE/f4A8udZepxEw0S4KS2veGY__lbYw5rGtgCLcBGAsYHQ/s1024/AdvPhishing-Termux-Install-Command-Use.png)
You might have seen his Social Engineering Attack demo video on YouTube.
![how to use social engineering toolkit in termux how to use social engineering toolkit in termux](https://pbs.twimg.com/media/E0YJx7lXEAkV6II.jpg)
In most of his attack methods, he used to trick victims into believing that he holds the system authority. Social engineering attacks are not breaking into a system directly, instead it is using human social interaction and the attacker is dealing with the victim directly.ĭo you remember Kevin Mitnick? The Social Engineering legend of the old era. They target a victim who has a financial account such as banking or credit card information. No system is safe, because the system is made by humans.The most common attack vector using social engineering attacks is spread phishing through email spamming. Social Engineering is a kind of attack targeting human behavior by manipulating and playing with their trust, with the aim to gain confidential information, such as banking account, social media, email, even access to target computer. Humans are the best resource and end-point of security vulnerabilities ever.