

One of the best attacks it has is called the spear-phishing attack in which one module creates a special email message and sends them to a wide range of people with attached malicious code.
#HOW TO USE SOCIAL ENGINEERING TOOLKIT IN KALI LINUX HTTP CODE#
Recommended safety tips will be to always check the URL of a website in the browser and use two-factor authentication as it provides an extra security layer to your account.It has three main options to select from option 1 is for social engineering attacks, option 2 is for penetration testing attack, and option 3 involves 3 rd party apps or tools that can help in inserting malicious code into target web email or web page. Phishing is constantly evolving to entrap innocent computer users. Hope this guide gave you a basic idea of how phishing attacks work. Go to /var/www/html and you can see the harvester file created there. Usually, people tend to pass it off as a glitch in FB or an error in their typing. If an unsuspecting user fills in their details and clicks on ‘Log In’, the fake page takes them to the actual Facebook login page. Go to browser and type (eg: ) Note: I am writing this article from Maharashtra, India hence Facebook is in the native language Marathi.The IP address is usually hidden carefully by using URL shortener services to change the URL so that it is better hidden and then sent in urgent-sounding emails or text messages.

SET informs us of the directory at which the captured data will be stored. The setup for a phishing attack is complete, you have cloned Facebook and hosted it on the server. Enter y when prompted about starting the Apache process. Social Engineering Toolkit needs Apache Server running as captured data is written to the root directory of Apache.Since we chose to clone a website instead of a personalized one, the URL to be cloned is to be provided.Paste the address that you copied in the earlier step. SET will ask you to provide an IP where the credentials captured will be stored.

Copy the IP address stated in ‘inet’ field.Open a new terminal window and write ifconfig Now you need to see the IP address of the attacker machine.This might take a moment as SET creates the cloned page. Enter 2 in order to select ‘Site Cloner’.Now, the attacker has a choice to either craft a malicious web page on their own or to just clone an existing trustworthy site. Enter 3 which will select the ‘Credential Harvester Attack Method’ as the aim is to obtain user credentials by creating a bogus page that will have certain form fields.Under Social Engineering, there are various computer-based attacks and SET explains each in one line before asking for a choice. Enter 1 as the choice as in this demo we attempt to demonstrate a social engineering attack. Type y to agree to the conditions and use the tool.You will be warned that this tool is to be used only with company authorization or for educational purposes only and that the terms of service will be violated if you use it for malicious purposes. Open the terminal window in Kali and make sure you have root access as ‘setoolkit’ needs you to have root access.Basically, it implements a computer-based social engineering attack. Social Engineering Toolkit or SET for short is the standard for social engineering testing among security professionals and even beginners must have a basic idea about using the tool. The phishing link can be sent to any user on the same Local Area Network as you and the data that they enter on the fraudulent page will be stored in a file on the attacker’s machine. We will create a Facebook phishing page using Social Engineering Toolkit which is a preinstalled functionality in Kali Linux OS.

Where hackers pose as a trustworthy organization or entity and trick users into revealing sensitive and confidential information. It is one of the most popular techniques of social engineering. Phishing attack using kali Linux is a form of a cyber attack that typically relies on email or other electronic communication methods such as text messages and phone calls.
