Social Engineering Attacks

December 22, 2015 | Views: 2275

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here


Social Engineering:  

Social Engineering is the art of hacking humans.It i refers to psychological manipulation of people into performing actions or giving up confidential information. 

Social engineering is  based on  cognitive biases  

Wikipedia Definition: “Cognitive biases are tendencies to think in certain ways that can lead to systematic deviations from a “standard of rationality” or good judgment, and are often studied in psychology and behavioral economics. 


The Social-Engineer Toolkit (SET) 

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community. 


To Download SET: git clone set/ 

Or if you are using Kali Linux you don’t need to. 




SMS Spoofing: 


This is an amazing and improved feature that has made many security professionals think.  

Open the command line Terminal and type:  SET 

Select Social Engineering Attack 

select option 7: SMS spoofing attacks 

select the option no 1: Perform SMS spoofing attack 





select option no 1: SMS Attack single phone number 

Now enter the victim’s Phone-number 


select a template or use predefined templates  


Now  from here you can choose the android emulator or use your SMS accounts

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. It very important to be informed about it please add me

  2. Wikipedia is not an academically credible, peer-reviewed source, you should always cite proven and viable sources when supporting written content.

    ~ Dan

  3. this article give a right choice
    . and thankful for me..

  4. Thank you Cyclex25 ! I apreciate your comment . You are totally right.I will demand to delete this article as soon as possible.Like this we can take Open knowledge to the next Level

  5. to be fair, this article is more about sms spoofing than it is about social engineering attacks. as it is neither one nor the other, it is unfortunately not good researched and lacks content imao.
    the content you provide is about a well outdated tool, cause the sms spoof isn’t available anymore in SET since early 2014! thus if ppl go to github and do as this article states, they won’t ever get to see this function. now before ppl go ahead and download older versions, there sure have been reasons it was ditched… this concludes in a confusing scenario which is not educational and not beneficial to a student.

    ref. yourself here, jump to line 235:

    sorry to say, cheers

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?