Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

5 minutes
Video Transcription
Hello and welcome to another episode of breaking stuff with Robert. I'm very happy to have you here with me today. We're going to be discussing the social Engineering tool kit, or set for short, which will reference it as moving forward. Now there's a lot of great things that you can do with the social engineering tool kit.
It has in it a set of penetration testing framework tools
that you can use for social engineering packs, fash tracking, penetration, testing that's got some third party modules as well. Popular attacks with this tool set includes spear, phishing attacks, website attacks, infectious media generation,
wireless access points, etcetera. There's a number of things in here that kind of integrate with medicine boy, so you could generate some payloads and bonds, shells and things of that nature.
A use case for this could be like cloning a website and sending fishing mounts to users to ask them to change their credentials. And then when they click on the site and enter the information, you can collect that data for, of course, testing on validation purposes.
Some of the objectives of this video again to provide you a high level overview of the set toolkit on dhe to provide you a demo of how the tool can be used. Target audiences here. While not limited to these two groups, penetration testers would be looking to use this tool to again do some fast tracking on pin testing and some social engineering
attacks, tests, exploits, etcetera
and then vulnerability. Analysts that would like to understand social engineering attacks and maybe do some testing of their own. This tool kit is there as well. But again not limited to these two groups, some pre requisites. It would be good to have a fundamental knowledge of social engineering attacks on dhe penetration testing in general.
Since there are some tools in here that could be used for pin testing purposes
and then a fundamental knowledge of Cali Lennox command mind utilization would be beneficial as well. So with that in mind, let's go ahead and jump into a demo environment.
Hello, and welcome to our handy dandy *** machine. Today we're going to be going over the social engineering tool kit. Now, we're not gonna get too deep into the tool kit again. This is a cursory view just to show you how to get into it and start kicking the tires on it. So when you open your terminal environment, you do S e t.
And if you hit time here tells you that there's a few options we're going to start spelling out tool
And now it does have a disclaimer that I've already agreed to.
but as you can see here, feels very much like men Exploit. If you've used the medicine framework as it comes up the first time, they've got some nice options here. That kind of gets you started. So if you need to exit, you can hit 99. If you want help, credits and about, you could hit six. Now, if you try to update by hitting four here
on hitting enter,
it tries to update. But it tells you you run in Cali Lennox, and then that it's, you know, that they maintain it. So I got another good logo here,
So depending on what you want to do, if you want to do some pen testing fast track and you can hit, too,
and that tells you so. If you're looking at like a SQL database with Microsoft Accustom, exploit some type of Del Drank kind of default creds attack. Whatever the case may be, it's got a few high level things here. Let's just say we wanted to look at the SQL Bruder. We had one and we can scan or connect directly. Whatever the case may be to try that,
go back with 99.
Not again.
Social engineering. We want to look at those tanks we can hit. One
gives you a number of things here. So if you want to create a payload in a listener, you could do that in medicine ploy. But they've got a nice way that you can kind of streamlined that here
So you could do that. A mass mail or type attack. If you want to do some type of Q R code, generator attack or a power shell attack, you can do that here. Something non for power shell.
Give you some reverse shell information bond shell etcetera. Dumped the same database. If we have four,
we can enter the address or D. M s name for the reverse host.
We're gonna hit control C and just go back. So there's a lot of different things you can do with E social engineering tool kit. Get some website attack vectors here so you can do Java applet attacks, Web jacking, attack methods, Multi attack when method.
So a lot of lot of options, creativity and this guy's really the limit.
So, you know, I would say, Get into the tool kits, start looking around and seeing what you can do with it and what you can generate here again.
It does have a disclaimer at the beginning of this that you agreed to use to make sure that you're using this for legitimate purposes. For white hat purposes, you know anything you do with the tool that could get you into trouble,
likely Could could. So just make sure that you dot your I's and cross your tea's. So with that in mind, let's go ahead and jump back in door slides.
All right, welcome back. I hope you enjoyed that demo and found that information to be beneficial again. There's a lot in the social engineering tool kit that you can use to your benefit. Whether it's fast tracking penetration tests are doing some social engineering, maybe some wireless attacks. The use cases really dependent upon what you're trying to do in which you're hoping to achieve
hope. You enjoyed the demo and everything that we've presented here today.
And so with that in mind, I want to thank you for your town and I look forward to seeing you again.