The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community.
The Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best-seller in security books for many months since its release, “Metasploit: The Penetrations Testers Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni. SET is included in the latest version of the most popular Linux distribution focused on security, Kali Linux.
Setting Up EXE
- Go to: Applications >> Kali Linux >> Exploitation Tools >> Social Engineering Toolkit >> se-toolkit
- Choose 1) Social-Engineering Attacks
- Choose 4) Create a Payload and Listener
- Put in your Local IP
- Choose 2) Windows Reverse_TCP Meterpreter
- Choose 16) Backdoored Executable (BEST)
- Leave Port at 443
- Start Listener: Yes
- Then my phone rang
- Go to: Places >> Home Folder
- Click to usr >> share >> set
- Right-click msf.exe and go to Properties >> Permissions Tab
- Click check mark – Allow executing file as program, then rename file.
- Transfer to target computer with USB, email, or some other ingenious method
- When Target executes EXE, meterpreter session will be opened.
- From here, you can type help. I will leave the rest up to you.