Automating the Social Engineering Toolkit
The Social Engineering Toolkit (SET) is a Python-based set of tools that target the human side of penetration testing. We can use SET to perform phishing attacks, web-jacking attacks that involve victim redirection, claiming that the original website has moved to a different place. We can also create file-format-based exploits that target particular software for the exploitation of the victim's system, and many others. The best thing about using SET is its menu-driven approach, which will set up quick exploitation vectors in no time.
Important note:
Tutorials on SET can be found at https://github.com/trustedsec/social-engineer-toolkit/raw/master/readme/User_Manual.pdf.
SET generates client-side exploitation templates extremely quickly; however, we can make it faster using the automation scripts. Let's see an example where we run the seautomate
tool with a script of our choice by issuing the ./seautomate auto_script
command...