Understanding the main components and modules of SET
In this section, we are going to do a walkthrough to help you familiarize yourself with the interface of the SET framework. Additionally, we are also going to show you the main components and modules within SET, so let’s get started!
After you accept the terms and conditions, you should be able to see SET’s main page, which includes the main menu, as illustrated in Figure 8.4:
Figure 8.4 – SET main menu
Next, let’s look at the six options available on SET’s main menu.
Social-Engineering Attacks
This is the core of SET. To access it, just type 1
and hit Enter to see the Social-Engineering Attacks menu. The menu has 10 options, including Spear-Phishing Attack Vectors, Website Attack Vectors, Mass Mailer Attack, as illustrated in Figure 8.5:
Figure 8.5 – SET Social-Engineering Attacks menu
Now, let’s explore each of...