So go ahead and try to social engineer someone, and i hope this helps. SET just asks: What is the remote host? => For example, in metasploit you'll need to use set RHOST. I won't create a whole tutorial about the different options available in SET because it's just to much. Will allow you to browse for more add-ons. This will allow you to use Powershell exploits (powershell is available on windows vista and above.) With this tool you'll be able to craft sms messages and send them. This tool will send e-mails to the target. This tool allows you to create a malicious website link. This tool allows you to send e-mails with a malicious file as payload. Now there are numerous of things here so let's look into that!
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |