Главная
Study mode:
on
1
Intro
2
Difference of sy flags
3
Social Engineering Toolkit
4
Advanced Persistent Threat
5
SetNot Accountant
6
SetNot Overview
7
SetNot Attack vectors
8
SetNot Interactive
9
Credential Harvester
10
Configuration File
11
Configuration Options
12
Java applet
13
payload selection
14
payload handler
15
egress filtering
16
setting up a web server
17
running in the background
18
browser exploit
19
interpret
20
recap
21
spearfishing
22
mass email
Description:
Explore the Social Engineering Toolkit (SET) in this 52-minute video that inspired the founding of Derbycon. Learn about the differences in sy flags, advanced persistent threats, and credential harvesting techniques. Dive into configuration files and options, Java applets, payload selection and handling, regress filtering, and setting up web servers. Understand browser exploits, interpretation methods, and recap key concepts. Discover spearfishing tactics and mass email strategies to enhance your knowledge of social engineering techniques.

Social Engineering Toolkit

Add to list