Social Engineering Toolkit
Offered By: YouTube
Course Description
Overview
Explore the Social Engineering Toolkit (SET) in this 52-minute video that inspired the founding of Derbycon. Learn about the differences in sy flags, advanced persistent threats, and credential harvesting techniques. Dive into configuration files and options, Java applets, payload selection and handling, regress filtering, and setting up web servers. Understand browser exploits, interpretation methods, and recap key concepts. Discover spearfishing tactics and mass email strategies to enhance your knowledge of social engineering techniques.
Syllabus
Intro
Difference of sy flags
Social Engineering Toolkit
Advanced Persistent Threat
SetNot Accountant
SetNot Overview
SetNot Attack vectors
SetNot Interactive
Credential Harvester
Configuration File
Configuration Options
Java applet
payload selection
payload handler
egress filtering
setting up a web server
running in the background
browser exploit
interpret
recap
spearfishing
mass email
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX