Friday 11 June 2021

HOW HACKERS SEND FAKE MAIL USING SETOOLKIT


The information security environment has changed vastly over the years Now, despite having security policies, compliance, and infrastructure security elements such as firewalls, IDS/IPS, proxies, and honey pots deployed inside every organization, we hear news about how hackers compromise secured facilities of the government or of private organizations because of the human element involved in each activity.
Typically, employees are not aware of the tricks and techniques used by social engineers in which they can be used as mediators to gain valuable information such as credit card details or corporate secrets. The entire organization's security can be at stake if an employee visits a malicious website, answer a social engineer's phone call, or clicks on the malicious link that he/she received in their personal or company e-mail ID. 

Today we'll show you a method through which you can easily send a fake email with one of the most popular tools called SET (Social Engineering Toolkit). 

The social-engineering toolkit (SET) is a product of TrustedSec. SET is a python-driven suite of custom tools created by David Kennedy (ReL1K) and the SET developed team, comprising of jR DePre (pr1me), joey Furr (j0fer), and Thomas Werth.

SET is a menu-driven attack system that mainly concentrates on attacking the human element of security. With a wide variety of attacks available, this toolkit is an absolute must-have for penetration testing. 

SET comes preinstalled in Kali Linux. you can simply invoke it through the command line using the command "setoolkit".