## π Social-Engineer Toolkit (SET) Cheatsheet
SET is an open-source Python tool used for social engineering attacks, developed by TrustedSec.
##
## βοΈ Installation
Method | Command |
---|---|
Clone from GitHub | git clone https://github.com/trustedsec/social-engineer-toolkit.git |
Navigate to folder | cd social-engineer-toolkit |
Run setup | sudo python3 setup.py |
Launch SET | sudo setoolkit |
## π Main Menu Options
Option | Description |
---|---|
1 | Social-Engineering Attacks |
2 | Penetration Testing (Fast-Track) |
3 | Third Party Modules |
4 | Update the Social-Engineer Toolkit |
5 | Update SET configuration |
6 | Help, Credits, and About |
## π― Social Engineering Attack Vectors (Option 1)
Option | Description |
---|---|
1 | Spear-Phishing Attack Vectors |
2 | Website Attack Vectors |
3 | Infectious Media Generator |
4 | Create a Payload and Listener |
5 | Mass Mailer Attack |
6 | Arduino-Based Attack Vector |
7 | SMS Spoofing Attack Vector (Paid service needed) |
8 | Wireless Access Point Attack Vector |
9 | QRCode Generator Attack Vector |
10 | Powershell Attack Vectors |
11 | Third Party Modules |
99 | Return to Main Menu |
## π Spear-Phishing Attack Vectors (Option 1 > 1)
Option | Description |
---|---|
1 | Perform a Mass Email Attack |
2 | Create a FileFormat Payload |
3 | Create a Social-Engineering Template |
4 | Return to Main Menu |
## π Website Attack Vectors (Option 1 > 2)
Option | Description |
---|---|
1 | Java Applet Attack Method |
2 | Metasploit Browser Exploit Method |
3 | Credential Harvester Attack Method |
4 | Tabnabbing Attack Method |
5 | Web Jacking Attack Method |
6 | Multi-Attack Web Method |
7 | HTA Attack Method |
8 | Return to Main Menu |
## π Credential Harvester Setup Example
Step | Command or Option |
---|---|
Start SET | sudo setoolkit |
Choose option | 1 (Social-Engineering Attacks) |
Choose option | 2 (Website Attack Vectors) |
Choose option | 3 (Credential Harvester Attack) |
Choose attack method | Site Cloner or custom templates |
Enter URL to clone | e.g. https://facebook.com |
SET starts web server | Credentials harvested on form submission |
## π§ͺ Payload and Listener (Option 1 > 4)
Payload Type | Example Setup Step |
---|---|
Windows Reverse TCP | windows/meterpreter/reverse_tcp via SET wizard |
Listener Port | Enter desired port (e.g. 4444 ) |
IP Address | Enter attackerβs IP (e.g. 192.168.1.10 ) |