Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Social Engineering Toolkit (SET) in this 52-minute video that inspired the founding of Derbycon. Learn about the differences in sy flags, advanced persistent threats, and credential harvesting techniques. Dive into configuration files and options, Java applets, payload selection and handling, regress filtering, and setting up web servers. Understand browser exploits, interpretation methods, and recap key concepts. Discover spearfishing tactics and mass email strategies to enhance your knowledge of social engineering techniques.
Syllabus
Intro
Difference of sy flags
Social Engineering Toolkit
Advanced Persistent Threat
SetNot Accountant
SetNot Overview
SetNot Attack vectors
SetNot Interactive
Credential Harvester
Configuration File
Configuration Options
Java applet
payload selection
payload handler
egress filtering
setting up a web server
running in the background
browser exploit
interpret
recap
spearfishing
mass email