We now have Social Engineer Toolkit version 3.5!
This release is code named – “Creepy Karl.”
The Social Engineering Toolkit (SET) is an open source, python-driven, social-engineering penetration testing framework of custom tools which solely focuses on attacking the human element of penetration testing. It was designed in order to arm penetration testers and security researchers with the ability to effectively test heavily advanced social-engineering attacks armed with logical methods. The Social Engineer Toolkit leverages multiple attack vectors that take advantage of the human element of security in an effort to target attackers.
Social Engineer Toolkit Official change log:
- Fixed a bug in command center that would cause it to not load properly.
- Fixed a bug in the new Java Applet Field Bytecode that would cause it to not properly select the payload
- Added compatibility for IE10 on the Java Applet Attack Vector
- Turned AUTO_MIGRATE=OFF to AUTO_MIGRATE=ON by default, allows sticky processes to free up when exploitation occurs
- Added a new config option DEPLOY_BINARIES. When this is turned OFF, the Java Applet will only use the POWERSHELL_INJECTION technique and never deploy a binary. Note that you must know if the victim has POWERSHELL installed.
- Fixed a couple typos in the credential harvester
svn co http://svn.trustedsec.com/social_engine
Visit website -
https://www.trustedsec.com/
For more information -
http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_(SET)
Previous posts regarding SET -
http://santoshdudhade.blogspot.in/2012/07/social-engineer-toolkit-34.html
http://santoshdudhade.blogspot.in/2012/05/social-engineer-toolkit-set-33-released.html
Post a Comment