Social-Engineer Toolkit v2.5.3 Released

The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.

Currently SET has two main methods of attack, one is utilizing Metasploit payloads and Java-based attacks by setting up a malicious website (which you can clone whatever one you want) that ultimately delivers your payload. The second method is through file-format bugs and e-mail phishing. The second method supports your own open-mail relay, a customized sendmail open-relay, or Gmail integration to deliver your payloads through e-mail. The goal of SET is to bring awareness to the often forgotten attack vector of social-engineering.

Changelog v2.5.3

  • fixed a bug that would not let you in the custom exploits menu within fasttrack
  • fixed a bug that would cause _mssql not to be defined when attempting to custom connect to a SQL server
  • fixed a bug that would cause mssql custom connect once finished to go straight into the exploit menu
  • fixed a looping issue with the fasttrack menu

Download Social-Engineer Toolkit v2.5.3

MaxiSoler

www.artssec.com @maxisoler