Sunday 31 March 2013

What is SET (Social Engineering Toolkit) ?





? What is SET (Social Engineering Toolkit) ?


                          SET is one of the most important part of Hacking, Basically it is used whenever any attacker needs to harvest more information about victim's. In simple words an attacker will use any type of trick or make his victim fool to harvest more information  like "Security Question, Guessing password, Primary E-mail addresses" Etc.



? There are four types of SET Attack :-




  • Phishing and Spear Phishing attacks.
  • I LOVE YOU virus.
  • D-Group Force attack.
  • Deluding attack. 



? I Love you virus.


  • I love you virus is a attack in which an attacker create a fake Identity of Female or any other Girl identity to make victim fool and steal passwords and important data.
  • I love you attack normally used in Phishing case and Keylogging.
  • I love you virus mostly used to make victim fool and steal Information.
  • An attacker can also hack victim's wife or girlfriend account and can steal any information he want.
  • In I love you virus an attacker will delude victim's mind and heart to fall him in fake love and give a chance to be trustworthy.
  • An attacker will make mobile as a trust and win victim's trust, an attacker will create a fake account or fake Identity of Beautiful girl to make victim fool. 



    ? Phishing and Spear Phishing attacks.

    • Phishing is also consider as SET attacks.
    • In Phishing an attacker will force victim to login to his Phished page  or make victim fool and steal Information such as "E-mail ID, Password, Security Question" Etc.
    • You can learn Phishing tutorial from here.
    • Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business -- a bank, or credit company --requesting "verification" of information and warning of some dire consequence if it is not provided.
    • The e-mail usually contains a link to a fraudulent we page that seems legitimate with comapny logos and content and has a form requesting everything from home address to an ATM card's PIN.



    ? D- Group force attack.




    • Here, more than 4-5 people's attacks on victim to steal data such as E-mail ID or password, that can gain access to victim's a/c.
    • In D-group force attack, more then 3 people will become victim's friend and all will make their victim fool or all member will lie as a united group and victim will think, I can trust them coz, all can't lie.
    • So, D-group attack is also called as Truck attack.
    • Basically, an attacker or attacker group will Truck attack then only when all doors are closed.

    ? Deluding attack.





    • Deluding is commonly used attack in SET.
    • Deluding is the process of changing and trying to delude the human mind in any how condition and situation.
    • In deluding process an attacker will make victim fool and delude his heart to fulfill his want and get success in attack.
    • Deluding attack contains many types of deluding process such as :-


            ? Making friendship and close relationship


            ? Changing human's mind Environment




            ? Force victim to complete process


            ? Gain trust and become's trustworthy




            ? Deluding heart and Mind to steal victim's data

            ? Making fool with many processes.


    Tips and Topics to be remember.

    • Be careful around your Environment.
    • Many FB, G-mail, yahoo etc account get hacked because of no-knowledge of SET attacks.
    • This is for Eduational Purpose only.

      No comments: