,,dP `Y.
Y:d8P 8,
P,88b ,`8
dY88888
Pd88P',... ,d888o.8
:88'dd888888o. d8888`88:
,:Y:d8888888888b ,d88888:88:
:::b88d888888888b. ,d888888bY8b
b:P8;888888888888. ,88888888888P
8:8.8888888888888: Y8888888888P
YP88d8888888888P' ""888888"Y
:bY8888P"""""''
:bY888, ,P
Y,8888 d. ,- ,8'
`Y8888, ,888888o ,P
Y888b ,88888888 ,P'
`Y88b dPY888888OP
)8P, ,b
:p d,'d`b, ,8
. dP' d8':
'8P" d8P' 8 - p
iNK H0RN Presents .. d' 8P' d' ' ;
,dooood88: , ,d `` `b.
.o8"'""""""Y8.b 8 `"'' .o' ` """ob.
dP' `8: K dP'' "`Yo.
dP 88 8b. ,d' ``b
:8: dP ,,'
`8: :b dP ,,
,8b :8 dP ,, d
:8P :8dP d' d 8
:8: d8P d' d88 :P
d8' ,88' ,P ,d888 d'
dP' ,P d8888b
,8: ,dP' 8. d8''88' :8
:8 d8P' d88b d"' 88 :8
d: ,d8P' ,8P""". 88 :P
8 ,88P' d' 88 :8
,8 d8P 8 Rls Date : 11/05/2020 88 :8
d: 8P ,: Type : Tech Bookware :88 :8
8',8:,d d' Supplier : iNK H0RN :8: :8
,8,8P'8' ,8 Disks : 1 CD 8' :8
:8`' d' d' Archive : i-pssewtst 8 p:
`8 ,P :8 # Files : 33 x 15 MB :8: p:
`8, d8888 88b
,d::888 888 Y:
YK,oo8P :888 888. `b
`8888P :888: ,888: Y,
8888: 888b Y.
: Pluralsight.com - Social Engineering with the Social-Engineer Toolkit
: DESCRIPTION
The Social-Engineer Toolkit (SET) is an open-source
Python-driven tool aimed at penetration testing around social
engineering. Vulnerability scanners will find the security
issues in computer systems, but cannot find them in a human
being. If you want a good tool then SET is there to help you
assess your company security cavity. In this course, Social
Engineering with the Social-Engineer Toolkit, you'll learn the
social engineering attacks that SET supports. First, you'll
discover how the spear phishing attack works in SET in
combination with an e-mail attack. Next, you'll explore how to
use the website attack vector, along with creating a payload and
a listener. Then, you'll delve into the mighty PowerShell
attacks and how to take advantage of this command line tool to
bypass the security on the Windows operating system. After that,
you'll explore the world of electronics to learn how to use the
hardware-based module in SET. Finally, you'll learn about
multiple ways to deal with the Social-Engineer Toolkit, such as
the Wireless Access point attack, the QRCode generator, SMS
spoofing, and the infectious media generator. By the end of this
course, you'll have the fundamental knowledge to utilize the
Social-Engineer Toolkit efficiently.
Level: Intermediate
Duration: 2h 33m
Released: 11 Oct 2017
https://app.pluralsight.com/library/courses/social-engineering-with-social-engineer-toolkit
Interested in joining iNK ? We're currently looking to expand.
: Suppliers - Bookware / Training / Apps
: Suppliers - Online Subscription Accounts
: Suppliers - MCT / MCSE Access
: Other - Cracking / Scripting / Coding Skills
8 : INSTALLATION
8 a. Extract
8 b. Mount/Burn
8 c. Play & Learn
: RESPECT DUE
JGTiSO .. BRD .. ApoLLo .. XQZT .. BooKWoRM