![kali social engineering toolkit tutorial kali social engineering toolkit tutorial](https://www.hackeracademy.org/wp-content/uploads/2021/01/pexels-rodrigo-santos-3888151.jpg)
Here you have to create a directory called Socialphish.
#Kali social engineering toolkit tutorial install
In this directory, you have to install the tool.
![kali social engineering toolkit tutorial kali social engineering toolkit tutorial](http://4.bp.blogspot.com/-GaJ3x5DvyEM/UfbZ6o3hRiI/AAAAAAAAADU/uOGIx9scYUA/s1600/2.png)
![kali social engineering toolkit tutorial kali social engineering toolkit tutorial](https://hub.packtpub.com/wp-content/uploads/2013/07/maxresdefault.jpg)
Fake Facebook Phishing Page made by Kali Linux Installation: Step 1: Open your Kali Linux operating system. When he logs in through your phishing link you will get his/her credentials in a file which is located at other location> Computer > VAR > WWW. Step 12: Using, make your IP address shorter and send it to the victim. It's main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
#Kali social engineering toolkit tutorial windows
In our case it is set:webattack> Enter the URL to clone: Step 11: Go to other location > Computer > VAR > WWW and move every one of the files from www folder to HTML folder. Enable Windows subsystem Open PowerShell as Administrator and run: Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux Restart your computer when prompted. The SET (or Social Engineering Toolkit) is a commonly known open source framework available on the Kali Linux distribution. The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. You can find your IP address by using the ifconfig command In this video we will look at Credential Harvester Attack Method under Social Engineer Attacks using setoolkit in Kali Linux Disclaimer This video is for EDU. Set:webattack> IP address for the POST back in Harvester/Tabnabbing : (your IP address) Step 9: Give your IP address to set up and start the attack Step 8: Select the site cloner option by selecting the appropriate option