Monthly Archives: May 2018

Social Engineering Toolkit; Creating a Fake Site

Social Engineering Toolkit (SET) is an advanced and easy-to-use computer-assisted social engineering toolset, created by the founders of TrustedSec. Now, I will try to create a fake login page using SET and credential harvester. The goal is to obtain the email and … Continue reading

Posted in Uncategorized | Comments Off on Social Engineering Toolkit; Creating a Fake Site

Social Engineering

Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. On security infrastructure, There are people, process, and technology. People are the weakest link in the security defense of any organization. Attack Process 1.Intelligence gathering 2.Identifying vulnerable … Continue reading

Posted in Uncategorized | Comments Off on Social Engineering

Playing with DVWA

We’ve already learned how to install DVWA, now, let’s try it to search some sites’ vulnerabilities. This is the DVWA homepage For a beginner, set the security level to low Go to command injection. You can ping any IP address … Continue reading

Posted in Uncategorized | Comments Off on Playing with DVWA