Jump to content

Search the Community

Showing results for tags 'social engineering toolkit'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 5 results

  1. Hello fellows! Once again I need your help ! I have a problem with the ports I'm using on the Social Engineering Toolkit. By default the Credentials Harvester runs on port 80 but I wanted to change the port to another one like 443 or 4444 etc. However when I change the port from the set.config file the Credentials Harvester doesn't work so I changed the port that apache2 was listening on to the same port the Creds Harvester was listening on and when I try to run it I get this message: The best way to use this attack is if username and password form fields are available. Regardless, thi
  2. So recently i disabled apache and start using python def server.So i normally use Social Engineering Toolkit for credential harvesting and instead i got normal output with username and password i got this: - - [22/May/2015 02:57:14] "GET / HTTP/1.1" 200 - [*] WE GOT A HIT! Printing the output: PARAM: __a=1 PARAM: __dyn=7w86i3S2e4oK4osXWU5O12wAxu3mdwqovzEkxu PARAM: __req=1 PARAM: __rev=1749615 POSSIBLE USERNAME FIELD FOUND: __user=0 PARAM: lsd=AVqNsoTe PARAM: miny_encode_ms=13 PARAM: ph=V3 POSSIBLE USERNAME FIELD FOUND: q=Miny1~191~,~,"~","~":~":"~.~0~],["~",{"~login~null~php~",~cl
  3. Hey! Tested on the iPhone 4 running Ios 7 jail broken by using evasion7 I wanted to talk about using a iDevice (ios 7)as a pen testing device . [ Noob Friendly ] First off , why should you use a iDevice as a pen testing device ? Its portable Not noticeable it looks cool :) its pretty fast IOS == Unix It can easily be used with the pineapple ;) Let's move on , so how do you make your iDevice into a pentesting device ? First you need jailbreak your iDevice (eg ; Evasion7) Open Cydia Adding repositories by going to "Manage" and then "Sources" and then "edit" and then "add" Then add all the
  4. Hello I have been a SET user for a long time, recently I have tried to use the website vector's site cloning hack and everything seems to work well until I try to use the cloning of the hotmail page, no matter what i try i get a blank page, it loads and shows up in SET but all I get is a blank, I have tried saving an offline page and the only way to get anything is to save as html NOT a complete web page and the sign in bars are tiny and not cloned correctly. Can anyone please give me some advice or help, I am stumped. Please and thanks
  5. I am able to run msfconsole with no problems, however when I use SET to do a metasploit browser exploit it crashes with this: [-] Launching MSF Listener... [-] This may take a few to load MSF... /opt/metasploit/apps/pro/msf3/lib/fastlib.rb:374:in `require': no such file to load -- rubygems (LoadError) from /opt/metasploit/apps/pro/msf3/lib/fastlib.rb:374:in `require' from <internal:gem_prelude>:158:in `load_full_rubygems_library' from <internal:gem_prelude>:270:in `const_missing' from /opt/metasploit/apps/pro/msf3/lib/msf/sanity.rb:40:in `<top (
  • Create New...