{"id":162,"date":"2020-05-14T14:42:08","date_gmt":"2020-05-14T07:42:08","guid":{"rendered":"http:\/\/beauty27.blog.binusian.org\/?p=162"},"modified":"2020-06-10T15:47:26","modified_gmt":"2020-06-10T08:47:26","slug":"week-7-2","status":"publish","type":"post","link":"https:\/\/beauty27.blog.binusian.org\/?p=162","title":{"rendered":"Week 7"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">Social Engineering Tools<\/h4>\n\n\n\n<p><strong>Social engineering<\/strong>&nbsp;is a technique used by criminals and cyber-crooks to trick users into revealing confidential information. The data obtained is then used to gain access to systems and carry out actions to the detriment of the person or organization whose data has been revealed <\/p>\n\n\n\n<p>Tools that can be used for social engineering are Maltego or SET<\/p>\n\n\n\n<p><strong>DEMO using SET (Social Engineering Toolkit) Credential Harvester<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"812\" height=\"653\" src=\"http:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image.png\" alt=\"\" class=\"wp-image-163\" srcset=\"https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image.png 812w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-300x241.png 300w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-768x618.png 768w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><figcaption>img<\/figcaption><\/figure>\n\n\n\n<p>choose 2<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"790\" height=\"326\" src=\"http:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-1.png\" alt=\"\" class=\"wp-image-164\" srcset=\"https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-1.png 790w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-1-300x124.png 300w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-1-768x317.png 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption>img2<\/figcaption><\/figure>\n\n\n\n<p>choose 3<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"773\" height=\"401\" src=\"http:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-2.png\" alt=\"\" class=\"wp-image-165\" srcset=\"https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-2.png 773w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-2-300x156.png 300w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-2-768x398.png 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/figure>\n\n\n\n<p>choose 2<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"602\" src=\"http:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-3.png\" alt=\"\" class=\"wp-image-174\" srcset=\"https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-3.png 794w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-3-300x227.png 300w, https:\/\/beauty27.blog.binusian.org\/files\/2020\/06\/image-3-768x582.png 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Engineering Tools Social engineering&nbsp;is a technique used by criminals and cyber-crooks to trick users into revealing confidential information. The data obtained is then used to gain access to systems and carry out actions to the detriment of the person or organization whose data has been revealed Tools that can be used for social engineering [&hellip;]<\/p>\n","protected":false},"author":9231,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-162","post","type-post","status-publish","format-standard","hentry","category-ethicalhacking"],"_links":{"self":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/users\/9231"}],"replies":[{"embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=162"}],"version-history":[{"count":2,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/162\/revisions"}],"predecessor-version":[{"id":175,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/162\/revisions\/175"}],"wp:attachment":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}