top of page

After school activities

Public·2 members
Jaxon Reed
Jaxon Reed

How Hackers Hack Facebook With Kali Linux And SET(Social Engineering Toolkit)

Mostly SET Social Engineering toolkit is widely used for hacking Facebook, twitter, Instagram, LinkedIn and other social sites by creating fake (Phishing Page). but generally this kit has been developed for social engineering attack. Social engineering toolkit exist in Kali Linux by default.I saw many people created a phishing page for Facebook hacking by using SET within 5 minutes.Problem: their page is working only on Local Area Network, If they send this link to the victim through email, chat or other method. The page is not working there.

How hackers hack Facebook with Kali Linux and SET(Social Engineering Toolkit)

The Social-Engineer Toolkit (SET) is intended to perform very targeted against the human attack vector. The SET toolkit was developed by David Kennedy and his team. The attacks included within the toolbox are intended to be used for testing purposes. Even though we can hack Facebook with Kali Linux, it is illegal to do so without proper permission from the parties involved.

Many newbie hackers focus upon the technical aspects of hacking and fail to give enough attention to social engineering. In fact, I would say that technical hacks should ONLY be attempted if social engineering attacks fail. Why bother spending hours or days trying to hack a password if someone will simply give it to you?

Social engineering is the act of getting people to give you the information you seek, usually by gaining their trust. That trust may be gained by posing as someone in authority, a colleague, or just someone who needs help. Some of the best hackers in history, including Kevin Mitnick, have been great social engineers.

Hack Facebook with Social Engineering, you can apply this method to hack Instagram accounts as well. But this tutorial is focused exclusively on how to hack facebook accounts on Kali Linux with the Social Engineering Toolkit. But if you have just a little imagination you can apply the same steps you will learn in this tutorial and duplicate the process to hack another account for another website as well. Is pretty much the same with just a few small variations.

Social Engineering attacks are the various cons used by the hackers to trick people into providing sensitive data to the attackers. There are various type of social engineering attacks, some of the popular attacks are :-

Welcome to another Facebook Hacking tutorial. If you want to know how to hack Facebook with Kali Linux, you have come to the right place. In this article, we will be showing you how you can hack Facebook with Kali Linux and social engineering toolkit.

Phishing attack using kali Linux is a form of a cyber attack that typically relies on email or other electronic communication methods such as text messages and phone calls. It is one of the most popular techniques of social engineering. Where hackers pose as a trustworthy organization or entity and trick users into revealing sensitive and confidential information.

In nowadays QR codes are almost everywhere.You can see them in every product,in concert tickets even in advertisements on the streets.The main purpose of these QR Codes is to be used for marketing purposes or for people who would like to know more information about a specific product or service.However this wide use of QR codes can be an extra advantage for hackers and ethical penetration testers.Hackers they can use this QR codes in order to attack unsuspicious users and penetration testers can include this type of attack in their social engineering engagements.In this article we will examine this type of attack.

Natalia Godyla: You mentioned that part of the challenge right now is that users are just getting smarter and so the hackers are responding in turn. If our users have been taught cybersecurity education on what is a phishing email, how is the evolution of education going to happen or what's next for education for the users so that they can prepare for this next wave of social engineering attacks?


Welcome to the group! You can connect with other members, ge...


bottom of page