Email Hacking using Credential Harvester Attack (SET)

Learn how to write your own hacking tools in python:

This video covers the Credential Harvester Attack of Social Engineering Toolkit, which is basically used for making an Automated clone and get credentials of the victim.

I had done it with a small setup of One machine with backtrack installed and other one being XP as the victim.

However a small issue comes with it. Why the victim will open your IP? 

Well simple, get into the DNS server, or create a fake DNS server and DHCP, and start giving IP with your own authorization. Once you are done with fake DNS, make a fake entry for poting to your Fake IP address. 

In case any issue comes in between, feel free to contact me at :)

Stay Focused, Keep Hacking.


  1. Sir, Can I Use No-ip For Fake Dns Generation or you have better way To Confuse The Victim...

  2. if u r in a network, go for fake DNS server (karmetasploit can be handy).

  3. Nice information! I am intimidated by the excellence of information. There are a lot of high-quality funds here. I am sure I will visit this site again soon.
    I know something information,to know you can click here
    Test and Tag brisbane
    rcd testing services brisbane

  4. devender je email keisy heack karen

  5. Obtaining this type of degree is a milestone in life, and one that can lead to greater financial packages being offered. Instead of attending a traditional bricks and mortar college, there is now the possibility of enrolling on an online course. online hw help

  6. Our certified technicians can help you to setup your email accounts on MAC Mail, Outlook, Windows Mail and Thunderbird etc. at this site

  7. The law is clear: it denies false or deceiving header data and beguiling headlines, obliges senders to recognize their messages as an ad, obliges senders to pass on their area, obliges senders to give a "quit" for future messages for beneficiaries and brief (inside of 10 days) appreciation of that demand, and obliges senders to screen their email showcasing exercises regardless of the possibility that they are outsourced to an outsider.
    extract emails