This module of the SET allows an attacker to create a spoofed SMS and send it to a target. The main aim of the SMS is to convince a target to follow a certain link but when they do so, it leads them to a malicious site and the credentials stored in their browser are stolen. This module has been used by hacker groups in their quest to harvest many credentials that they can use in other attacks. The details on how to execute the spoof on the program are straightforward. After selecting this module from the welcome screen, which is normally listed as option 7, the program asks whether the user wants to create a new template or directly perform the spoofing attack. Since there are already good templates, we can just ...
SMS spoofing attack vector
Get Learn Social Engineering now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.