Best to view it full-screen (double-click on the vid). The SET rely 100% on the metasploit-framework. So you want too take a look at that project as well to fully understand the inner workings of SET :)

Also posted on my lvdeijk.wordpress.com

Rating:
  • Currently 5/5 stars.

Views: 368

Comment

You need to be a member of Dissecting The Hack to add comments!

Join Dissecting The Hack

Latest Activity

Anton Vyacheslav is now a member of Dissecting The Hack
Dec 9, 2018
bernardorichard updated their profile
Nov 28, 2018
Sam Mccalla is now a member of Dissecting The Hack
Nov 19, 2018
bernardorichard is now a member of Dissecting The Hack
Oct 24, 2018

© 2019   Created by Marcus J. Carey.   Powered by

Badges  |  Report an Issue  |  Terms of Service