Kali Linux - Understanding the SMS spoofing attack vector

dunkelh3it

BANNED
Messages
547
Reputation
37
Reaction score
1,106
Points
93
Telegram
@Dunkelh3it
Please note, if you want to make a deal with this user, that it is blocked.

Understanding the SMS spoofing attack vector​

The SMS spoofing attack allows the attacker to send a text SMS using SET without revealing his/her true identity or by using someone else's identity.
Let's go through the steps required to perform this attack:
  1. Start the SET toolkit. You will see the following welcome screen:
    3279OS_03_09.jpg
  2. SMS Spoofing Attack Vector is present under Social-Engineering Attacks, as shown in the preceding screenshot. This module in SET was created by the team at TB-security.com.
    3279OS_03_10.jpg
  3. The SMS spoofing attack vector allows you to craft your own SMSes and send them to the target using some third-party number without ever interacting with the user.
  4. From the Social-Engineering Attacks menu, select the SMS Spoofing Attack Vector option. Once selected, we will be presented with the following screen, where we need to decide on the decision regarding the body of the SMS:
    3279OS_03_11.jpg
  5. Let us first see how we can create a custom template:
    Set:sms> 2
    [ **********] Custom Template Generator [*********]
    Set:sms...
 
Top