InfoSec Blog
3 min readDec 28, 2018

Using SET tool kit to perform Website Cloning in Kali Linux

SET Tool Kit: The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the https://www.social-engineer.org launch and has quickly become a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community, it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.

Step 1: check your IP address(Kali Linux)

Step 2: check all the machines inside the network

Command: Netdiscover –r 192.168.243.0/24

We got the N/w ip

Default gateway

Broadcast ip

Ping the IP (unknown )to check whether host is live or not:

Command: Ping 192.168.243.129

Now open social engineering framework in kali Linux

Command: Setoolkit

Click the first option :

1 social engineering attacks

Now since we have to perform the website cloning so we have to chose the option

2) Website Attack Vectors

Then click on

5) Web Jacking Attack Method

Then on

2) Site Cloner

After this it will ask you for an ip address (put your kali linux machine ip address)

After this it will ask you to enter the URL of the website you want to clone.

In this let's clone the facebook website

Paste the url in the set tool kit terminal and it will start cloning it.

Now url has been cloned. you have to send the cloned website to the victim so that he can click on the link and you will get his credentials in your Kali Linux.

Once the victim will click on click on the link victim will be redirected to the login page.

Here I am typing the details :

User name: xxxxxxxxxx@gmail.com

Password:123456

Now go to you Kali Linux and go to the location :

root/.set//reports/2018–12–27 08:03:52.640607.html

Here in this file, you will get all the credentials in clear text.

This is how you can get the credentials of the victim.

Stay tuned for next article.

Enjoy ☺ ☺

For more articles:- https://www.infosectrain.com/