Skip to Main Content
November 08, 2011

The Social-Engineer Toolkit (SET) v2.4 "Renegade" has been released.

Written by David Kennedy
Security Testing & Analysis Social Engineering
secmaniac
How is that for rapid development? Having more than one person working on a project is really starting to ramp up what SET is all about. This release has a completely rewritten and stable Wireless Attack Vector written by pr1me, some major bug fixes, and additions to the MSSQL bruter within Fast-Track. The wireless attack vector will now properly redirect victims back to the SET attack machine and have a full fledged fake wireless access point. Changelog below: ~~~~~~~~~~~~~~~~ version 2.4 ~~~~~~~~~~~~~~~~ * Rehauled the fake ap attack for menu style and stability * Added the option for fake ap attack to use either a 10.0.0.0 or 192.168.10.0 IP ranges * Added commands to properly bring up tun interface in fake ap attack * Added variables to the dhcp3 launch command for stability * Added some color styling to the check_length error message * Fixed a minor code issue in stop_wifiattack.py * Fixed a minor issue that caused the log file to error out if file was not found * Added a descrpition if no MSSQL servers were identified during a scan * Fixed a bug that would brute force a null IP address * Fixed a bug in the man left in the middle that would cause it to error out