Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Social Engineering

Kali Linux Social Engineering, 9781783283279 (1783283270), Packt Publishing, 2013

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux


  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing

In Detail

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

What you will learn from this book

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you


This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.

Who this book is written for

Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

(HTML tags aren't allowed.)

Testing Web Security: Assessing the Security of Web Sites and Applications
Testing Web Security: Assessing the Security of Web Sites and Applications
Protect your company’s Web site from hack attacks with this guide to proven security-testing techniques

It’s only a matter of time before an unscrupulous would-be intruder decides to attack your organization’s Web site. If they’re successful, you could lose confidential customer information, intellectual property, or...

Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Data Merge and Styles for Adobe InDesign CC 2018: Creating Custom Documents for Mailouts and Presentation Packages
Harness the power of Adobe InDesign's data merge and style panel. Whether you're creating custom mail-outs or other mail-merge needs, familiarize yourself with this powerful InDesign panel in this in-depth, step-by-step guide. This book shows you how to easily create, edit, and print data merged documents that match...
Networks-on-Chips: Theory and Practice (Embedded Multi-core Systems)
Networks-on-Chips: Theory and Practice (Embedded Multi-core Systems)

This book addresses many challenging topics related to the NoC research area. It starts by studying 3D NoC architectures and progresses to a discussion of NoC resource allocation, processor traffic modeling, and formal verification. NoC protocols are examined at different layers of abstraction. Also, several emerging research issues in NoC...

Investing For Dummies, 4th Edition
Investing For Dummies, 4th Edition
Do you have a few investments that you would like to develop into a full investment plan? Would you like to know how to strengthen your portfolio? Perhaps you want to roll your 401(k) into a new plan? Whatever your agenda is, nowadays it’s hard to find good advice on where to invest your money.

Now you’ll have the ultimate...

Oracle Performance Tuning (Nutshell Handbooks)
Oracle Performance Tuning (Nutshell Handbooks)

The books in O'Reilly's Oracle series are authoritative -- they tell the whole story about complex topics, ranging from performance tuning to the use of packages in PL/SQL to new technologies like Power Objects. And they're independent; they're alternatives for readers who need to know how products and features really work....

SharePoint 2010 Administration Instant Reference
SharePoint 2010 Administration Instant Reference

There are a lot of SharePoint books out there, and you might be wondering, why another? We know that different people buy books for different reasons. In this book, we cater to the busiest of professionals. We respect your time and understand that many of you don’t have time to read an 800-page tome. You need quick answers to real...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy