Kali Linux Social Engineering


Kali Linux Social Engineering
eBook: $17.99
Formats: PDF, PacktLib, ePub and Mobi formats
$15.30
save 15%!
Print + free eBook + free PacktLib access to the book: $47.98    Print cover: $29.99
$45.29
save 6%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing

Book Details

Language : English
Paperback : 84 pages [ 235mm x 191mm ]
Release Date : December 2013
ISBN : 1783283270
ISBN 13 : 9781783283279
Author(s) : Rahul Singh Patel
Topics and Technologies : All Books, Web Development, Open Source


Table of Contents

Preface
Chapter 1: Introduction to Social Engineering Attacks
Chapter 2: Understanding Website Attack Vectors
Chapter 3: Performing Client-side Attacks through SET
Chapter 4: Understanding Social Engineering Attacks
Index
  • Chapter 1: Introduction to Social Engineering Attacks
    • Understanding social engineering attacks
    • Phases in a social engineering attack
      • Research
      • Hook
      • Play
      • Exit
    • Types of social engineering
      • Human-based social engineering
      • Computer-based social engineering
    • Computer-based social engineering tools – Social-Engineering Toolkit (SET)
      • Website cloning
    • Policies and procedure
      • Training
      • Incident response system
      • Classification of information
      • Password policies
    • Summary
  • Chapter 2: Understanding Website Attack Vectors
    • Phishing and e-mail hacking – Credential Harvester attack
      • Updating your Social-Engineering Toolkit
      • Web jacking
        • Spear-phishing attack vector
    • Java Applet Attack
    • Defense against these attacks
    • Summary
  • Chapter 3: Performing Client-side Attacks through SET
    • Creating a payload and a listener
      • Vulnerability
      • Exploit
      • Payload
      • Steps to create a payload and listener
    • Understanding the mass mailer attack
    • Understanding the SMS spoofing attack vector
      • The predefined template
    • Summary
  • Chapter 4: Understanding Social Engineering Attacks
    • Identity theft
    • Stealing an identity
    • Elicitation
      • Skills required in an attacker
    • Penetration testing tools
      • The Browser Exploitation Framework
      • The Social Engineering Framework
        • Sefemails
        • Sefphish
        • Sefnames
        • SefPayload
        • Defense
    • Summary

Rahul Singh Patel

Rahul Singh Patel is currently working as an independent security consultant in India. Among his many other responsibilities, he performs web application security assessments and penetration testing.

Rahul started his journey in the world of computer hacking while still at school. He is very passionate about the subject of penetration testing and security research on chip-based security. Over the years, he has continued his attempts to keep himself up-to-date with the latest technology advancements in IT security.

Sorry, we don't have any reviews for this title yet.

Submit Errata

Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.

Sample chapters

You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

Frequently bought together

Kali Linux Social Engineering +    Pentaho Business Analytics Cookbook =
50% Off
the second eBook
Price for both: $34.50

Buy both these recommended eBooks together and get 50% off the cheapest eBook.

What you will learn from this book

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you

In Detail

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

Approach

This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.

Who this book is for

Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software