Kali Linux Social Engineering

Effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux
Preview in Mapt
Code Files

Kali Linux Social Engineering

Rahul Singh Patel

Effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux
Mapt Subscription
FREE
$29.99/m after trial
eBook
$12.60
RRP $17.99
Save 29%
Print + eBook
$29.99
RRP $29.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$12.60
$29.99
$29.99p/m after trial
RRP $17.99
RRP $29.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Kali Linux Social Engineering Book Cover
Kali Linux Social Engineering
$ 17.99
$ 12.60
Digital Forensics with Kali Linux Book Cover
Digital Forensics with Kali Linux
$ 35.99
$ 25.20
Buy 2 for $30.10
Save $23.88
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781783283279
Paperback84 pages

Book Description

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

Table of Contents

Chapter 1: Introduction to Social Engineering Attacks
Understanding social engineering attacks
Phases in a social engineering attack
Types of social engineering
Computer-based social engineering tools – Social-Engineering Toolkit (SET)
Policies and procedure
Summary
Chapter 2: Understanding Website Attack Vectors
Phishing and e-mail hacking – Credential Harvester attack
Java Applet Attack
Defense against these attacks
Summary
Chapter 3: Performing Client-side Attacks through SET
Creating a payload and a listener
Understanding the mass mailer attack
Understanding the SMS spoofing attack vector
Summary
Chapter 4: Understanding Social Engineering Attacks
Identity theft
Stealing an identity
Elicitation
Penetration testing tools
Summary

What You Will Learn

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you

Authors

Table of Contents

Chapter 1: Introduction to Social Engineering Attacks
Understanding social engineering attacks
Phases in a social engineering attack
Types of social engineering
Computer-based social engineering tools – Social-Engineering Toolkit (SET)
Policies and procedure
Summary
Chapter 2: Understanding Website Attack Vectors
Phishing and e-mail hacking – Credential Harvester attack
Java Applet Attack
Defense against these attacks
Summary
Chapter 3: Performing Client-side Attacks through SET
Creating a payload and a listener
Understanding the mass mailer attack
Understanding the SMS spoofing attack vector
Summary
Chapter 4: Understanding Social Engineering Attacks
Identity theft
Stealing an identity
Elicitation
Penetration testing tools
Summary

Book Details

ISBN 139781783283279
Paperback84 pages
Read More

Read More Reviews

Recommended for You

Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Kali Linux Cookbook Book Cover
Kali Linux Cookbook
$ 24.99
$ 5.00
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20
Kali Linux - Assuring Security by Penetration Testing Book Cover
Kali Linux - Assuring Security by Penetration Testing
$ 26.99
$ 18.90
Mastering Metasploit Book Cover
Mastering Metasploit
$ 29.99
$ 21.00