Kali Linux Social Engineering by Rahul Singh Patel
2013 | ISBN: 1783283270 | English | 84 Pages | PDF | 4 MB
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
Overview
Learn about various attacks and tips and tricks to avoid them
Get a grip on efficient ways to perform penetration testing.
Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing
In Detail
Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.
This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.
Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack
PLZ SEED
SHARING IS CARING