Social Engineering Using Kali Linux PDF | Infosecwithme
Credit to Rahul Singh Patel
Click on Download button | Infosecwithme |
Table of content:
Chapter 1: Introduction to Social Engineering Attacks
Understanding social engineering attacksPhases in a social engineering attack
Research
Hook
Play
Exit
Types of social engineering
Human-based social engineering
Computer-based social engineering
Computer-based social engineering tools – Social-Engineering Toolkit (SET)
Website cloning
Policies and procedure
Training
Incident response system
Classification of information
Password policies
Summary
Chapter 2: Understanding Website Attack Vectors
Phishing and e-mail hacking – Credential Harvester attackUpdating your Social-Engineering Toolkit
Web jacking
Spear-phishing attack vector
Java Applet Attack
Defense against these attacks
Chapter 3: Performing Client-side Attacks through SET
Creating a payload and a listenerVulnerability
Exploit
Payload
Steps to create a payload and listener
Understanding the mass mailer attack
Understanding the SMS spoofing attack vector
The predefined template
Summary
Chapter 4: Understanding Social Engineering Attacks
Identity theftStealing an identity
Elicitation
Skills required in an attacker
Penetration testing tools
The Browser Exploitation Framework
The Social Engineering Framework
Sefemails
Sefphish
Sefnames
SefPayload
Defense
Summary
Click on Download Button | Infosecwithme |
Social Engineering Using Kali Linux PDF | Infosecwithme
Reviewed by BlackHat
on
12:00 AM
Rating:
No comments:
Thanks for Valuable Comment. I will review and get back.