Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Social Engineering

Buy
Kali Linux Social Engineering, 9781783283279 (1783283270), Packt Publishing, 2013

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing

In Detail

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

What you will learn from this book

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you

Approach

This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.

Who this book is written for

Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

(HTML tags aren't allowed.)

Neurocritical Care (Cambridge Medicine)
Neurocritical Care (Cambridge Medicine)

Very few hospitals have dedicated neurointensive care units for management of critically ill neurological and neurosurgical patients. Frequently, these patients are managed in the medical or surgical ICU by non-neurologists, who have a hard time appreciating the delicate needs of these patients. This book is a straightforward, practical...

Creating and Digitizing Language Corpora, Volume 1: Synchronic Databases
Creating and Digitizing Language Corpora, Volume 1: Synchronic Databases
A range of electronic corpora has become increasingly accessible via the WWW and CD-ROM. This development coincided with improvements in the standards governing the collecting, encoding and archiving of such data. Less attention, however, has been paid to making other types of digital data available. This is especially true of that which one might...
Laptops For Seniors For Dummies (For Dummies (Computer/Tech))
Laptops For Seniors For Dummies (For Dummies (Computer/Tech))

It's never too late to get up and running on a laptop

Just bought your first laptop and not sure where to start? Here's the book you need. Easy-to-follow instructions (plus really easy-to-read fonts!) help you unlock the most convenient and fun aspects to using a laptop. Get advice on selecting the right laptop for...


Brodeur: Beyond the Crease
Brodeur: Beyond the Crease
THIS PREFACE IS BEING WRITTEN en route to London for my yearly pilgrimage to the All England Lawn Tennis and Croquet Club for The Championships, otherwise known as Wimbledon. This trip has become an annual opportunity to reflect upon the latest season of hockey, the sport that usually commands the bulk of my professional...
Essential System Administration, Third Edition
Essential System Administration, Third Edition

Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical...

Logical Foundations of Computer Science: International Symposium, LFCS 2007
Logical Foundations of Computer Science: International Symposium, LFCS 2007

The Symposium on Logical Foundations of Computer Science series provides a forum for the fast-growing body of work in the logical foundations of computer science, e.g., those areas of fundamental theoretical logic related to computer science. The LFCS series began with “Logic at Botik,” Pereslavl-Zalessky, 1989, which was...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy