Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Social Engineering

Buy
Kali Linux Social Engineering, 9781783283279 (1783283270), Packt Publishing, 2013

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing

In Detail

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

What you will learn from this book

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you

Approach

This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.

Who this book is written for

Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

(HTML tags aren't allowed.)

SQL Primer: An Accelerated Introduction to SQL Basics
SQL Primer: An Accelerated Introduction to SQL Basics

Modern society is driven by data. Whether it is at a personal level, like a notebook containing scribbled notes; or at a countrywide level like Census data, it has permeated all our workflows. There is always a growing need to efficiently store and organize it so that meaningful information can be extracted out of raw data.

A
...

Special Edition Using Microsoft® Windows® XP Professional, Third Edition
Special Edition Using Microsoft® Windows® XP Professional, Third Edition

This updated edition covers all of the updates to Windows XP since it was released, including Service Packs 1 and 2, and Reloaded. From-the-trenches advice on upgrading to Windows XP Pro - including detailed rollout advice for IT managers. Plan and manage deployment of Windows easily and efficiently - whether you're upgrading...

Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data

A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...


SharePoint 2010 Enterprise Architect's Guidebook
SharePoint 2010 Enterprise Architect's Guidebook
MICROSOFT COLLABORATION and companion development technologies have really come a long way over the past 20 years. Over this time, many different technologies have come and gone in the blink of an eye. Others have built up momentum, improving with each new version, providing valuable new features to meet the ever-increasing digital...
iOS 7 Game Development
iOS 7 Game Development

Develop powerful, engaging games with readytouse utilities from Sprite Kit

About This Book

  • Pen your own endless runner game using Apple's new Sprite Kit framework
  • Enhance your user experience with easy-to-use animations and particle effects using Xcode 5
  • Utilize...
Database System Concepts
Database System Concepts

Database System Concepts, 5/e, is intended for a first course in databases at the junior or senior undergraduate, or first-year graduate, level. In addition to basic material for a first course, the text contains advanced material that can be used for course supplements, or as introductory material for an advanced course.

...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy