This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of terms of service, or just not a good idea. It is provided here to give you information you can use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!
This chapter provides an introduction to social engineering attacks and the basic concepts behind them. You will be introduced to the following topics:
Understanding social engineering attacks
Phases of a social engineering attack
Types of social engineering attacks
Clone a website to gain the target's password
Policies and procedure
Countermeasures to social engineering attacks