This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of terms of service, or just not a good idea. It is provided here to give you information you can use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!
In this chapter, we will be covering different attacks that can be performed on the application layer to compromise a system. The topics discussed in this chapter will come in use when you decide you want to test the security of an organization against social engineering attacks. Such attacks provide crucial information and guidelines to help formulate new policies and procedure. They also show whether the employees are following the policies and procedures set by the organization.
The following topics will be covered in this chapter...