Book Image

Kali Linux Social Engineering

By : Rahul Singh Patel
Book Image

Kali Linux Social Engineering

By: Rahul Singh Patel

Overview of this book

<p>Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.</p> <p>This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.</p> <p>Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.</p> <p>By the end of this book you will be able to test the security of any organization based on social engineering attacks.</p>
Table of Contents (11 chapters)

Creating a payload and a listener


Before starting with how to create a payload, we will discuss some keywords that often come up in the day-to-day lives of IT security personnel.

Vulnerability

Vulnerability can be defined as a weakness or flaw in the computer software architecture or in the implementation which allows a hacker to use the weakness and compromise the machine based on the vulnerability.

Exploit

A program or piece of code that allows the attacker to compromise a machine based on its vulnerability is called an exploit.

Payload

This is a software program or malware sent along with the exploit to be executed on the vulnerable machine. Let's look at some examples of the different types of payload that are offered in Metasploit Framework.

The different types of payload are as follows:

  • Singles: This payload only performs a single operation such as transferring a file to remote machines or a standalone work station. For example:

    windows/shell/bind_tcp
  • Stagers: A stager delivers a part of the...