Book Image

Kali Linux Social Engineering

By : Rahul Singh Patel
Book Image

Kali Linux Social Engineering

By: Rahul Singh Patel

Overview of this book

<p>Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.</p> <p>This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.</p> <p>Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.</p> <p>By the end of this book you will be able to test the security of any organization based on social engineering attacks.</p>
Table of Contents (11 chapters)

Understanding the mass mailer attack


The next attack that we are going to discuss is called the mass mailer attack, or E-bomb. The name itself is clear; we are using the mailer to send numerous e-mails to a single target or multiple targets.

The mass mailer attack has two variations, which are given as follows:

  • E-mail attack on a single e-mail address

  • E-mail attack using a mass mailer

A mass mailer is commonly used to send a phishing page link to the e-mail ID of the target. The attacker needs to be aware of the e-mail harvester technique to be efficient in this attack. There is a useful Ruby script in Kali Linux named jigsaw, which can be very useful to perform an e-mail harvester attack .The script is located here:

kali@root :usr/bin/jigsaw 

A mass mailer is also used to perform a Distributed Denial of Service (DDoS) attack through the creation of zombie "bots'' and by controlling the bots through the control center.

The steps required to perform a mass mailer attack are as follows:

  1. Mass Mailer...