Book Image

Kali Linux Social Engineering

By : Rahul Singh Patel
Book Image

Kali Linux Social Engineering

By: Rahul Singh Patel

Overview of this book

<p>Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.</p> <p>This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.</p> <p>Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.</p> <p>By the end of this book you will be able to test the security of any organization based on social engineering attacks.</p>
Table of Contents (11 chapters)

Stealing an identity


In this section we will discuss the practicalities of identity theft. The steps that an attacker follows to perform online identity theft are:

  1. Find the targets e-mail ID, for example, . This we can easily get with the help of Google and some Google hacks, through Google harvesting (the method used to collect e-mail IDs), or through LinkedIn.

  2. Once we have the e-mail ID of the target, we need to know more about them. We can get this information from LinkedIn or Facebook using the e-mail searching options.

  3. Once we get the e-mail ID, their interim details, and picture, we are ready to rock and roll.

  4. After that we need to create a look-a-like e-mail ID for the target and create an online account using the same picture and all the details that we have found and start sending fake requests to their friends using reasons such as "I lost my old account", "someone hacked into my account", and other such similar stories.

The next method that we are going to discuss...