Book Image

Kali Linux Social Engineering

By : Rahul Singh Patel
Book Image

Kali Linux Social Engineering

By: Rahul Singh Patel

Overview of this book

<p>Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.</p> <p>This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.</p> <p>Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.</p> <p>By the end of this book you will be able to test the security of any organization based on social engineering attacks.</p>
Table of Contents (11 chapters)

Elicitation


Elicitation is a kind of attack in which we set a stage for the actual attack; for example, sending a malicious e-mail to a person in which you have created an exciting scenario for the target about the benefits of the action we want them to take.

It can also be defined as extracting important information by applying logic while someone is communicating with you innocently.

Skills required in an attacker

The skills required to be a good attacker comprise of the following:

  • Natural flow in communication

    • A person who creates a calm and comfortable environment when communicating

    • According to human psychology, depending upon the situation, a person can react in two ways: aggressively and smoothly

    • The best thing for the attacker to do is to create a calm environment, and if they start to get along with the target with whom they are communicating, the person starts to open up

  • Being genuine

    • The attacker should be aware of the details of the subject and of what needs to be specifically communicated...