Book Image

Kali Linux Social Engineering

By : Rahul Singh Patel
Book Image

Kali Linux Social Engineering

By: Rahul Singh Patel

Overview of this book

<p>Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.</p> <p>This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.</p> <p>Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.</p> <p>By the end of this book you will be able to test the security of any organization based on social engineering attacks.</p>
Table of Contents (11 chapters)

Penetration testing tools


In this section, we are going to discuss some other penetration testing tools that are used for performing social engineering attacks for security audits. These tools are as follows:

  • Browser Exploitation Framework (BeEF)

  • Social Engineering Framework (SEF)

The Browser Exploitation Framework

The Browser Exploitation Framework is a penetration testing tool written in Ruby to launch client-side attacks against a targeted web browser to showcase both the web browser's weakness as well as to perform attacks through the web browser.

BeEF works on client-server architecture where the sever application manages the connected clients, also known as zombies or target, and JavaScript hooks that run in the web browser of the target machine.

BeEF uses vulnerabilities of the web browser to gain control of the target machine. It can be invoked from the menu as shown in the following screenshot:

Once the BeEF link on the menu bar has been opened by the attacker, the BeEF Server will run...