In this chapter, we have covered various types of attacks that include both nontechnical and as well as technical attacks. We have also learned how, with the help of the browser, we can infiltrate any secured network and how it's not too difficult to generate e-mail addresses with the help of automation tools.
We have covered how one can steal an identity (identity theft) and learned in brief about the BeEF and open source Social Engineering Framework. We have also briefly mentioned countermeasures against these attacks, by being aware of what information is available and what software you can use to protect yourself.