Index
A
- Advance persistent threat (APT) attacks / Spear-phishing attack vector
- applet
- about / Java Applet Attack
- attacker
- skills / Skills required in an attacker
- attacks
- Web-Jacking Attack Method / Web jacking
- Spear-Phishing Attack Vector / Spear-phishing attack vector
- Advance persistent threat (APT) attacks / Spear-phishing attack vector
- defense against / Defense against these attacks
B
- Backdoored Executable (BEST) payload / Steps to create a payload and listener
- Browser Exploitation Framework (BeFF) / The Browser Exploitation Framework
C
- computer-based social engineering / Computer-based social engineering
- about / Computer-based social engineering
- pop-up windows / Computer-based social engineering
- insider attack / Computer-based social engineering
- phishing / Computer-based social engineering
- social engineering attack, through fake SMS / Computer-based social engineering
- computer-based social engineering, tools
- Social Engineer Toolkit (SET) / Computer-based social engineering tools – Social-Engineering Toolkit (SET)
- website cloning / Website cloning
D
- -d option / Sefemails
- Distributed Denial of Service (DDoS) / Understanding the mass mailer attack
- dumpster diving / Human-based social engineering
E
- E-bomb
- E-mail Attack Mass Mailer attack / Understanding the mass mailer attack
- E-mail Attack Single Email Address attack / Understanding the mass mailer attack
- Eavesdropping / Human-based social engineering
- Elicitation
- about / Elicitation
- engineering
- exit phase
- about / Exit
- exploit / Exploit
H
- hook phase
- about / Hook
- human-based social engineering
- about / Human-based social engineering
- piggybacking / Human-based social engineering
- impersonating / Human-based social engineering
- Eavesdropping / Human-based social engineering
- reverse social engineering / Human-based social engineering
- dumpster diving / Human-based social engineering
- legitimate end user, posing as / Human-based social engineering
I
- identity
- theft / Identity theft
- stealing / Stealing an identity
- iframe replacement / Web jacking
- impersonating / Human-based social engineering
- information
- classifying / Classification of information
J
- Java Applet Attack
- about / Java Applet Attack
- Java Runtime Environment (JRE)
- about / Java Applet Attack
L
- listener
- creating / Steps to create a payload and listener
M
- mass mailer attack
- Metasploit Framework
- Meterpreter / Spear-phishing attack vector
- meterpreter payload / Payload
N
- NAT
- about / Java Applet Attack
- Nigerian 419scam / Computer-based social engineering
O
- Oak Ridge National Laboratory
P
- passwords / Password policies
- payloads
- creating / Creating a payload and a listener, Steps to create a payload and listener
- types / Payload
- payloads, types
- penetration testing tools
- skills / Penetration testing tools
- Browser Exploitation Framework / The Browser Exploitation Framework
- Social Engineering Framework (SEF) / The Social Engineering Framework
- Sefemails / Sefemails
- Sefphish / Sefphish
- Sefnames / Sefnames
- SefPayload / SefPayload
- phishing / Computer-based social engineering
- piggybacking / Human-based social engineering
- play phase
- about / Play
- policy
- about / Policies and procedure
- pop-up windows / Computer-based social engineering
R
- research phase
- about / Research
- reverse social engineering / Human-based social engineering
S
- security policy
- about / Policies and procedure
- training / Training
- incident response system / Incident response system
- information, classifying / Classification of information
- password, policies / Password policies
- Sefemails tool / Sefemails
- Sefnames tool / Sefnames
- SefPayload tool / SefPayload
- Sefphish tool / Sefphish
- SET
- single payload / Steps to create a payload and listener
- singles payload / Payload
- SMS spoofing attack
- about / Understanding the SMS spoofing attack vector
- predefined template / The predefined template
- social
- social engineering
- social engineering, phases
- social engineering, types
- about / Types of social engineering
- human-based social engineering / Human-based social engineering
- computer-based social engineering / Computer-based social engineering
- Social Engineering Framework) / The Social Engineering Framework
- Spear-Phishing Attack Vector
- about / Spear-phishing attack vector
- stagers payload / Payload, Steps to create a payload and listener
- stages payload / Steps to create a payload and listener
T
- training / Training
V
- vulnerability
- about / Vulnerability
W
- Web-Jacking Attack Method
- about / Web jacking
- Website Attack Vectors / Website cloning
Z
- zero-day vulnerability