Book Image

Web Penetration Testing with Kali Linux 2.0, Second Edition

Book Image

Web Penetration Testing with Kali Linux 2.0, Second Edition

Overview of this book

Table of Contents (17 chapters)
Web Penetration Testing with Kali Linux Second Edition
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we started by looking into the various social engineering attacks that are prevalent. We saw how easily users can be exploited through a social attack. We then discussed the social engineering toolkit and the different modules in it, covering a wide variety of social attacks. Next, we took a deep dive into the browser exploitation toolkit and learned how the XSS flaw can be exploited using the toolkit without writing even a single line of JavaScript. We covered all the major modules in BeEF and identified the different ways it could be used.

In the next chapter, we will talk about a new web technology known as AJAX and the security issues related to it.