-
Book Overview & Buying
-
Table Of Contents
Kali Linux Cookbook - Third Edition
By :
In this chapter, you will explore the psychological and technical methods that pen testers use to manipulate individuals and gain unauthorized access. While many security measures focus on firewalls, antivirus software, and intrusion detection systems, attackers often discover that the weakest link in any environment is human error.
You will begin by looking at phishing attacks, spear phishing, and the next generation of these threats, which leverage AI-enhanced intelligence gathering to focus your efforts. Modern tools and technology have enabled attackers to automate and personalize messages at an unprecedented scale, as illustrated by recipes on using AI large language models (LLMs) and automated spear phishing. Additionally, you will learn how to integrate chatbot systems to augment social engineering campaigns, making interactions seem more authentic and personalized.
Beyond email and chat-based deception, you will also learn techniques...