-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Ultimate Kali Linux Book
By :

In this section, you will explore how to perform various types of social engineering attacks using an open-source application known as the Social Engineering Toolkit (SET) within Kali Linux. You will learn how to create a phishing website to perform credential harvesting and generate a malicious payload that can be placed on a USB flash drive or an optical disk.
All the techniques used in the following sections are to demonstrate a proof of concept strictly for educational purposes only. Do not use such techniques and tools for illegal purposes.
A method for tricking a victim is creating infectious media, which is any pluggable media storage device that contains malware created by a threat actor to compromise the targeted system. For instance, a USB flash drive with an auto-executable payload will run automatically when the USB device is connected to a computer. Quite often, humans...