EUR 29,53
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Kali Linux Social Engineering (Anglais) Broché – 24 décembre 2013

2 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
2 étoiles sur 5 1 commentaire client provenant des USA

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 29,53
EUR 25,95 EUR 34,67
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations

rentrée scolaire 2017 rentrée scolaire 2017

click to open popover

Offres spéciales et liens associés

Description du produit

Présentation de l'éditeur

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux


  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing

In Detail

Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.

This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.

Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.

By the end of this book you will be able to test the security of any organization based on social engineering attacks.

What you will learn from this book

  • Clone websites to gain a victim's passwords and security information
  • Undertake credential harvester attacks through spear-phishing and web jacking
  • Perform client-side attacks through SET
  • Get hands on with practical advice on eliciting identity details
  • Counteract these techniques if they are being used against you


This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.

Who this book is written for

Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

Biographie de l'auteur

Rahul Singh Patel

Rahul Singh Patel is currently working as an independent security consultant in India. Among his many other responsibilities, he performs web application security assessments and penetration testing.

Rahul started his journey in the world of computer hacking while still at school. He is very passionate about the subject of penetration testing and security research on chip-based security. Over the years, he has continued his attempts to keep himself up-to-date with the latest technology advancements in IT security.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards) 2.0 étoiles sur 5 1 commentaire
3 internautes sur 4 ont trouvé ce commentaire utile 
2.0 étoiles sur 5 Book Review: Kali Linux Social Engineering 12 avril 2014
Par Frederic Mohr - Publié sur
Format: Broché
I was asked by PacktPublishing to review this book.

-= Stars =-
I only give it two stars because I don' hate it (one star) but for the price it's not okay either. If you get a copy really cheap (2-4$) and know nothing about the Social Engeneering Toolkit or social engeenering you can gain some basic knowledge with this book. But that's about it unfortunately.

-= Content =-
The tools the book coveres are

SET - Social Engeneering Toolkit
SEF - Social Engeneering Framework
BEeF - Browser Exploitation Framework

That being said, the part on SEF and BEeF goes from page 54 to 64, which is also the end of the book. That means, aside from the 10 pages (including images) on SEF/BEeF, there are another 10 pages that "explain" the how and what of social engeneering and the rest of the 48 pages are fairly focused on the Social Engeneering Toolkit (SET).

In Summary, you get 68 pages of content, or 84 pages if you want to count things like

What is Packt Publishing
About the Author
About the Reviewers
More from Packt Pub
Table of Contents
68 Pages of actual content (for which you bought the book)

The content in itself isn't bad, but for my taste a bit image heavy. There are a lot of images like this one.

(Can't insert images on Amazon, full blog post is on hashtagsecurity[dot]com)

Which IMHO isn't really necessary if you explain that there are templates available. On the other hand, I did miss some diagrams explaining the steps of a successfull social engeneering attack. Overall, for a beginners book there was to much focus on how to do certain things on the commandline and not enough on the background of the attack. A few questions that where left unanswered.

Why am I doing this attack?
What is the goal and who is the target?
What do I know already about the target that can aid me?

Instead the books shows just how to send a mass mail with one of the SET default templates.

Don't get me wrong, the information wasn't wrong, just incomplete. I'm certainly no SE expert, but isn't this kind of attack, more then any other, about obaiting information about a target and using it to increase the chance of a successfull attack?

Information Gathereing is something that was completely left out, which dissapointed me a bit.

-= Summary =-
Overall the book was far better then the last [i reviewed from PacktPub], but I still wouldn't call it a book but rather a long article. If you get your hands on and want to learn something about SET and SEF, go for it. But not for the current price. I would pay 5 at most, if I was really interested in the topic. If you have already worked with SET, you probably won't get much out of it.
Ce commentaire a-t-il été utile ? Dites-le-nous