Kali Linux Social Engineering (Anglais) Broché – 24 décembre 2013
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Les clients ayant acheté cet article ont également acheté
Description du produit
Présentation de l'éditeur
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
- Learn about various attacks and tips and tricks to avoid them
- Get a grip on efficient ways to perform penetration testing.
- Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing
Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there.
This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks.
Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more.
By the end of this book you will be able to test the security of any organization based on social engineering attacks.
What you will learn from this book
- Clone websites to gain a victim's passwords and security information
- Undertake credential harvester attacks through spear-phishing and web jacking
- Perform client-side attacks through SET
- Get hands on with practical advice on eliciting identity details
- Counteract these techniques if they are being used against you
This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.
Who this book is written for
Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.
Biographie de l'auteur
Rahul Singh Patel
Rahul Singh Patel is currently working as an independent security consultant in India. Among his many other responsibilities, he performs web application security assessments and penetration testing.
Rahul started his journey in the world of computer hacking while still at school. He is very passionate about the subject of penetration testing and security research on chip-based security. Over the years, he has continued his attempts to keep himself up-to-date with the latest technology advancements in IT security.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards)
-= Stars =-
I only give it two stars because I don' hate it (one star) but for the price it's not okay either. If you get a copy really cheap (2-4$) and know nothing about the Social Engeneering Toolkit or social engeenering you can gain some basic knowledge with this book. But that's about it unfortunately.
-= Content =-
The tools the book coveres are
SET - Social Engeneering Toolkit
SEF - Social Engeneering Framework
BEeF - Browser Exploitation Framework
That being said, the part on SEF and BEeF goes from page 54 to 64, which is also the end of the book. That means, aside from the 10 pages (including images) on SEF/BEeF, there are another 10 pages that "explain" the how and what of social engeneering and the rest of the 48 pages are fairly focused on the Social Engeneering Toolkit (SET).
In Summary, you get 68 pages of content, or 84 pages if you want to count things like
What is Packt Publishing
About the Author
About the Reviewers
More from Packt Pub
Table of Contents
68 Pages of actual content (for which you bought the book)
The content in itself isn't bad, but for my taste a bit image heavy. There are a lot of images like this one.
(Can't insert images on Amazon, full blog post is on hashtagsecurity[dot]com)
Which IMHO isn't really necessary if you explain that there are templates available. On the other hand, I did miss some diagrams explaining the steps of a successfull social engeneering attack. Overall, for a beginners book there was to much focus on how to do certain things on the commandline and not enough on the background of the attack. A few questions that where left unanswered.
Why am I doing this attack?
What is the goal and who is the target?
What do I know already about the target that can aid me?
Instead the books shows just how to send a mass mail with one of the SET default templates.
Don't get me wrong, the information wasn't wrong, just incomplete. I'm certainly no SE expert, but isn't this kind of attack, more then any other, about obaiting information about a target and using it to increase the chance of a successfull attack?
Information Gathereing is something that was completely left out, which dissapointed me a bit.
-= Summary =-
Overall the book was far better then the last [i reviewed from PacktPub], but I still wouldn't call it a book but rather a long article. If you get your hands on and want to learn something about SET and SEF, go for it. But not for the current price. I would pay 5 at most, if I was really interested in the topic. If you have already worked with SET, you probably won't get much out of it.
Rechercher des articles similaires par rubrique
- Livres anglais et étrangers > Computers & Internet > Computer Science > Systems Analysis & Design
- Livres anglais et étrangers > Computers & Internet > Programming > Software Design, Testing & Engineering > Software Development
- Livres anglais et étrangers > Computers & Internet > Security & Encryption