November 2025
Intermediate to advanced
568 pages
10h 32m
English
In this chapter, you will explore the psychological and technical methods that pen testers use to manipulate individuals and gain unauthorized access. While many security measures focus on firewalls, antivirus software, and intrusion detection systems, attackers often discover that the weakest link in any environment is human error.
You will begin by looking at phishing attacks, spear phishing, and the next generation of these threats, which leverage AI-enhanced intelligence gathering to focus your efforts. Modern tools and technology have enabled attackers to automate and personalize messages at an unprecedented scale, as illustrated by recipes on using AI large language models (LLMs) and automated ...
Read now
Unlock full access