August 2018
Intermediate to advanced
254 pages
6h 20m
English
In the very first section of this chapter we saw two possible scenarios of exploitation. Either the attacker has direct access to the target system or the target system is behind the router/firewall and the attacker can reach only till the public interface of router/firewall.
In the case of the second scenario, the attacker has to send some kind of payload to the victim and trick him into executing the payload. Once executed, it will establish a reverse connection back to the attacker. This is a covert technique and involves the use of social engineering.
Kali Linux offers an excellent framework for performing various social engineering attacks. The social engineering toolkit can be accessed at Applications | ...
Read now
Unlock full access