Skip to Main Content
Penetration Tester's Open Source Toolkit, 3rd Edition
book

Penetration Tester's Open Source Toolkit, 3rd Edition

by Jeremy Faircloth
August 2011
Intermediate to advanced content levelIntermediate to advanced
464 pages
12h 57m
English
Syngress
Content preview from Penetration Tester's Open Source Toolkit, 3rd Edition
Chapter 4. Client-side attacks and human weaknesses
Jeremy Faircloth
10662 Monroe Dr. NE, Blaine, MN 55434, United States
Information in this chapter:
• Objective
• Phishing
• Social Network Attacks
• Custom Malware
• Case Study: The Tools in Action
• Hands-On Challenge
What do phishing, custom malware, and social networking attacks have in common? They're all associated with the human side of penetration testing. Whereas the preceding chapters examined the technology aspects of penetration testing, this chapter examines the people aspect. After all, the systems being penetrated are set up and operated by people, so those people are also considered a valid attack vector. Besides discussing how to perform phishing attacks, this chapter explains how to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Tester's Open Source Toolkit, 2nd Edition

Penetration Tester's Open Source Toolkit, 2nd Edition

Chris Hurley, Jeremy Faircloth

Publisher Resources

ISBN: 9781597496278