Chapter 4. Client-side attacks and human weaknesses
Jeremy Faircloth
10662 Monroe Dr. NE, Blaine, MN 55434, United States
Information in this chapter:
• Case Study: The Tools in Action
What do phishing, custom malware, and social networking attacks have in common? They're all associated with the human side of penetration testing. Whereas the preceding chapters examined the technology aspects of penetration testing, this chapter examines the people aspect. After all, the systems being penetrated are set up and operated by people, so those people are also considered a valid attack vector. Besides discussing how to perform phishing attacks, this chapter explains how to ...