I
Ifconfig, wireless penetration testing
345
Ike-scan
network device footprinting
268–270 , 270f
VPN assessment
123
Impersonation attacks, web application assessment
233
Individually targeted phishing
overview
143
personal phishing
143 , 143b
professional phishing
144–145 , 144b
Infectious Media Generator, SET
180 , 180f
Information gathering
social networks
162
web application assessment
231
wireless penetration ...

Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.