Analyzing Human Exploits Level: MR. ROBOT
Dear Security Professionals,
We are happy to announce releasing our next magazine edition available for free!
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professionals.
In this publication we will introduce you to the social engineering in practice. The author will describe a popular Social Engineering Toolkit (SET) that is a useful tool in the arsenal of every IT Security Professional. SET is open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community.
> Introduction to social engineering and social engineering toolkit (SET)
> Credential Harvesting Attack along with DNS Spoofing Using SET
> Address Resolution Protocol (ARP) Spoofing Attack
We are grateful to Vikas Kumar, experienced penetration tester from www.cyber-hunt.com, for creating this guide.
Unique cover design was created by Jim Steele from www.cyexdesign.com.
For more technical articles available on our website, subscribe to Hack Insight and receive:
--> 24 unique magazine editions per one year.
--> Access to all the previous releases from the archives.
--> Access to special publications, workshops and video tutorials.