Social engineering exercise

The next exercise starts from outside, in other words, the attacker is coming from the internet and gaining access to the system in order to perform the attack. One approach to that is by driving the user's activity to a malicious site in order to obtain a user's identity.

Another method that is commonly used is sending a phishing email that will install a piece of malware in the local computer. Since this is one of the most effective methods, we will use this one for this example. To prepare this crafted email, we will use SET, which comes with Kali. On the Linux computer running Kali, open the Applications menu, click ExploitationTools, and select Social Engineering Toolkit.

On this initial screen you have six ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.