O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing by Robert W. Beggs

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Physical Attacks and Social Engineering

Social engineering, especially when combined with physical access to the target system, is the single most successful attack vector used for penetration testing or an actual attack.

As an attack route supporting the kill chain, social engineering focuses on the nontechnical aspects of an attack that take advantage of a person trust and innate helpfulness to deceive and manipulate them into compromising a network and its resources.

The success of social engineering attacks relies on two key factors:

  • The knowledge that is gained during the reconnaissance phase. The attacker must know the names and usernames associated with the target; more importantly, the attacker must understand the concerns of the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required