In this chapter, we studied how we can perform client-side attacks using social engineering. We used social engineering techniques to again access to the victim's machine by making him actively participate in actions that help us to gain control over his system. We studied an important tool, Maltego, which is very powerful and helped us to collect important information about the target's social life; we could stalk his all social media accounts. Using this information, we planned ways whereby we could attack the target. We even learned how to create customized icons for files to act as backdoors for us to attack his system.
Employing information from Maltego, we used the email ID of a friend of the target to send a message that contained a backdoor that would activate once the victim opened the file.
In the next chapter, we will be studying the BeEF browser...