A step-by-step practical guide that will get you well acquainted with Social Engineering. You'll be able to get started with this book in a matter of minutes with the help of different tools such as the Social Engineering toolkit , Kali Linux and so on.
To get the most out of this book
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it from https://www.packtpub.com/sites/default/files/downloads/LearnSocialEngineering_ColorImages.pdf.
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Whois.net lists information such as the email addresses, telephone numbers, and IP addresses of targets that one searches information about."
A block of code is set as follows:
intitle:"not for distribution"
"confidential" site:websitename.com
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Company stalker: Company stalker is important for gathering email information."