During the course of this chapter, we discussed various forms of social engineering techniques and methods of defending a person and organizations against them. We took a look at the identifying characteristics of phishing emails and a couple of social engineering tools that come preinstalled with Kali Linux. Now that you have completed this chapter, you will be able to describe various forms of social engineering attacks, implement countermeasures to reduce the risk of being a victim of such attacks, and perform a computer-based attack to capture a victim's user credentials by mimicking a social networking website.
I hope this chapter will prove beneficial regarding your studies and career.
In Chapter 14, Performing Website Penetration Testing, you'll learn about the basics of web application penetration testing.