Hi Zaid and your grateful Teammates,
I am on my way to becoming an perfect ethical hacker and I am learning a lot from you. Your courses are great!
But I am missing what I think is one of the important skills in Social Engineering. How does Call ID Spoofing
work? I have been trying to set up a telephone system with Asterisk for several months. But it does not work.
If I am going to do a penetration test in the future, I would like to know how to do call ID spoofing with Kali
Linux or another Linux. I would be grateful if you add this to the social engineering course.
Kind regards to all
Hi!
Thanks for your suggestion. I’ll suggest to do a google research about the topic. This is an advanced technique so doing a proper research would be the best solution. I haven’t done it before so can’t really suggest a specific tool.
Thanks Diego for your tips, but I would still like you to add this topic to your courses in the future. Because I don’t want to teach myself anything wrong that doesn’t work. Thanks for your help!