Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

eBook

$9.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Has it ever happened that a person called you and introduced himself as a bank employee? Or did you receive a letter with a link that, fortunately, you did not follow? The technologies by which attackers try to gain access to your passwords or data are based on social engineering, the science of the sophisticated and aggressive manipulation of human behavior. She uses a whole arsenal of tools: pressure on pity, the ability to powder her brains or piss her off, show unusual greed and put her in an awkward position, cause feelings of guilt or shame, and much more. Becoming victims of deception, we are not only at risk ourselves, but we can also greatly let down our colleagues and loved ones. Christopher Hadnagy, world-renowned social engineer, will teach you how to recognize manipulation of all types and counter fraudsters of all stripes. No one else will be able to force you to do what you did not plan to do - part with money, give out important information, take dangerous actions. All of the examples Hadnagy gives are taken from his personal and professional practice.

Product Details

ISBN-13: 9785961431025
Publisher: Alpina Publisher
Publication date: 05/03/2023
Sold by: Bookwire
Format: eBook
Pages: 430
File size: 9 MB
Age Range: 16 Years
Language: Russian

About the Author

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Table of Contents

Foreword xiii

Preface and Acknowledgments xvii

1 A Look into the World of Social Engineering 1

Why This Book Is So Valuable 3

Overview of Social Engineering 9

Summary 21

2 Information Gathering 23

Gathering Information 26

Sources for Information Gathering 33

Communication Modeling 43

The Power of Communication Models 53

3 Eficitation 55

What Is Elicitation? 56

The Goals of Elicitation 58

Mastering Elicitation 74

Summary 76

4 Pretexting: How to Become Anyone 77

What Is Pretexting? 78

The Principles and Planning Stages of Pretexting 79

Successful Pretexting 91

Summary 99

5 Mind Tricks: Psychological Principles Used in Social Engineering 101

Modes of Thinking 103

Microexpressions 109

Neurolinguistic Programming (NLP) 136

Interview and Interrogation 143

Building Instant Rapport 162

The Human Buffer Overflow 172

Summary 178

6 Influence: The Power of Persuasion 181

The Five Fundamentals of Influence and Persuasion 182

Influence Tactics 187

Altering Reality: Framing 215

Manipulation: Controlling Your Target 233

Manipulation in Social Engineering 248

Summary 256

7 The Tools of the Social Engineer 259

Physical Tools 260

Online Information-Gathering Tools 279

Summary 297

8 Case Studies: Dissecting the Social Engineer 299

Mitnick Case Study 1: Hacking the DMV 300

Mitnick Case Study 2: Hacking the Social Security Administration 306

Hadnagy Case Study 1: The Overconfident CEO 310

Hadnagy Case Study 2: The Theme Park Scandal 317

Top-Secret Case Study 1: Mission Not Impossible 322

Top-Secret Case Study 2: Social Engineering a Hacker 329

Why Case Studies Are Important 337

Summary 338

9 Prevention and Mitigation 339

Learning to Identify Social Engineering Attacks 340

Creating a Personal Security Awareness Culture 341

Being Aware of the Value of the Information You Are Being Asked For 344

Keeping Software Updated 347

Developing Scripts 348

Learning from Social Engineering Audits 348

Concluding Remarks 354

Summary 361

Index 363

From the B&N Reads Blog

Customer Reviews