Social Engineering : The Art of Human Hacking

by ;
Format: Paperback
Pub. Date: 2010-12-21
Publisher(s): Wiley
List Price: $37.00

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The first book to reveal and dissect the technical aspect of many social engineering maneuversFrom elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.Kevin Mitnick-one of the most famous social engineers in the world-popularized the term "social engineering." He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Includes a direct URL to a free download of the world's premiere penetration-testing distribution, BackTrack 4 SE Edition - geared towards Social Engineering ToolsTools for Human Hacking does its part to prepare you against nefarious hackers-now you can do your part by putting to good use the critical information within its pages.

Author Biography

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Table of Contents

Forewordp. xiii
Preface and Acknowledgmentsp. xvii
A Look into the World of Social Engineeringp. 1
Why This Book Is So Valuablep. 3
Overview of Social Engineeringp. 9
Summaryp. 21
Information Gatheringp. 23
Gathering Informationp. 26
Sources for Information Gatheringp. 33
Communication Modelingp. 43
The Power of Communication Modelsp. 53
Eficitationp. 55
What Is Elicitation?p. 56
The Goals of Elicitationp. 58
Mastering Elicitationp. 74
Summaryp. 76
Pretexting: How to Become Anyonep. 77
What Is Pretexting?p. 78
The Principles and Planning Stages of Pretextingp. 79
Successful Pretextingp. 91
Summaryp. 99
Mind Tricks: Psychological Principles Used in Social Engineeringp. 101
Modes of Thinking
Microexpressionsp. 109
Neurolinguistic Programming (NLP)p. 136
Interview and Interrogationp. 143
Building Instant Rapportp. 162
The Human Buffer Overflowp. 172
Summaryp. 178
Influence: The Power of Persuasionp. 181
The Five Fundamentals of Influence and Persuasionp. 182
Influence Tacticsp. 187
Altering Reality: Framingp. 215
Manipulation: Controlling Your Targetp. 233
Manipulation in Social Engineeringp. 248
Summaryp. 256
The Tools of the Social Engineerp. 259
Physical Toolsp. 260
Online Information-Gathering Toolsp. 279
Summaryp. 297
Case Studies: Dissecting the Social Engineerp. 299
Mitnick Case Study 1: Hacking the DMVp. 300
Mitnick Case Study 2: Hacking the Social Security Administrationp. 306
Hadnagy Case Study 1: The Overconfident CEOp. 310
Hadnagy Case Study 2: The Theme Park Scandalp. 317
Top-Secret Case Study 1: Mission Not Impossiblep. 322
Top-Secret Case Study 2: Social Engineering a Hackerp. 329
Why Case Studies Are Importantp. 337
Summaryp. 338
Prevention and Mitigationp. 339
Learning to Identify Social Engineering Attacksp. 340
Creating a Personal Security Awareness Culturep. 341
Being Aware of the Value of the Information You Are Being Asked Forp. 344
Keeping Software Updatedp. 347
Developing Scriptsp. 348
Learning from Social Engineering Auditsp. 348
Concluding Remarksp. 354
Summaryp. 361
Indexp. 363
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.