
Social Engineering : The Art of Human Hacking
by Hadnagy, Christopher; Wilson, PaulRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Foreword | p. xiii |
Preface and Acknowledgments | p. xvii |
A Look into the World of Social Engineering | p. 1 |
Why This Book Is So Valuable | p. 3 |
Overview of Social Engineering | p. 9 |
Summary | p. 21 |
Information Gathering | p. 23 |
Gathering Information | p. 26 |
Sources for Information Gathering | p. 33 |
Communication Modeling | p. 43 |
The Power of Communication Models | p. 53 |
Eficitation | p. 55 |
What Is Elicitation? | p. 56 |
The Goals of Elicitation | p. 58 |
Mastering Elicitation | p. 74 |
Summary | p. 76 |
Pretexting: How to Become Anyone | p. 77 |
What Is Pretexting? | p. 78 |
The Principles and Planning Stages of Pretexting | p. 79 |
Successful Pretexting | p. 91 |
Summary | p. 99 |
Mind Tricks: Psychological Principles Used in Social Engineering | p. 101 |
Modes of Thinking | |
Microexpressions | p. 109 |
Neurolinguistic Programming (NLP) | p. 136 |
Interview and Interrogation | p. 143 |
Building Instant Rapport | p. 162 |
The Human Buffer Overflow | p. 172 |
Summary | p. 178 |
Influence: The Power of Persuasion | p. 181 |
The Five Fundamentals of Influence and Persuasion | p. 182 |
Influence Tactics | p. 187 |
Altering Reality: Framing | p. 215 |
Manipulation: Controlling Your Target | p. 233 |
Manipulation in Social Engineering | p. 248 |
Summary | p. 256 |
The Tools of the Social Engineer | p. 259 |
Physical Tools | p. 260 |
Online Information-Gathering Tools | p. 279 |
Summary | p. 297 |
Case Studies: Dissecting the Social Engineer | p. 299 |
Mitnick Case Study 1: Hacking the DMV | p. 300 |
Mitnick Case Study 2: Hacking the Social Security Administration | p. 306 |
Hadnagy Case Study 1: The Overconfident CEO | p. 310 |
Hadnagy Case Study 2: The Theme Park Scandal | p. 317 |
Top-Secret Case Study 1: Mission Not Impossible | p. 322 |
Top-Secret Case Study 2: Social Engineering a Hacker | p. 329 |
Why Case Studies Are Important | p. 337 |
Summary | p. 338 |
Prevention and Mitigation | p. 339 |
Learning to Identify Social Engineering Attacks | p. 340 |
Creating a Personal Security Awareness Culture | p. 341 |
Being Aware of the Value of the Information You Are Being Asked For | p. 344 |
Keeping Software Updated | p. 347 |
Developing Scripts | p. 348 |
Learning from Social Engineering Audits | p. 348 |
Concluding Remarks | p. 354 |
Summary | p. 361 |
Index | p. 363 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.