Social Engineering: The Art of Human Hacking (Google eBook)

Front Cover
John Wiley & Sons, Nov 29, 2010 - Computers - 416 pages
27 Reviews
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers

From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering.

Kevin Mitnick—one of the most famous social engineers inthe world—popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing atarget to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access
  • Reveals vital steps for preventing social engineeringthreats

Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers—now you can doyour part by putting to good use the critical information withinits pages.

  

What people are saying - Write a review

User ratings

5 stars
3
4 stars
13
3 stars
5
2 stars
2
1 star
4

Review: Social Engineering: The Art of Human Hacking

User Review  - Peter - Goodreads

Interesting and eye opening. Quite broad scope, so naturally going to have parts that aren't as interesting as others Read full review

Review: Social Engineering: The Art of Human Hacking

User Review  - John Fredrickson - Goodreads

Very interesting book. It covers a wide range of material, ranging from reading people, to influence, to techniques of deception, all in the interest of achieving (or subverting!) security. Read full review

Contents

A Look into the World of Social Engineering
1
Information Gathering
23
Elicitation
55
How to Become Anyone
77
Psychological Principles Used in Social Engineering
101
The Power of Persuasion
181
The Tools 0fthe Social Engineer
259
Dissecting the Social Engineer
299
Prevention and Mitigation
339
Index
363
Copyright

Common terms and phrases

About the author (2010)

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Bibliographic information