The first book to reveal and dissect the technical aspect of
many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all
aspects of social engineering are picked apart, discussed and
explained by using real world examples, personal experience and the
science behind them to unraveled the mystery in social
engineering.
Kevin Mitnick—one of the most famous social engineers in the
world—popularized the term “social engineering.” He explained that
it is much easier to trick someone into revealing a password for a
system than to exert the effort of hacking into the system. Mitnick
claims that this social engineering tactic was the single-most
effective method in his arsenal. This indispensable book examines a
variety of maneuvers that are aimed at deceiving unsuspecting
victims, while it also addresses ways to prevent social engineering
threats.
Examines social engineering, the science of influencing a target to
perform a desired task or divulge information
Arms you with invaluable information about the many methods of
trickery that hackers use in order to gather information with the
intent of executing identity theft, fraud, or gaining computer
system access
Reveals vital steps for preventing social engineering threats
Includes a direct URL to a free download of the world’s premiere
penetration-testing distribution, BackTrack 4 SE Edition - geared
towards Social Engineering Tools
Social Engineering: The Art of Human Hacking does its part to
prepare you against nefarious hackers—now you can do your part by
putting to good use the critical information within its pages.
關於作者:
Christopher Hadnagy is the lead developer of
www.social-engineer.org, the world''s first social engineering
framework. In more than 14 years of security and IT activity, he
has partnered with the team at www.backtrack-linux.org and worked
on a wide variety of security projects. He also serves as trainer
and lead social engineer for Offensive Security''s penetration
testing team.
目錄:
Preface.
Foreword.
1 A Look into the World of Social Engineering.
Why This Book Is So Valuable.
Overview of Social Engineering.
Summary.
2 Information Gathering.
Gathering Information.
Sources for Information Gathering.
Communication Modeling.
The Power of Communication Models.
3 Elicitation.
What Is Elicitation?
The Goals of Elicitation.
Mastering Elicitation.
Summary.
4 Pretexting: How to Become Anyone.
What Is Pretexting?
The Principles and Planning Stages of Pretexting.
Successful Pretexting.
Summary.
5 Mind Tricks: Psychological Principles Used in Social
Engineering.
Modes of Thinking.
Microexpressions.
Neurolinguistic Programming NLP.
Interview and Interrogation.
Building Instant Rapport.
The Human Buffer Overflow.
Summary.
6 Influence: The Power of Persuasion.
The Five Fundamentals of Influence and Persuasion.
Influence Tactics.
Altering Reality: Framing.
Manipulation: Controlling Your Target.
Manipulation in Social Engineering.
Summary.
7 The Tools of the Social Engineer.
Physical Tools.
Online Information-Gathering Tools.
Summary.
8 Case Studies: Dissecting the Social Engineer.
Mitnick Case Study 1: Hacking the DMV.
Mitnick Case Study 2: Hacking the Social Security
Administration.
Hadnagy Case Study 1: The Overconfident CEO.
Hadnagy Case Study 2: The Theme Park Scandal.
Top-Secret Case Study 1: Mission Not Impossible.
Top-Secret Case Study 2: Social Engineering a Hacker.
Why Case Studies Are Important.
Summary.
9 Prevention and Mitigation.
Learning to Identify Social Engineering Attacks.
Creating a Personal Security Awareness Culture.
Being Aware of the Value of the Information You Are Being Asked
For.
Keeping Software Updated.
Developing Scripts.
Learning from Social Engineering Audits.
Concluding Remarks.
Summary.
Index.