Social Engineering: The Art of Human Hacking

Front Cover
John Wiley & Sons, Nov 29, 2010 - Computers - 416 pages
5 Reviews
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers

From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering.

Kevin Mitnick—one of the most famous social engineers inthe world—popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing atarget to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access
  • Reveals vital steps for preventing social engineeringthreats

Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers—now you can doyour part by putting to good use the critical information withinits pages.

 

What people are saying - Write a review

User ratings

5 stars
0
4 stars
2
3 stars
2
2 stars
1
1 star
0

LibraryThing Review

User Review  - csweder - LibraryThing

This book was a very nice blend of technology, social rules and customs, and even psychology--Hadnagy has definitely done his homework. The good thing is that Hadnagy wrote this book to help people ... Read full review

LibraryThing Review

User Review  - MarkBeronte - LibraryThing

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science ... Read full review

Contents

Mind Tricks Psychological Principles Used
Cover
Foreword
A Look into the World of Social Engineering
Information Gathering
Dradis has a nice easytouse interface
A typical scene on the homepage
The ShannonWeaver mother of
Elicitation
Pretexting How to Become Anyone
Influence The Power of Persuasion
The Tools of the Social Engineer
Case Studies Dissecting the Social Engineer
Prevention and Mitigation

Other editions - View all

Common terms and phrases

About the author (2010)

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Bibliographic information