Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)
Extend Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Sorry, this item is currently unavailable.
The first book to reveal and dissect the technical aspect of many social engineering maneuversFrom elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.Kevin Mitnick-one of the most famous social engineers in the world-popularized the term "social engineering." He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Includes a direct URL to a free download of the world's premiere penetration-testing distribution, BackTrack 4 SE Edition - geared towards Social Engineering ToolsTools for Human Hacking does its part to prepare you against nefarious hackers-now you can do your part by putting to good use the critical information within its pages.
Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.
Table of Contents
Preface and Acknowledgments
A Look into the World of Social Engineering
Why This Book Is So Valuable
Overview of Social Engineering
Sources for Information Gathering
The Power of Communication Models
What Is Elicitation?
The Goals of Elicitation
Pretexting: How to Become Anyone
What Is Pretexting?
The Principles and Planning Stages of Pretexting
Mind Tricks: Psychological Principles Used in Social Engineering
Modes of Thinking
Neurolinguistic Programming (NLP)
Interview and Interrogation
Building Instant Rapport
The Human Buffer Overflow
Influence: The Power of Persuasion
The Five Fundamentals of Influence and Persuasion
Altering Reality: Framing
Manipulation: Controlling Your Target
Manipulation in Social Engineering
The Tools of the Social Engineer
Online Information-Gathering Tools
Case Studies: Dissecting the Social Engineer
Mitnick Case Study 1: Hacking the DMV
Mitnick Case Study 2: Hacking the Social Security Administration
Hadnagy Case Study 1: The Overconfident CEO
Hadnagy Case Study 2: The Theme Park Scandal
Top-Secret Case Study 1: Mission Not Impossible
Top-Secret Case Study 2: Social Engineering a Hacker
Why Case Studies Are Important
Prevention and Mitigation
Learning to Identify Social Engineering Attacks
Creating a Personal Security Awareness Culture
Being Aware of the Value of the Information You Are Being Asked For
Keeping Software Updated
Learning from Social Engineering Audits
Table of Contents provided by Ingram. All Rights Reserved.