Document Type
|
:
|
BL
|
Record Number
|
:
|
856589
|
Main Entry
|
:
|
Ozkaya, Erdal.
|
Title & Author
|
:
|
Learn Social Engineering : : Learn the art of human hacking with an internationally renowned expert.
|
Publication Statement
|
:
|
Birmingham :: Packt Publishing,, 2018.
|
Page. NO
|
:
|
1 online resource (557 pages)
|
ISBN
|
:
|
1788837924
|
|
:
|
: 1788838009
|
|
:
|
: 9781788837927
|
|
:
|
: 9781788838009
|
|
:
|
9781788837927
|
Notes
|
:
|
Summary.
|
Contents
|
:
|
Cover; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Social Engineering; Overview of social engineering; Applications of social engineering; The social engineering framework; Information gathering; Nontechnical; Technical; Elicitation; Pretexting; Mind tricks; Persuasion; Tools used in social engineering; Physical tools; Software-based tools; Social engineering examples from Hollywood; Matchstick Men (2003); Catch Me If You Can (2002); Ocean's Eleven (2001); Tips; Summary.
|
|
:
|
BanksOld organizations; Organizational employees; IT personnel; Customer support agents; Senior-level staff; Finance personnel; Elderly people; Well-wishers; Tips; Summary; Chapter 6: Elicitation; Introduction; Getting into conversations with strangers; Preloading; Avoiding elicitation; Appealing to egos; Showing mutual interest; Falsifying statements; Flattering; Volunteering information; Assuming knowledge; Using ignorance; Capitalizing on alcoholic drinks; Being a good listener; Using intelligently-posed questions; Assumptive questions; Bracketing; Learning the skill of elicitation; Tips.
|
|
:
|
Chapter 2: The Psychology of Social Engineering -- Mind Tricks UsedIntroduction; Modes of thinking; Visual thinkers; Auditory thinkers; Kinesthetic thinkers; Determining one's dominant sense and mode of thinking; Importance of understanding a target's mode of thinking; Microexpressions; Anger; Disgust; Contempt; Fear; Surprise; Sadness; Happiness; Training to see microexpressions; How microexpressions are used in a social engineering attack?; Contradictions; Hesitation; Behavioral changes; Gestures; NLP; Codes of NLP; Voice; Sentence structuring; Word choice; Interview and interrogation.
|
|
:
|
Controlling the target's environmentCasting doubt; Making the target powerless; Punishing the target; Intimidation; Positive manipulation tips and tactics; Summary; Chapter 4: Information Gathering; Introduction; Gathering information about targets; Technical information-gathering methods; BasKet ; Dradis ; Websites; Search engines; Pipl; Whois.net; Social media; Phishing and spear phishing; Watering holes; Blogs; Telephone; Nontechnical methods; Dumpster diving; Intrusion and impersonation; Tailgating; Shoulder surfing; Observation; Tips; Summary; Chapter 5: Targeting and Recon; Introduction.
|
|
:
|
Expert interrogation techniquesGesturing; Attentive listening; Building rapport; Human buffer overflow; Fuzzing the brain; Embedded commands; Tips; Summary; Chapter 3: Influence and Persuasion; Introduction; Five fundamental aspects of persuasion; Setting up the environment; Influence tactics; Reciprocation; Obligation; Concession; Scarcity; Authority; Legal authority; Organizational authority; Social authority; Commitment and consistency; Liking; Social proof; Reality alteration (framing); Manipulation; Negative manipulation tactics; Increasing predictability.
|
Abstract
|
:
|
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Penetration testing (Computer security)
|
Subject
|
:
|
Social engineering.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computers-- Internet-- Security.
|
Subject
|
:
|
Computers-- Networking-- Security.
|
Subject
|
:
|
Computers-- Security-- General.
|
Subject
|
:
|
Network security.
|
Subject
|
:
|
Penetration testing (Computer security)
|
Subject
|
:
|
Privacy data protection.
|
Subject
|
:
|
Social engineering.
|
Subject
|
:
|
Kali Linux.
|
|
:
|
Kali Linux.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
TK5105.59.O953 2018eb
|