Social engineering : the art of human hacking / by Christopher Hadnagy.
Record details
- ISBN: 9780470639535 (pbk.)
- ISBN: 0470639539 (pbk.)
- Physical Description: xix, 382 p. : ill. ; 23 cm.
- Publisher: Hoboken, N.J. : Wiley ; 2011.
Content descriptions
General Note: | Includes index. |
Formatted Contents Note: | A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. |
Search for related items by subject
Subject: | Social engineering. Computer hackers. Computer security. Human-computer interaction. |
Available copies
Holds
- 0 current holds with 1 total copy.
Show Only Available Copies
Location | Call Number / Copy Notes | Barcode | Shelving Location | Status | Due Date |
---|---|---|---|---|---|
Coldwater Branch | 005.8 HAD (Text) | 35401424801867 | Non-Fiction | Available | - |
Social Engineering : The Art of Human Hacking
Click an element below to view details:
Table of Contents
Social Engineering : The Art of Human Hacking
Section | Section Description | Page Number |
---|---|---|
Foreword | p. xiii | |
Preface and Acknowledgments | p. xvii | |
1 | A Look into the World of Social Engineering | p. 1 |
Why This Book Is So Valuable | p. 3 | |
Overview of Social Engineering | p. 9 | |
Summary | p. 21 | |
2 | Information Gathering | p. 23 |
Gathering Information | p. 26 | |
Sources for Information Gathering | p. 33 | |
Communication Modeling | p. 43 | |
The Power of Communication Models | p. 53 | |
3 | Eficitation | p. 55 |
What Is Elicitation? | p. 56 | |
The Goals of Elicitation | p. 58 | |
Mastering Elicitation | p. 74 | |
Summary | p. 76 | |
4 | Pretexting: How to Become Anyone | p. 77 |
What Is Pretexting? | p. 78 | |
The Principles and Planning Stages of Pretexting | p. 79 | |
Successful Pretexting | p. 91 | |
Summary | p. 99 | |
5 | Mind Tricks: Psychological Principles Used in Social Engineering | p. 101 |
Modes of Thinking | ||
Microexpressions | p. 109 | |
Neurolinguistic Programming (NLP) | p. 136 | |
Interview and Interrogation | p. 143 | |
Building Instant Rapport | p. 162 | |
The Human Buffer Overflow | p. 172 | |
Summary | p. 178 | |
6 | Influence: The Power of Persuasion | p. 181 |
The Five Fundamentals of Influence and Persuasion | p. 182 | |
Influence Tactics | p. 187 | |
Altering Reality: Framing | p. 215 | |
Manipulation: Controlling Your Target | p. 233 | |
Manipulation in Social Engineering | p. 248 | |
Summary | p. 256 | |
7 | The Tools of the Social Engineer | p. 259 |
Physical Tools | p. 260 | |
Online Information-Gathering Tools | p. 279 | |
Summary | p. 297 | |
8 | Case Studies: Dissecting the Social Engineer | p. 299 |
Mitnick Case Study 1: Hacking the DMV | p. 300 | |
Mitnick Case Study 2: Hacking the Social Security Administration | p. 306 | |
Hadnagy Case Study 1: The Overconfident CEO | p. 310 | |
Hadnagy Case Study 2: The Theme Park Scandal | p. 317 | |
Top-Secret Case Study 1: Mission Not Impossible | p. 322 | |
Top-Secret Case Study 2: Social Engineering a Hacker | p. 329 | |
Why Case Studies Are Important | p. 337 | |
Summary | p. 338 | |
9 | Prevention and Mitigation | p. 339 |
Learning to Identify Social Engineering Attacks | p. 340 | |
Creating a Personal Security Awareness Culture | p. 341 | |
Being Aware of the Value of the Information You Are Being Asked For | p. 344 | |
Keeping Software Updated | p. 347 | |
Developing Scripts | p. 348 | |
Learning from Social Engineering Audits | p. 348 | |
Concluding Remarks | p. 354 | |
Summary | p. 361 | |
Index | p. 363 |