Amazon cover image
Image from Amazon.com
Image from Google Jackets

Social Engineering Science Of Human Hacking

By: Language: English Publication details: John Wiley and Sons 2018Edition: 2ndDescription: 297ISBN:
  • 9781119433385
Summary: Table of Contents Acknowledgments xi Foreword xix Preface xxi 1 A Look into the New World of Professional Social Engineering . What Has Changed? 2 Why Should You Read This Book? 4 An Overview of Social Engineering 6 The SE Pyramid 11 What’s in This Book? 14 Summary 15 2 Do You See What I See? 17 A Real-World Example of Collecting OSINT 17 Nontechnical OSINT 22 Tools of the Trade 59 Summary 61 3 Profiling People Through Communication 63 The Approach 66 Enter the DISC 68 Summary 80 4 Becoming Anyone You Want to Be 83 The Principles of Pretexting 84 Summary 98 5 I Know How to Make You Like Me 101 The Tribe Mentality 103 Building Rapport as a Social Engineer 105 The Rapport Machine 120 Summary 121 6 Under the Influence 123 Principle One: Reciprocity 125 Principle Two: Obligation 128 Principle Three: Concession 131 Principle Four: Scarcity 134 Principle Five: Authority 137 Principle Six: Consistency and Commitment 142 Principle Seven: Liking 146 Principle Eight: Social Proof 148 Influence vs. Manipulation 151 Summary 156 7 Building Your Artwork 157 The Dynamic Rules of Framing 159 Elicitation 168 Summary 182 8 I Can See What You Didn’t Say 183 Nonverbals Are Essential 184 All Your Baselines Belong to Us 187 Understand the Basics of Nonverbals 196 Comfort vs. Discomfort 198 Summary 220 9 Hacking the Humans 223 An Equal Opportunity Victimizer 224 The Principles of the Pentest 225 Phishing 229 Vishing 233 SMiShing 240 Impersonation 241 Reporting 246 Top Questions for the SE Pentester 250 Summary 254 10 Do You Have a M.A.P.P.? 257 Step 1: Learn to Identify Social Engineering Attacks 259 Step 2: Develop Actionable and Realistic Policies 261 Step 3: Perform Regular Real-World Checkups 264 Step 4: Implement Applicable Security-Awareness Programs 266 Tie It All Together 267 Gotta Keep ’Em Updated 268 Let the Mistakes of Your Peers Be Your Teacher 270 Create a Security Awareness Culture 271 Summary 274 11 Now What? 277 Soft Skills for Becoming an Social Engineer 277 Technical Skills 280 Education 281 Job Prospects 283 The Future of Social Engineering 284 Index 287 Errata Chapter Page Details Date Print Run 2 48 Errata in text An RSA key is a key that is based on a proprietary algorithm. Should be An RSA key is a key that is based on an industry-standard algorithm. 22-Aug-18 2 49 Errata in text Ah, but what if I use the translate.google.com site to translate the word password into Persian? Should be Ah, but what if I use the translate.google.com site to translate the word password into Farsi? 22-Aug-18 2 49 Errata in text Iraqi government server Should be Iranian government server 4 85 Social Engineering: The Science of Human Hacking2e The Text says there.Additionally The text should be there. Additionally 23-Sep-24 Acknowledgment xi Social Engineering: The Science of Human Hacking 2e The text says Dan Airely The text should be Dan Ariely's 3-Oct -24
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Cummins College of Engineering for Women Pune 005.82 HOD (Browse shelf(Opens below)) Available (not for issue) CCEP-BK-67479

Table of Contents
Acknowledgments xi

Foreword xix

Preface xxi

1 A Look into the New World of Professional Social Engineering .

What Has Changed? 2

Why Should You Read This Book? 4

An Overview of Social Engineering 6

The SE Pyramid 11

What’s in This Book? 14

Summary 15

2 Do You See What I See? 17

A Real-World Example of Collecting OSINT 17

Nontechnical OSINT 22

Tools of the Trade 59

Summary 61

3 Profiling People Through Communication 63

The Approach 66

Enter the DISC 68

Summary 80

4 Becoming Anyone You Want to Be 83

The Principles of Pretexting 84

Summary 98

5 I Know How to Make You Like Me 101

The Tribe Mentality 103

Building Rapport as a Social Engineer 105

The Rapport Machine 120

Summary 121

6 Under the Influence 123

Principle One: Reciprocity 125

Principle Two: Obligation 128

Principle Three: Concession 131

Principle Four: Scarcity 134

Principle Five: Authority 137

Principle Six: Consistency and Commitment 142

Principle Seven: Liking 146

Principle Eight: Social Proof 148

Influence vs. Manipulation 151

Summary 156

7 Building Your Artwork 157

The Dynamic Rules of Framing 159

Elicitation 168

Summary 182

8 I Can See What You Didn’t Say 183

Nonverbals Are Essential 184

All Your Baselines Belong to Us 187

Understand the Basics of Nonverbals 196

Comfort vs. Discomfort 198

Summary 220

9 Hacking the Humans 223

An Equal Opportunity Victimizer 224

The Principles of the Pentest 225

Phishing 229

Vishing 233

SMiShing 240

Impersonation 241

Reporting 246

Top Questions for the SE Pentester 250

Summary 254

10 Do You Have a M.A.P.P.? 257

Step 1: Learn to Identify Social Engineering Attacks 259

Step 2: Develop Actionable and Realistic Policies 261

Step 3: Perform Regular Real-World Checkups 264

Step 4: Implement Applicable Security-Awareness Programs 266

Tie It All Together 267

Gotta Keep ’Em Updated 268

Let the Mistakes of Your Peers Be Your Teacher 270

Create a Security Awareness Culture 271

Summary 274

11 Now What? 277

Soft Skills for Becoming an Social Engineer 277

Technical Skills 280

Education 281

Job Prospects 283

The Future of Social Engineering 284

Index 287

Errata
Chapter Page Details Date Print Run
2 48 Errata in text
An RSA key is a key that is based on a proprietary algorithm.
Should be
An RSA key is a key that is based on an industry-standard algorithm.
22-Aug-18
2 49 Errata in text
Ah, but what if I use the translate.google.com site to translate the word password into Persian?
Should be
Ah, but what if I use the translate.google.com site to translate the word password into Farsi?
22-Aug-18
2 49 Errata in text
Iraqi government server

Should be

Iranian government server
4 85 Social Engineering: The Science of Human Hacking2e
The Text says

there.Additionally

The text should be

there. Additionally 23-Sep-24
Acknowledgment xi Social Engineering: The Science of Human Hacking 2e
The text says

Dan Airely

The text should be

Dan Ariely's 3-Oct -24

There are no comments on this title.

to post a comment.