- Description
- Reviews (0)
Description
Chapter 1: A Look into the World of Social Engineering
Why This Book Is So Valuable
Overview of Social Engineering
Summary
Chapter 2: Information Gathering
Gathering Information
Sources for Information Gathering
Communication Modeling
The Power of Communication Models
Chapter 3: Elicitation
What Is Elicitation?
The Goals of Elicitation
Mastering Elicitation
Summary
Chapter 4: Pretexting: How to Become Anyone
What Is Pretexting?
The Principles and Planning Stages of Pretexting
Successful Pretexting
Summary
Chapter 5: Mind Tricks: Psychological Principles Used in Social
Engineering
Modes of Thinking
Micro expressions
Neurolinguistic Programming (NLP)
Interview and Interrogation
Building Instant Rapport
The Human Buffer Overflow
Summary
Chapter 6: Influence: The Power of Persuasion
The Five Fundamentals of Influence and Persuasion
Influence Tactics
Altering Reality: Framing
Manipulation: Controlling Your Target
Manipulation in Social Engineering
Summary
Chapter 7: The Tools of the Social Engineer
Physical Tools
Online Information-Gathering Tools
Summary
Chapter 8: Case Studies: Dissecting the Social Engineer
Mitnick Case Study 1: Hacking the DMV
Mitnick Case Study 2: Hacking the Social Security
Administration
Hadnagy Case Study 1: The Overconfident CEO
Hadnagy Case Study 2: The Theme Park Scandal
Top-Secret Case Study 1: Mission Not Impossible
Top-Secret Case Study 2: Social Engineering a Hacker
Why Case Studies Are Important
Summary
Chapter 9: Prevention and Mitigation
Learning to Identify Social Engineering Attacks
Creating a Personal Security Awareness Culture
Being Aware of the Value of the Information You Are Being
Asked For
Keeping Software Updated
Developing Scripts
Learning from Social Engineering Audits
Concluding Remarks
Summary
Reviews
There are no reviews yet.