Social Engineering : The Art of Human Hacking

by ;
  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 12/21/2010
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $34.99 Save up to $12.92
  • Buy New


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


The first book to reveal and dissect the technical aspect of many social engineering maneuversFrom elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.Kevin Mitnick-one of the most famous social engineers in the world-popularized the term "social engineering." He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Includes a direct URL to a free download of the world's premiere penetration-testing distribution, BackTrack 4 SE Edition - geared towards Social Engineering ToolsTools for Human Hacking does its part to prepare you against nefarious hackers-now you can do your part by putting to good use the critical information within its pages.

Author Biography

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Table of Contents

Forewordp. xiii
Preface and Acknowledgmentsp. xvii
A Look into the World of Social Engineeringp. 1
Why This Book Is So Valuablep. 3
Overview of Social Engineeringp. 9
Summaryp. 21
Information Gatheringp. 23
Gathering Informationp. 26
Sources for Information Gatheringp. 33
Communication Modelingp. 43
The Power of Communication Modelsp. 53
Eficitationp. 55
What Is Elicitation?p. 56
The Goals of Elicitationp. 58
Mastering Elicitationp. 74
Summaryp. 76
Pretexting: How to Become Anyonep. 77
What Is Pretexting?p. 78
The Principles and Planning Stages of Pretextingp. 79
Successful Pretextingp. 91
Summaryp. 99
Mind Tricks: Psychological Principles Used in Social Engineeringp. 101
Modes of Thinking
Microexpressionsp. 109
Neurolinguistic Programming (NLP)p. 136
Interview and Interrogationp. 143
Building Instant Rapportp. 162
The Human Buffer Overflowp. 172
Summaryp. 178
Influence: The Power of Persuasionp. 181
The Five Fundamentals of Influence and Persuasionp. 182
Influence Tacticsp. 187
Altering Reality: Framingp. 215
Manipulation: Controlling Your Targetp. 233
Manipulation in Social Engineeringp. 248
Summaryp. 256
The Tools of the Social Engineerp. 259
Physical Toolsp. 260
Online Information-Gathering Toolsp. 279
Summaryp. 297
Case Studies: Dissecting the Social Engineerp. 299
Mitnick Case Study 1: Hacking the DMVp. 300
Mitnick Case Study 2: Hacking the Social Security Administrationp. 306
Hadnagy Case Study 1: The Overconfident CEOp. 310
Hadnagy Case Study 2: The Theme Park Scandalp. 317
Top-Secret Case Study 1: Mission Not Impossiblep. 322
Top-Secret Case Study 2: Social Engineering a Hackerp. 329
Why Case Studies Are Importantp. 337
Summaryp. 338
Prevention and Mitigationp. 339
Learning to Identify Social Engineering Attacksp. 340
Creating a Personal Security Awareness Culturep. 341
Being Aware of the Value of the Information You Are Being Asked Forp. 344
Keeping Software Updatedp. 347
Developing Scriptsp. 348
Learning from Social Engineering Auditsp. 348
Concluding Remarksp. 354
Summaryp. 361
Indexp. 363
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review