Foreword | p. xiii |
Preface and Acknowledgments | p. xvii |
A Look into the World of Social Engineering | p. 1 |
Why This Book Is So Valuable | p. 3 |
Overview of Social Engineering | p. 9 |
Summary | p. 21 |
Information Gathering | p. 23 |
Gathering Information | p. 26 |
Sources for Information Gathering | p. 33 |
Communication Modeling | p. 43 |
The Power of Communication Models | p. 53 |
Eficitation | p. 55 |
What Is Elicitation? | p. 56 |
The Goals of Elicitation | p. 58 |
Mastering Elicitation | p. 74 |
Summary | p. 76 |
Pretexting: How to Become Anyone | p. 77 |
What Is Pretexting? | p. 78 |
The Principles and Planning Stages of Pretexting | p. 79 |
Successful Pretexting | p. 91 |
Summary | p. 99 |
Mind Tricks: Psychological Principles Used in Social Engineering | p. 101 |
Modes of Thinking | |
Microexpressions | p. 109 |
Neurolinguistic Programming (NLP) | p. 136 |
Interview and Interrogation | p. 143 |
Building Instant Rapport | p. 162 |
The Human Buffer Overflow | p. 172 |
Summary | p. 178 |
Influence: The Power of Persuasion | p. 181 |
The Five Fundamentals of Influence and Persuasion | p. 182 |
Influence Tactics | p. 187 |
Altering Reality: Framing | p. 215 |
Manipulation: Controlling Your Target | p. 233 |
Manipulation in Social Engineering | p. 248 |
Summary | p. 256 |
The Tools of the Social Engineer | p. 259 |
Physical Tools | p. 260 |
Online Information-Gathering Tools | p. 279 |
Summary | p. 297 |
Case Studies: Dissecting the Social Engineer | p. 299 |
Mitnick Case Study 1: Hacking the DMV | p. 300 |
Mitnick Case Study 2: Hacking the Social Security Administration | p. 306 |
Hadnagy Case Study 1: The Overconfident CEO | p. 310 |
Hadnagy Case Study 2: The Theme Park Scandal | p. 317 |
Top-Secret Case Study 1: Mission Not Impossible | p. 322 |
Top-Secret Case Study 2: Social Engineering a Hacker | p. 329 |
Why Case Studies Are Important | p. 337 |
Summary | p. 338 |
Prevention and Mitigation | p. 339 |
Learning to Identify Social Engineering Attacks | p. 340 |
Creating a Personal Security Awareness Culture | p. 341 |
Being Aware of the Value of the Information You Are Being Asked For | p. 344 |
Keeping Software Updated | p. 347 |
Developing Scripts | p. 348 |
Learning from Social Engineering Audits | p. 348 |
Concluding Remarks | p. 354 |
Summary | p. 361 |
Index | p. 363 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.