Fr. 49.90

Social Engineering - 2nd Edition - The Science of Human Hacking

English · Paperback / Softback

Shipping usually within 4 to 7 working days

Description

Read more

Informationen zum Autor CHRISTOPHER HADNAGY is the CEO and Chief Human Hacker of Social-Engineer, LLC as well as the lead developer and creator of the world's first social engineering framework found at social-engineer.org. He is the founder and creator of the Social Engineering Village (SEVillage) at DEF CON and DerbyCon,as well as the creator of the popular Social Engineering Capture the Flag (SECTF). He is a sought-after speaker and trainer and even has debriefed the Pentagon on these topics. He can be found tweeting at @humanhacker. Klappentext "Chris Hadnagy's new book Social Engineering: The Science of Human Hacking is a great read for any audience interested in the subject of social engineering, detailing the exact steps from OSINT to execution in order to infiltrate any target." ?Kevin Mitnick, author, speaker, and consultant Mount a Stronger Defense by Mastering the Hackers' Most Reliable Techniques In the fortress of defense we build around our data, the human element is always the weakest link. Hackers?both good and bad?employ a specific set of tricks to gain access to sensitive information, using "human hacking" techniques to convince people to hand over passwords, transfer sensitive files, wire large sums of money, and willingly commit other acts that are not in their own best interests. Social Engineering: The Science of Human Hacking details the human hacker's skill set to help security professionals identify and remedy their own system's weaknesses. Beginning with an in-depth exploration of communication modeling, tribe mentality, observational skills, manipulation, and other fundamentals, the discussion moves on to actionable guidance for identifying, fighting, and preventing such attacks in your own organization. Author Christopher Hadnagy's updated second edition provides fresh insight into the latest social engineering trends and enduring classics, including case studies ripped from the headlines?as well as his own real-world experiences. Featuring how-to guidance on elicitation, pretexting, information gathering, tail-gating, shoulder surfing, phishing, and much more, this book dives deep into how humans can be influenced to make compromising decisions. "Back in the late 70's, I started using social engineering tradecraft to obtain free bus rides as an adolescent, intercepting NSA phone calls in high school, to finally compromising any system of interest as a young adult. My motivation was pursuit of knowledge, challenge, and the seduction of adventure. Fast forward to today, I still find that social engineering is the number one way in when conducting penetration testing. And I'm not alone. Nation states, criminal hackers, and hacktivists use the same tactics to disrupt businesses to steal money and/or proprietary information, and in some cases even change the course of a country's election." ?Kevin Mitnick, author, speaker, and consultant Zusammenfassung Examines what social engineering is! the methods used by hackers to gather information! and ways to prevent social engineering threats. Inhaltsverzeichnis Acknowledgments xi Foreword xix Preface xxi 1 A Look into the New World of Professional Social Engineering  . What Has Changed? 2 Why Should You Read This Book? 4 An Overview of Social Engineering 6 The SE Pyramid 11 What's in This Book? 14 Summary 15 2 Do You See What I See? 17 A Real-World Example of Collecting OSINT 17 Nontechnical OSINT 22 Tools of the Trade 59 Summary 61 3 Pröling People Through Communication 63 The Approach 66 Enter the DISC 68 Summary 80 4 Becoming Anyone You Want to Be 83 The Principles of Pretexting 84 Summary 98 5 I Know How to Make You Like Me 101 The Tribe Mentality...

List of contents

Acknowledgments xi
 
Foreword xix
 
Preface xxi
 
1 A Look into the New World of Professional Social Engineering .
 
2 Do You See What I See? 17
 
3 Profiling People Through Communication 63
 
4 Becoming Anyone You Want to Be 83
 
5 I Know How to Make You Like Me 101
 
6 Under the Influence 123
 
7 Building Your Artwork 157
 
8 I Can See What You Didn't Say 183
 
9 Hacking the Humans 223
 
10 Do You Have a M.A.P.P.? 257
 
11 Now What? 277
 
Index 287

Product details

Authors C Hadnagy, Christopher Hadnagy, Hadnagy Christopher
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Paperback / Softback
Released 31.07.2018
 
EAN 9781119433385
ISBN 978-1-119-43338-5
No. of pages 297
Dimensions 151 mm x 228 mm x 17 mm
Subjects Education and learning > Teaching preparation > Vocational needs
Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Computersicherheit, Informatik, computer science, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.