Cargando…

Learn Social Engineering : Learn the art of human hacking with an internationally renowned expert.

This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretex...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ozkaya, Erdal
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1035515708
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180512s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d MERUC  |d IDB  |d NLE  |d OCLCQ  |d UKMGB  |d OCLCO  |d LVT  |d UKAHL  |d C6I  |d OCLCQ  |d UX1  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB8J1039  |2 bnb 
016 7 |a 018867850  |2 Uk 
019 |a 1035398064  |a 1040676411  |a 1175631673 
020 |a 9781788838009 
020 |a 1788838009 
020 |z 9781788837927 
020 |a 1788837924  |q (Trade Paper) 
020 |a 9781788837927 
024 3 |a 9781788837927 
029 1 |a UKMGB  |b 018867850 
029 1 |a AU@  |b 000067096058 
029 1 |a AU@  |b 000069258378 
035 |a (OCoLC)1035515708  |z (OCoLC)1035398064  |z (OCoLC)1040676411  |z (OCoLC)1175631673 
037 |a 9781788838009  |b Packt Publishing 
050 4 |a TK5105.59  |b .O953 2018eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Ozkaya, Erdal. 
245 1 0 |a Learn Social Engineering :  |b Learn the art of human hacking with an internationally renowned expert. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (557 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Social Engineering; Overview of social engineering; Applications of social engineering; The social engineering framework; Information gathering; Nontechnical; Technical; Elicitation; Pretexting; Mind tricks; Persuasion; Tools used in social engineering; Physical tools; Software-based tools; Social engineering examples from Hollywood; Matchstick Men (2003); Catch Me If You Can (2002); Ocean's Eleven (2001); Tips; Summary. 
505 8 |a Chapter 2: The Psychology of Social Engineering -- Mind Tricks UsedIntroduction; Modes of thinking; Visual thinkers; Auditory thinkers; Kinesthetic thinkers; Determining one's dominant sense and mode of thinking; Importance of understanding a target's mode of thinking; Microexpressions; Anger; Disgust; Contempt; Fear; Surprise; Sadness; Happiness; Training to see microexpressions; How microexpressions are used in a social engineering attack?; Contradictions; Hesitation; Behavioral changes; Gestures; NLP; Codes of NLP; Voice; Sentence structuring; Word choice; Interview and interrogation. 
505 8 |a Expert interrogation techniquesGesturing; Attentive listening; Building rapport; Human buffer overflow; Fuzzing the brain; Embedded commands; Tips; Summary; Chapter 3: Influence and Persuasion; Introduction; Five fundamental aspects of persuasion; Setting up the environment; Influence tactics; Reciprocation; Obligation; Concession; Scarcity; Authority; Legal authority; Organizational authority; Social authority; Commitment and consistency; Liking; Social proof; Reality alteration (framing); Manipulation; Negative manipulation tactics; Increasing predictability. 
505 8 |a Controlling the target's environmentCasting doubt; Making the target powerless; Punishing the target; Intimidation; Positive manipulation tips and tactics; Summary; Chapter 4: Information Gathering; Introduction; Gathering information about targets; Technical information-gathering methods; BasKet ; Dradis ; Websites; Search engines; Pipl; Whois.net; Social media; Phishing and spear phishing; Watering holes; Blogs; Telephone; Nontechnical methods; Dumpster diving; Intrusion and impersonation; Tailgating; Shoulder surfing; Observation; Tips; Summary; Chapter 5: Targeting and Recon; Introduction. 
505 8 |a BanksOld organizations; Organizational employees; IT personnel; Customer support agents; Senior-level staff; Finance personnel; Elderly people; Well-wishers; Tips; Summary; Chapter 6: Elicitation; Introduction; Getting into conversations with strangers; Preloading; Avoiding elicitation; Appealing to egos; Showing mutual interest; Falsifying statements; Flattering; Volunteering information; Assuming knowledge; Using ignorance; Capitalizing on alcoholic drinks; Being a good listener; Using intelligently-posed questions; Assumptive questions; Bracketing; Learning the skill of elicitation; Tips. 
500 |a Summary. 
520 |a This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Social engineering. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ingénierie sociale. 
650 6 |a Tests d'intrusion. 
650 7 |a Privacy & data protection.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Internet  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Social engineering  |2 fast 
776 0 8 |i Print version:  |a Ozkaya, Erdal.  |t Learn Social Engineering : Learn the art of human hacking with an internationally renowned expert.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5379705  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0036705484 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5379705 
938 |a YBP Library Services  |b YANK  |n 15343705 
994 |a 92  |b IZTAP