Practical Social Engineering: A Primer for the Ethical Hacker
- Length: 230 pages
- Edition: 1
- Language: English
- Publisher: No Starch Press
- Publication Date: 2021-08-24
- ISBN-10: 171850098X
- ISBN-13: 9781718500983
- Sales Rank: #1529172 (See Top 100 Books)
An ethical introduction to social engineering, an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a human target in order to gain access to an asset. Social engineering is key to the effectiveness of any computer security professional.
Social engineering is the art of capitalizing on human psychology to compromise systems, not technical vulnerabilities. It’s an effective method of attack because even the most advanced security detection teams can do little to defend against an employee clicking a malicious link or opening a file in an email and even less to what an employee may say on a phone call. This book will show you how to take advantage of these ethically sinister techniques so you can better understand what goes into these attacks as well as thwart attempts to gain access by cyber criminals and malicious actors who take advantage of human nature.
Author Joe Gray, an award-winning expert on the subject, shares his Social Engineering case studies, best practices, OSINT tools, and templates for both orchestrating (ethical) attacks and reporting them to companies so they can better protect themselves. His methods maximize influence and persuasion with creative techniques, like leveraging Python scripts, editing HTML files, and cloning a legitimate website to trick users out of their credentials. Once you’ve succeeded in harvesting information on your targets with advanced OSINT methods, Gray guides you through the process of using this information to perform real Social Engineering, then teaches you how to apply this knowledge to defend your own organization from these types of attacks.
You’ll learn:
- How to use Open Source Intelligence tools (OSINT) like Recon-ng and whois
- Strategies for capturing a target’s info from social media, and using it to guess their password
- Phishing techniques like spoofing, squatting, and standing up your own webserver to avoid detection
- How to collect metrics about the success of your attack and report them to clients
- Technical controls and awareness programs to help defend against social engineering
Fast-paced, hands-on and ethically focused, Practical Social Engineering is a book every pentester can put to use immediately.
PART I: THE BASICS 1: WHAT IS SOCIAL ENGINEERING? 2: ETHICAL CONSIDERATIONS IN SOCIAL ENGINEERING PART II: OFFENSIVE SOCIAL ENGINEERING 3: PREPARING FOR AN ATTACK 4: GATHERING BUSINESS OSINT 5: SOCIAL MEDIA AND PUBLIC DOCUMENTS 6: GATHERING OSINT ABOUT PEOPLE 7: PHISHING 8: CLONING A LANDING PAGE 9: DETECTION, MEASUREMENT, AND REPORTING PART III: DEFENDING AGAINST SOCIAL ENGINEERING 10: PROACTIVE DEFENSE TECHNIQUES 11: TECHNICAL EMAIL CONTROLS 12: PRODUCING THREAT INTELLIGENCE A: SCOPING WORKSHEET B: REPORTING TEMPLATE C: INFORMATION-GATHERING WORKSHEET D: PRETEXTING SAMPLE E: EXERCISES TO IMPROVE YOUR SOCIAL ENGINEERING
Donate to keep this site alive
How to download source code?
1. Go to: https://nostarch.com/
2. Search the book title: Practical Social Engineering: A Primer for the Ethical Hacker
, sometime you may not get the results, please search the main title
3. Click the book title in the search results
3. Download the Source Code.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.