Chapter 3
Social Engineering
Abstract
In this chapter, we learn how to get more information directly (or indirectly) from other sources through human interaction. This chapter will essentially round out the remaining information needed to conduct an investigation on a user, group, or entity.
Keywords
Backtrack
Social Engineering
Investigations
Shoulder Surfing
Dumpster Diving
Eavesdropping
Phishing
Bugging
Tracking
Spear-Phishing
Infectious Media Generator
Mass Mailer Attack
SMS Spoofing
Wireless Access Point Attack Vector
Reverse Social Engineering
Advanced Persistence Threat (APT)
Social engineering
Security is built on the foundation of trust. You can secure your identity, computer, or access to your home, but you do give this ...
Get Cyber Reconnaissance, Surveillance and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.