Book description
Improve information security by learning Social Engineering.
About This Book- Learn to implement information security using social engineering
- Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on
- Practical approach towards learning social engineering, for IT security
This book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage
What You Will Learn- Learn to implement information security using social engineering
- Learn social engineering for IT security
- Understand the role of social media in social engineering
- Get acquainted with Practical Human hacking skills
- Learn to think like a social engineer
- Learn to beat a social engineer
This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.
Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks.
All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts.
Style and approachA step-by-step practical guide that will get you well acquainted with Social Engineering. You'll be able to get started with it in a matter of minutes with the help of different tools such as the Social Engineering toolkit , Kali Linux and so on.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Foreword
- Contributors
- Preface
- Introduction to Social Engineering
- The Psychology of Social Engineering – Mind Tricks Used
- Influence and Persuasion
- Information Gathering
- Targeting and Recon
- Elicitation
- Pretexting
-
Social Engineering Tools
-
The tools for social engineering
- Physical tools
-
Software tools
- Maltego
- Features of the software
- Technical specifications
- How to use Maltego?
- Maltego for network data gathering
- Using Maltego to collect data on an individual
- Hacking personal information
- Hacking servers
- Social engineer toolkit (SET)
- Spear phishing
- Web attack vector
- Infectious media generator
- SMS spoofing attack vector
- Wireless access point attack vector
- QRCode attack vector
- Third-party modules – fast track exploitation
- Create a payload and listener
- Mass mailer attack
-
Phone tools
- Caller ID spoofing
- Scripts
- The way back machine
- Spokeo
- Metagoofil
- Fingerprinting Organizations with Collected Archives (FOCA)
- The credential harvester attack method
- Social engineering exercise
- Phishing with BeEF
- Zabasearch.com
- Job postings
- Shodan.io
- Default passwords
- Hardware keyloggers
- Toll-free number providers
- Netcraft website
- Netcraft toolbar
- Microsoft Edge SmartScreen
- Windows Defender network protection
- Highly recommended
- Ask the experts
- Tips
- Summary
-
The tools for social engineering
- Prevention and Mitigation
- Case Studies of Social Engineering
- Ask the Experts – Part 1
- Ask the Experts – Part 2
-
Ask the Experts – Part 3
- Raymond P.L. Comvalius
- George Dobrea
-
Dr. Mitko Bogdansoki
- Securing the weakest link in the cyber security chain against social engineering attacks
- Introduction
- Staying safe from social engineering attacks
- Ozan Ucar and Orhan Sari
- Sami Lahio
-
Ask the Experts – Part 4
- Oguzhan Filizlibay
- Yalkin Demirkaya
- Leyla Aliyeva
- Aryeh Goretsky
- Dr. Islam, MD Rafiqul, and Dr. Erdal Ozkaya
- Other Books You May Enjoy
Product information
- Title: Learn Social Engineering
- Author(s):
- Release date: April 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788837927
You might also like
book
The Art of Social Engineering
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and …
book
Social Engineering, 2nd Edition
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking …
book
Practical Social Engineering
Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise …
book
Social Engineering Penetration Testing
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these …