Unavailable
Unavailable
Unavailable
Ebook419 pages3 hours
Practical Social Engineering: A Primer for the Ethical Hacker
By Joe Gray
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
A guide to hacking the human element.
Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.
Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once you’ve succeeded in harvesting information about your targets with advanced OSINT methods, you’ll discover how to defend your own organization from similar threats.
You’ll learn how to:
Apply phishing techniques like spoofing, squatting, and standing up your own web server to avoid detection Use OSINT tools like Recon-ng, theHarvester, and Hunter Capture a target’s information from social media Collect and report metrics about the success of your attack Implement technical controls and awareness programs to help defend against social engineering
Fast-paced, hands-on, and ethically focused, Practical Social Engineering is a book every pentester can put to use immediately.
Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.
Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once you’ve succeeded in harvesting information about your targets with advanced OSINT methods, you’ll discover how to defend your own organization from similar threats.
You’ll learn how to:
Fast-paced, hands-on, and ethically focused, Practical Social Engineering is a book every pentester can put to use immediately.
Unavailable
Related to Practical Social Engineering
Related ebooks
Blockchain Data Analytics For Dummies Rating: 0 out of 5 stars0 ratingsCoding All-in-One For Dummies Rating: 4 out of 5 stars4/5Penetration Testing For Dummies Rating: 0 out of 5 stars0 ratingsMicrosoft PowerShell, VBScript and JScript Bible Rating: 0 out of 5 stars0 ratingsBeginning Programming with C++ For Dummies Rating: 0 out of 5 stars0 ratingsDigital Literacy For Dummies Rating: 3 out of 5 stars3/5Computer Forensics JumpStart Rating: 3 out of 5 stars3/5Networking For Dummies Rating: 0 out of 5 stars0 ratingsC++ All-in-One For Dummies Rating: 4 out of 5 stars4/5Professional Twitter Development: With Examples in .NET 3.5 Rating: 0 out of 5 stars0 ratingsEmerging Technologies for Business Professionals: A Nontechnical Guide to the Governance and Management of Disruptive Technologies Rating: 0 out of 5 stars0 ratingsEthereum For Dummies Rating: 0 out of 5 stars0 ratingsThe Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet Rating: 0 out of 5 stars0 ratingsMachine Learning For Dummies Rating: 4 out of 5 stars4/5Beginning Programming with Python For Dummies Rating: 3 out of 5 stars3/5iOS App Development Portable Genius Rating: 0 out of 5 stars0 ratingsBeginning Python: Using Python 2.6 and Python 3.1 Rating: 3 out of 5 stars3/5Python for Cybersecurity: Using Python for Cyber Offense and Defense Rating: 0 out of 5 stars0 ratingsWeb Application Defender's Cookbook: Battling Hackers and Protecting Users Rating: 0 out of 5 stars0 ratingsPython All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsMastering LOB Development for Silverlight 5: A Case Study in Action Rating: 0 out of 5 stars0 ratingsiOS Cloud Development For Dummies Rating: 5 out of 5 stars5/5Data Democratization with Domo: Bring together every component of your business to make better data-driven decisions using Domo Rating: 0 out of 5 stars0 ratingsMEAN Blueprints Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsWindows PowerShell 2.0 Bible Rating: 0 out of 5 stars0 ratingsMastering Computer Programming Rating: 0 out of 5 stars0 ratingsObjective-C Programming For Dummies Rating: 4 out of 5 stars4/5Web Coding & Development All-in-One For Dummies Rating: 1 out of 5 stars1/5C++ For Dummies Rating: 3 out of 5 stars3/5
Security For You
ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Mastering Blockchain Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5How to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Wires of War: Technology and the Global Struggle for Power Rating: 5 out of 5 stars5/5There's a War Going On But No One Can See It Rating: 0 out of 5 stars0 ratingsDeep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsDeFi and the Future of Finance Rating: 0 out of 5 stars0 ratings
Reviews for Practical Social Engineering
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews