This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of terms of service, or just not a good idea. It is provided here to give you information you can use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!
In this chapter, we'll look at some of the techniques used by the social engineer to deceive people, or in other words get the tasks performed efficiently without being caught. These types of attack are difficult to detect and defend. Up until now there has not been any technology or methodology in place to keep an eye on human communication. These types of social engineering attacks are performed without even typing a single key on the computer keyboard, so we will be discussing some of these techniques so that you know what...