Book Image

Learn Social Engineering

Book Image

Learn Social Engineering

Overview of this book

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts.
Table of Contents (16 chapters)

Elicitation

Perhaps the most important skill in the whole social engineering attack is that of drawing targets out to a point where they are open for exploitation. Elicitation is a powerful technique employed in key stages of the social engineering attack to make targets take on a path of behavior that the social engineer wants. An interesting definition of elicitation by the US National Security Agency (NSA) is that it is the subtle extraction of information during a normal conversation. Elicitation is one of the skills extensively taught to spies to ensure that they can munch out information from people without making it seem like they are actually being spied on. Conversations can take place just about anywhere and social engineers like to approach targets in locations that they (targets) are familiar with and thus feel comfortable with already when talking to new people. Humans...